Premium Essay

Lans and Wans

In: Computers and Technology

Submitted By thisisit
Words 1327
Pages 6
INDP-week 4
Erin Estes
NTC/362
Keshia Green
11/26/2012

Local Area and Wide Area networks are essential to connecting Kudler Fine Foods together. As are the hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole.

LAN, WAN and Wireless technologies
Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to send signal back to the host and to all other devices on the network. This alerts the other devices that there is a transmission between device A and B and that they must wait to send data over the network.

Switches, Routers and

Similar Documents

Free Essay

Lan Wan

...Local are networks (LAN) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. Has a High speed (1000 mbps) Tends to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs tend to have fewer problems associated with them, as there are smaller numbers of systems to deal with. Wide area network (WAN) is a computer network that covers a broad area. It does have slower speeds of about 150 mbps. WANs tend to use technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances Differences between (LAN) & (WAN) (LAN) is typically owned and managed by a single company or organization. LAN also experiences fewer data transmission errors and overall fewer problems as a whole as opposed to WAN. WAN has a high cost maintenance and lower bandwidth. In conclusion the major differences are going to be cost, efficiency and coverage Describe common physical topologies and a logical topology : Physical topology refers to how the network is wired it can be either a ring topology where all the hosts are connected together or a bus topology where there is a network medium and each host connects to that medium by wire. A logical topology in the other hand governs how the network is going to work. For example all the hosts in the network are connected through a central connecting point that’s the physical topology however the way the protocols and hardware are designed to work...

Words: 273 - Pages: 2

Premium Essay

Lan/Wan

...to pull necessary files. For the phone system we will use VOIP phones to allow all locations to be connected on the same system to allow call transfer. We will then use Barracuda systems for security and backups. We will then use Active directory, to create group policies and add restrictions per site. The 5 main sites will have Servers that will allow additional locations to connect through VPN. Each server will being using barracuda security along with backup systems to secure information. Barracuda will provide Email security Web security Network security Web application security data protection and file sync & share, Barracuda will also provide VOIP services. Our international will be connected WAN to WAN and the locations will be connected LAN to WAN to LAN. We will be using a layered network for when changed are made to the network it does not change all layers but will change the one layer that is to be changed. We will have access layer which connects end users to the network this will be achieved by using a hub to which PCs will be connected. The distribution routing is going to connect to our multiple properties from our central company. We will also be using Scalability...

Words: 565 - Pages: 3

Premium Essay

Lan, Man and Wan

...LAN, MAN and WAN Student Name University Network Telecommunication Professor Name October 21, 2013 LAN, MAN and WAN Computer networking is simply the communication between two or more computers that allow them to share information and hardware resources. This is really one of the most important contributions to the information age since personal computers were invented. The connection and communication of just two computers exchanging data and devices is the most fundamental of networking. The computer systems may communicate over a computer network and share their resources (Computer Network, 2009). A computer network can be wire and or wireless. When a network is wired, it uses cables to connect group of computers together to enable data communication. Wireless networks allow computers to communicate by using radio signals, so the computers aren't restricted by physical cables (Lowe, 2011). For example, it uses bluetooth, infrared rays and radio waves to send and receive signals over the network. Peer-to-peer (p2p) and client-server are the two computer networks in use today. In a p2p network, every computer has the same or equal capabilities and responsibilities. And with a client server it is nothing like peer-to-peer, some computers are the clients that request for resources and the servers make available the requested resources. There are many categories of computer networking, but the most common are local area network (LAN), metropolitan area network...

Words: 1265 - Pages: 6

Premium Essay

Lan - to - Wan Domain

...Michael Bearcroft Week 4 Lab 2 Part 1 Introduction The LAN-to-WAN Domain provides Internet access for the entire organization and acts as the entry/exit point for the wide area network (WAN). This domain is where all data travels into and out of the IT infrastructure. There are many threats and risks here, as the attack could come from inside the network or it could be trying to get into the network. Threats With this domain as the buffer between two other domains it gets the majority of the traffic through it. Some of the treats, risks, and vulnerabilities are as follows. Threats from people, this could be misconfigured equipment, equipment not being used correctly, unauthorized use, use of personally owned software/hardware. There are also viruses, Trojans, and network worms that can inflict damage on the network. Some of the physical threats are fire, water, electrical disturbances, and hardware failures. Mitigation Here is some of the ways in which the threats to the domain can be mitigated. Security training for the employees, so they will know what to do in specific scenarios. Security training is mandated by the Computer Security Act of 1987, so it’s not just a good idea but a requirement. Strict personnel screening by the HR department will also screen out any personnel that could cause issues in the future. User Identification and authentication is another way to keep the LAN – to – WAN domain safe. Another important safeguard is encryption, if the information...

