Premium Essay

Fundamental of Network

In:

Submitted By mans0000
Words 3022
Pages 13
Fundamentals of Networks
Alhaji Mansary
University of Phoenix
Integrative Network Design Project
Part 3
Prof, Marjorie Marque
12/12/12.

Kudler Fine Foods Network: Final Introduction
Kudler Fine Foods is on their way to upgrading their present network infrastructure with better wireless technology that will provide an improved communication medium both for the stores and employees. This will help maximizing the company’s profits with the aid of the new systems and servers performance. The new inventory system will let a store’s POS system to alert the warehouses that they need to ship more products already when the store is running low in stock. This will eliminate or at least make the man-hours needed in checking the stock. VoWLAN (Voice over WLAN) is the one to provide all the communications needed to be done by taking or making calls while providing the services needed by the customers by using the same medium. Other technological Advances will provide real-time network analysis and security monitoring which will bring overall benefits to the Kudler Company.
Network Overview
Kudler’s network infrastructure is now becoming very old. The stores are on separate networks so the bus network topology that they have does not allow effective communication already. This is a major problem because of the fact of lacking central location for network servers and backups or security set-up. This is the reason an enterprise wireless WAN is being rolled out. This is essential as this will provide mobility to the company, which is the future truss of most of the business entities. The WLAN will provide better ways of communication to happen such as Voice over Wireless Local Area Network. Dell Precision T5500 towers are running Windows 7 operating system with wireless networking capability will be installed at all sales counters. This will

Similar Documents

Premium Essay

Network Fundamental

...The operational network of FedEx Ground for this location is a composite of a number of sections. Management section includes three departments, human resources, finance and marketing. The backbone of this section is 1000 baseF which is connected on the company LAN through a Cisco switch. Human resources and finance department have 5 computers each and marketing has 10 computers. All computers are Dell, 1.7 GHz and dual-core, 8 GB RAM, 500 GB hard drive and WIN 7 operation system. There is also one HP CP4225n laser printer for each department. The company has 25 IP phones connected on this section of the network. A Cisco router 2900 is used to create an outside connection with headquarter. The second section include Line-haul department which has a total 15 computers, two laser printers and one scanner. Line-haul department has also 10 IP phones. The backbone for this section is a 100 baseF which is connected on the LAN through a Cisco switch. The last section includes the Pickup and Delivery (P&D) department, which has 12 computers, one laser printer and one scanner. In addition P&D department has a total of 120 scanning devices which are used to scan packages and add them on system. The backbone for this section is a 1000 baseF that is connected with the company LAN using a Cisco switch. Company uses a HP BL 460 P server to share all the information and is accessible from all three sections. On the event of a power loss, an APC Smart-UPS backup battery is installed on...

Words: 276 - Pages: 2

Free Essay

Fundamentals of Network Elements

...SECTION 1: GENERAL QUESTIONS (Q1-Q4) Q1: How many LANs and WANs are forming the enterprise network? LANs: __________ WANs: _____________ Q2: How many subnetworks do you see? Answer: __________ subnetworks List the subnetworks: Q3: When PC1 communicates with Server 1, how many data links a message has to go through? Answer: __________ data links When PC1 communicates with Server 1, how many physical links a message has to go through? Answer: __________ physical links When PC1 communicates with Server 3, how many data links a message has to go through? Answer: __________ data links When PC7 communicates with Server 2, how many different routes a message can take? Answer: __________ routes Q4: What physical topology is used to interconnect the four routers? ____________________ SECTION 2: NOW, CREATE ALL NETWORK NODES (PCS, SERVERS, ROUTERS, AND SWITCHES) ON PACKET TRACER. NO CABLING YET. CHANGE ALL LABELS OF NETWORK NODES AS IN THE FIGURE. Questions (Q5-Q12) based on the R2 (1841 Router) in “out-of-the-box condition”. Q5: How may Ethernet ports does the 1841 router have initially? Answer: __________ Q6: What are the port (interface) names assigned to the Ethernet ports? Answer: Q7: What are MAC addresses of Ethernet ports (or LAN ports)? Do not worry about VLAN1 now. Q8: How may WAN ports (also called Serial ports) does the router have? Answer: _________ Q9: Do LAN/WAN ports have an IP address? Answer: _________ Q10: Are LAN/WAN ports currently up or down...