Words: 904 - Pages: 4

Premium Essay

Itm Lan, Man, Wan

...Computer or devices Different types of networks – Major LAN ,WAN, MAN , also can, ban,pan 3rd slide- application- staright forward 4TH SLIDE TOPOLOGY DEFINITION- A TOPOLOGY REPRESENT THE RELATIONSHIP OF ALL THE LINKS & DEVICES. MESH TOPOLOGY- EVERY DEVICE IS CONNECTED TO EVERY OTHER DEVICE VIA DEDICATED POINT TO POINT LINK STAR TOPLOGY- STAR TOPOLGY CONSISTS OF A HUB.ALL THE DEVICES ARE CONNECTED TO THIS HUB.THE DEVICES ARE NOT CONNECTED TO EACH OTHER. BUS TOPOLOGY- ALL DEVICES ARE CONNECTED TO THE LONG CABLE(BACKBONE) USING DROPLINES & TAPS. RING TOPOLGY-EACH DEVICE IS CONNECTED TO THE NEXT DEVICE;WITH THE LAST DEVICE CONNECTED BACK TO THE FIRST DEVICE. 5th slide Lan- * Definition-Computer network that interconnects computers in a limited area (for details refer wiki) * Characteristics- higher data-transfer rates(SPEED), smaller geographic area, and minimum need for leased telecommunication lines. * Technology -Previously ARCNET, Token Ring were used..At present Wifi, Ethernet are being used. * Application-  home, school, computer laboratory 6th slide Advantages- straight forward 7th slide MAN- * Defintion- A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology. * Characteristic-  Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, lower speed than lan. * Technology -High-capacity backbone technology,...

Words: 301 - Pages: 2

Premium Essay

Lan / Wan Research Project

...LAN / WAN Research Project 1) You have just begun working as a networking consultant with MTI Technologies Inc. One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office in the city of Chicago. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance? I would inform them that they might have a NIC card that is not capable of 100baseT, this would make all the other NIC cards run on 10baseT regardless of it’s capability. I would suggest that they purchase a new NIC card and I would inform them that they need to update their drivers whenever they do upgrades. 2) The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is now running more smoothly. However, they have realized that their Internet connection is too slow. They have been using a dial-up BRI ISDN connection. They want to spend no more than $250 per month on an Internet connection (not including installation fees). They also need a transmission...

Words: 583 - Pages: 3

Premium Essay

Lan, Man and Wan Network Topologies

...network topologies, but the three most common types are LANs, MANs, and WANs. The LAN topology is probably the most common of the three. The MAN and WAN topologies are used but not nearly as much as the LAN topology is, although the WAN is starting to be used more and more because of the growing population of networks. The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN's in them for certain purposes. When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization. A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically a dispersed collection of LAN's. A network...

Words: 522 - Pages: 3

Premium Essay

Lan/Wan Networking Project

...Clevy Aponte Prof Nossa Dear Taxes-r-Us My name is Clevy Aponte and I have recently started working as a Networking Consultant for MTI Technologies Inc. I am also the person assigned to help your group improve your network. As I was informed, and feel free to correct me, that to improve this network you decided to switch from 10BaseT to 100BaseT, I hope that you know that with this improvement might get a faster service but as a consequence the number of equipment that can be added would be less. But after this change, your network not still satisfying you. My first guess to your problem would be NIC cards, your network might have an NIC card that is not compatible or capable of 100BaseT and this issue won’t let the others run more that 10BaseT. To begin with, I would suggest that you to purchase a new NIC card (Network Interface Card) and also remind you to make sure your drivers are updated whenever an upgrade is done. (This is very important). Before buying a new NIC card for your motherboard you must always update drivers when upgrading anything on a computer the computer never knows automatically unless the software was built that way. The solution can be as easy as going to the website of the original make of your NIC that is attached to the motherboard of the PCI slots and upgrade the drivers for these Thank you very much for the attention; feel free to contact me if any questions or information is needed. I will be on top of your issue until your problem...

Words: 681 - Pages: 3

Premium Essay

Acceptable Use Policy for Wan/Lan Access

...Acceptable Use Policy (AUP) for use of WAN/LAN owned and maintained by Richman Investments Statement of Policy: The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and other authorized individuals who are granted access to any Local Area Network and/or Wide Area Network or other service maintained and provided by Richman Investments or its subsidiaries. It is expected that all departments will enforce these policies. ANY USER FOUND VIOLATING THESE POLICIES OR PROCEDURES WILL FACE PUNISHMENT WHICH MAY INCLUDE DISCIPLINARY ACTION, SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION. Users of the any Local Area Network and/or Wide Area Network owned and maintained by Richman Investments understand they are subject to monitoring by the Information Technology department in order to maintain systems security and prevent unauthorized access and usage of equipment. Richman Investments assumes no responsibility for actions performed by users which violate any laws, foreign or domestic. If discovered, these users will be reported to the proper authorities for prosecution. Prohibited Use of Equipment or System: * No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers * No exporting internal software or technical material in violation of export control laws * No accessing unauthorized internal resources or information from external sources * No port...

Words: 339 - Pages: 2

Premium Essay

Define a Lan-to-Wan, Internet, and Web Surfing Aup That Restricts Usage of the Company’s Internet Connection and Permits the Company to Monitor Usage of the Corporate Internet Connection.

...responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain is the access of LAN to Wan, web surfing, and internet. LAN to Wan is the activities between LAN to Wan and firewalls, routers, intrusion, detection, and workstations. Web surfing determines what a user can do on company time with company resources. Internet is when the user has access to the internet what types of controls should the organization have on the certain internet sites being accessed. Although they all sort of are the same they are very much different (Cordero, 2013). For the Lan to Wan AUP will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations that have databases with sensitive information may also require a criminal background check before granting access. This all prevents risks, threats, and vulnerability that could compromise an organization’s system, applications, and/or data. Lan and Wan AUP helps in preventing users from destroying the firewalls and protection programs from leaking sensitive information and/or...

Words: 771 - Pages: 4

Free Essay

Help

...– THREAT - VULNERABILITY | PRIMARY DOMAIN IMPACTED | Unauthorized access from public Internet | LAN –WAN | User destroys data in application and deletes all files | USER | Hacker penetrates your IT infrastructure and gains access to you internal network | SYSTEM APPLICATION | Intra-office employee romance gone bad | USER | Fire destroys primary data center | LAN | Communication circuits outages | WAN | Workstation OS has a known software vulnerability | LAN – WAN | Unauthorized access to organization owned | USER | Workstations | USER | Loss of production data | SYSTEM APPLICATION | Denial of Service attack on organization e-mail Server | LAN – WAN | Remote communications from home office | REMOTE ACCESS | LAN server OS has a known software vulnerability | LAN | User downloads an unknown e-mail attachment | USER | Workstation browser has software vulnerability | WORKSTATION | Service provider has a major network outage | WAN | Weak ingress/ egress traffic filtering degrades Performance | LAN – WAN | User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers | USER | VPN tunneling between remote computer and ingress/egress router | REMOTE ACCESS | WLAN access points are needed for LAN connectivity within a warehouse | LAN – WAN | Need to prevent rogue users from unauthorized WLAN access | WAN | LAB ASSESSMENT QUESTIONS 1. Unauthorized access to organization owned, because if there...

Words: 307 - Pages: 2

Premium Essay

Final Comp Paper

... |User |Integrity | |Intrusion detection system/intrusion prevention system |LAN-to-WAN |Integrity | |(IDS/IPS) |Workstation | | |Access controls |Workstation |Confidentiality and integrity | | |LAN | | | |LAN-to-WAN | | | |WAN | | | |Remote Access | | | |System/Applications | | |Failover server |LAN...

Words: 278 - Pages: 2

Free Essay

Fundamentals of Network Elements

...GENERAL QUESTIONS (Q1-Q4) Q1: How many LANs and WANs are forming the enterprise network? LANs: __________ WANs: _____________ Q2: How many subnetworks do you see? Answer: __________ subnetworks List the subnetworks: Q3: When PC1 communicates with Server 1, how many data links a message has to go through? Answer: __________ data links When PC1 communicates with Server 1, how many physical links a message has to go through? Answer: __________ physical links When PC1 communicates with Server 3, how many data links a message has to go through? Answer: __________ data links When PC7 communicates with Server 2, how many different routes a message can take? Answer: __________ routes Q4: What physical topology is used to interconnect the four routers? ____________________ SECTION 2: NOW, CREATE ALL NETWORK NODES (PCS, SERVERS, ROUTERS, AND SWITCHES) ON PACKET TRACER. NO CABLING YET. CHANGE ALL LABELS OF NETWORK NODES AS IN THE FIGURE. Questions (Q5-Q12) based on the R2 (1841 Router) in “out-of-the-box condition”. Q5: How may Ethernet ports does the 1841 router have initially? Answer: __________ Q6: What are the port (interface) names assigned to the Ethernet ports? Answer: Q7: What are MAC addresses of Ethernet ports (or LAN ports)? Do not worry about VLAN1 now. Q8: How may WAN ports (also called Serial ports) does the router have? Answer: _________ Q9: Do LAN/WAN ports have an IP address? Answer: _________ Q10: Are LAN/WAN ports currently up or down? Answer: _________ ...

Words: 1354 - Pages: 6

Premium Essay

Nt1310 Unit 11 Assignment

...Computers and nodes can be connected in pattern and is known as the topology. There is a few different type of topology. The most common topology are - RING, MESH,STAR,TREE, and BUS. There is also different type of computer network, the types are based on the capacity and the organization purpose. The most commonly network include Local Area Network (LAN) , Wide Area Network (Wan), Metropolitan Area Network (MAN), Personal Area Network (PAN). LOCAL AREA NETWORK...

Words: 1566 - Pages: 7

Premium Essay

Nt2580 Unit 1 Lab 1 Report

...Management IS355 Student Name: Sherry Best Instructor Name: Nicole Goodyear Lab Due Date: 1/16/2018 In your Lab Report file, describe how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local Area Network to Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains. Risk is the likelihood that a loss will occur. A loss results in a compromise to business functions or assets. • User Domain can come in various forms; people are the weak link here such as a user writing a password on a sticky note and sticking under the keyboard or on the monitor. Unknown to the user a malicious individual can log unto the network or domain using that person's credential to steal or launch a DoS or a DDoS attack. This can overwhelm the entire network that can lead to loss of revenue for the organization....

Words: 695 - Pages: 3