Words: 1354 - Pages: 6

Premium Essay

Fundamentals of Local Area Network

...1. A family wishes to connect several devices to share an Internet connection and a Bluetooth wireless printer. They have three personal computers. One is in the same room as the printer. The other two are together in another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices. a. Describe what network device or devices are recommended for purpose for the given home network scenario(s). For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables. b. Explain the recommendations justifying why these would suit the needs for the network The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An...

Words: 1210 - Pages: 5

Free Essay

Spur

...Appendix A Mapping Course Content to the CompTIA A+ Essentials 220-701 Exam Objectives Exam Objective | A+ Certification Lesson and Topic Reference | A+ Certification Activity Reference | Domain 1.0 Hardware | 1.1 Categorize storage devices and backup media | * FDD | Personal Computer Components, Storage Devices | | * HDD | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state vs. magnetic | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Optical drives | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices...

Words: 6966 - Pages: 28

Premium Essay

Riordan

...Integrative Network Design Project Part 1 NTC/362 Integrative Network Design Project Part 1 * There are various distinctive kinds and sites of networks exist. Individuals may utilize a network in a home office to transfer via the Internet, to find information, to put orders in for products, and to send messages to co-workers. Individuals might work in a small workplace that is set up with a network that links other computers and printers in the office. Individuals might work in a large organization in which numerous computers, printers, storage devices, and servers transfer and collect information from several departments over large geographic areas. This document will provide three key explanations on Riordan Manufacturing. These items are explanation of the network’s fundamental characteristics and components; an evaluation of the current network topology; description of the standards application to this project. * Riordan Manufacturing network consist of four locations that interconnect with each other by WAN. There is the Corporate Headquarters, China Headquarters, Albany, GA, and Pontiac MI office. The Corporate Headquarters and China Headquarters are connecting via satellite. The two Headquarters location are using 1000baseT as their backbone. With the Albany, GA and the Pontiac, MI office their connection to the outside networks are thru T2 connections. All office connects with LAN using switches. The Albany, GA and the Pontiac, MI office use 24 port switches...

Words: 531 - Pages: 3

Premium Essay

Jon Jons

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...

Words: 60675 - Pages: 243

Free Essay

Upload

...Fundamentals of Information Systems Security Lesson 1 Information Systems Security Fundamentals of Information Systems Security © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 1 Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Fundamentals of Information Systems Security - Contact: hieuld2@fpt.edu.vn Page 2 Key Concepts  Confidentiality, integrity, and availability (C-I-A) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Fundamentals of Information Systems Security - Contact: hieuld2@fpt.edu.vn Page 3 DISCOVER: CONCEPTS Fundamentals of Information Systems Security - Contact: hieuld2@fpt.edu.vn Page 4 Introducing ISS ISS Information Systems Information Fundamentals of Information Systems Security - Contact: hieuld2@fpt.edu.vn Page 5 The C-I-A Triad Fundamentals of Information Systems Security - Contact: hieuld2@fpt.edu.vn Page 6 Confidentiality Personal Data and Information • Credit card account numbers and bank account numbers • Social security numbers and address information Intellectual Property • Copyrights, patents, and secret formulas • Source code, customer databases...

Words: 1090 - Pages: 5

Premium Essay

Computer Security

...Foundations of Network Security Fundamentals of Network Security 2 Firewall Fundamentals 43 VPN Fundamentals 79 Network Security Threats and Issues 111 CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK SECURITY is very complex. New threats from inside and outside networks appear constantly. Just as constantly, the security community is always developing new products and procedures to defend against threats of the past and unknowns of the future. As companies merge, people lose their jobs, new equipment comes on line, and business tasks change, people do not always do what we expect. Network security configurations that worked well yesterday, might not work quite as well tomorrow. In an ever-changing business climate, whom should you trust? Has your trust been violated? How would you even know? Who is attempting to harm your network this time? Because of these complex issues, you need to understand the essentials of network security. This chapter will introduce you to the basic elements of network security. Once you have a firm grasp of these fundamentals, you will be well equipped to put effective security measures into practice on your organization’s network. While this textbook focuses on general network security, including firewalls and virtual private networks (VPNs), many of the important basics of network security are introduced in this chapter. In Chapters 1–4, network security fundamentals, concepts...

Words: 16205 - Pages: 65

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Using Neural Networks to Forecast Stock Markets

...Using Neural Networks to Forecast Stock Market Prices Abstract This paper is a survey on the application of neural networks in forecasting stock market prices. With their ability to discover patterns in nonlinear and chaotic systems, neural networks offer the ability to predict market directions more accurately than current techniques. Common market analysis techniques such as technical analysis, fundamental analysis, and regression are discussed and compared with neural network performance. Also, the Efficient Market Hypothesis (EMH) is presented and contrasted with chaos theory and neural networks. This paper refutes the EMH based on previous neural network work. Finally, future directions for applying neural networks to the financial markets are discussed. 1 Introduction From the beginning of time it has been man’s common goal to make his life easier. The prevailing notion in society is that wealth brings comfort and luxury, so it is not surprising that there has been so much work done on ways to predict the markets. Various technical, fundamental, and statistical indicators have been proposed and used with varying results. However, no one technique or combination of techniques has been successful enough to consistently "beat the market". With the development of neural networks, researchers and investors are hoping that the market mysteries can be unraveled. This paper is a survey of current market forecasting techniques with an emphasis on why they are insufficient...

Words: 6887 - Pages: 28

Premium Essay

Integrative Network Design Project (Indp)

...Integrative Network Design Project (INDP) This paper will explain the network fundamental characteristics and components of Kudler Fine Foods (KFF). Kudler Fine Foods is a small local upscale specialty food store specializing in import and domestic products located in the three locations within the San Diego metropolitan area. Diagrams will show the current network topology. Finally, a description the standards applicable to this INDP project will be provided. Network Fundamental Characteristics and Components A network is comprised of computer hardware, cabling, network devices, and computer software, which together allows computers to communicate with each other. The network characteristics are determined by the availability, cost, reliability, security, speed, scalability, and topology. In order to understand how each component communicates and operates it’s helpful to break it down into pieces and then analyze. The diagrams below provide details of the topology of Kudler Fine Foods. Current Network Topology The current network topology used at Kudler Fine Foods is the bus topology. The bandwidth which is the volume of data that can travel over the Ethernet cable is shared with a transmission speed of 100 Mbit/s. “The single cable is referred to as a trunk, backbone, or segment (Goleniewski, 2007).” University of Phoenix. (2013). University of Phoenix. (2013). University of Phoenix. (2013). Standards Components assigned to a specific architecture layer have...

Words: 446 - Pages: 2

Premium Essay

Network Security

...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you complete...

Words: 15367 - Pages: 62

Premium Essay

Work1

...Fundamentals of Information Systems Security Lesson 5 Access Controls © 2014 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Learning Objective  Explain the role of access controls in implementing security policy. Fundamentals of Information Systems Security © 2014 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 2 Key Concepts  Authorization policies that apply access control to systems, application, and data  The role of identification in granting access to information systems  The role of authentication in granting access to information systems  Authentication factor types and the need for twoor three-factor authentication  The pros and cons of the formal models used for access controls Fundamentals of Information Systems Security © 2014 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 3 Defining Access Control  The process of protecting a resource so that it is used only by those allowed to do so  Prevents unauthorized use Fundamentals of Information Systems Security © 2014 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 4 Four Parts of Access Control Access Control Component Authorization Identification Authentication Accountability Description Who is approved for access and what can they use? How...

Words: 1398 - Pages: 6

Free Essay

Nonlinear Modelling Application in Distillation Column

...gain optimum performance of the distillation column, an effective control strategy is needed. In recent years, model based control strategies such as internal model control (IMC) and model predictive control (MPC) have been revealed as better control systems compared to the conventional method. But one of the major challenges in developing this effective control strategy is to construct a model which is utilized to describe the process under consideration. The purpose of this paper is to provide a review of the models that have been implemented in continuous distillation columns. These models are categorized under three major groups: fundamental models, which are derived from mass, energy and momentum balances of the process, empirical models, which are derived from input-output data of the process, and hybrid models which combine both the fundamental and the empirical model. The advantages and limitations of each group are discussed and compared. The review reveals a remarkable prospect of developing a nonlinear model in this research...

Words: 9415 - Pages: 38

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62