New Technology Research for Network Systems Administration

In: Other Topics

Submitted By jmm121873
Words 325
Pages 2
My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network.
The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete.
I also learned new terminology;
IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.”
802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands.
SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it.
WPA2- (Wi-Fi Protected Access II) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.
This article was very fascinating to read. The writer did a thorough job describing the technology. As I did my search for definitions of the new vocabulary, it leads me to even more information and questions about networking. In my opinion this article was a great…...

Similar Documents

New Technology Research for Network Systems Administration

...My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network. The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete. I also learned new terminology; IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.” 802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands. SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it. WPA2- (Wi-Fi Protected Access II)......

Words: 325 - Pages: 2

New Technology in My Field Research Essay

...Abstract The study of computer forensics has quickly emerged and technology used in theis type of forensics is being developed quite rapidly. As swiftly as the field and its importance are growing, many practitioners still remain unaware of computer forensics and its role in the technological world. A paper provides an overview of the relatively new field of computer forensics. The paper also illustrates why, in the wake of 9-11 and other terrorist acts, the research and development of computer forensics is of international importance. (A) I chose to write my article on computer forensics mainly because I have been involved with computer forensics numerous times in my life. The most recent experience I’ve had with computer forensics was last year. I was informed by my wife that her best friend had received a visit from DHS after their daughters had mentioned that their dad had been touching them and asking them to do things that they were uncomfortable with. DHS determined that they needed to investigate the situation and began to gather the necessary information. During the investigation my wife’s friend had noticed that her husband was starting to be very secretive and was locking up his computer anytime she walked into the room and had been using a 128 bit encrypted flash drive that he never let leave his person. He started being verbally abusive and physically abusive to both her and their 2 young daughters and she locked him out of the house. I...

Words: 716 - Pages: 3

Network Technology

...A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Ethernet switch devices were commonly used on home networks before home routers became popular; broadband routers integrate Ethernet switches directly into the unit as one of their many functions. High-performance network switches are still widely used in corporate networks and data centers. Advantages Switches have increased available network bandwidth. There is reduced workload on individual computers. Increased network performance. There are fewer packet collisions. And some disadvantages are: They are significantly more expensive. Network problems can be difficult to trace through a switch. Broadcast traffic. Below is a diagram showing how switchg/hub are interconnected in a network A hub is a device for connecting machines into a network. It is a non-intelligent connection but tends to be very cheap. It allows all machines to send packets to every machine connected and wait for the required machine to reply. This causes delays as all the ports are used for every transmission. A network switch is the more recent method. This has intelligence and remembers which machines are connected to each port, so it passes any transmission straight to the correct port. This reduces collisions on the network when it is busy and is therefore much faster. It is more expensive, although nowadays there is very little difference in price. A...

Words: 1379 - Pages: 6

New Technology in the Field of Networking Systems Administration

...New Technology in the Field of Networking Systems Administration The field of Networking Systems Administration has many new things happening every year. With the way the development of new technology is, it is very difficult for a lot of none technologically inclined people too keep up most of the time. One of these companies that are always coming up with new technology is called AMD. They are a company that develops processors for many of the leading brands of computers today. Their most recent development is a new processor chip that is supposed to be faster than their leading competitor’s (Sakr, 2014). From what this article says this new Processor chip is called the Kaveri and combines 4 CPU cores and 8 GPU cores “and gives them unheard-of levels of computing independence, such that AMD feels justified in describing them collectively as a dozen ‘compute cores. ’” From the way this article has described this new technology, it is going to make the computer gaming world’s games run faster and better in many different ways. Now many technologically knowledgeable people would be inclined to believe that this is all just marketing nonsense, but according to Sharif Sakr, the Senior European Editor of Engadget.com, says that AMD seems to be being very open with their companies thinking with this new processor (Sakr, 2014). This new technology is still waiting on home reviews from the customers who have bought this new processor, but if it lives up to what it is...

Words: 500 - Pages: 2

Network System Administration

...1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple word 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? d. The binary equivalent of decimal 123456789 9. A student writes a report using a word processor, saving the report in a file called my report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file- sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files as defined by a computer OS? (Choose three answers.) a. Keeps data in order b. Provides a convenient way to name a set of data for easier operations like copying and moving c. Names give users an easy way to reference the data 11. Which of the following answers best describes how a hard disk...

Words: 547 - Pages: 3

Network Systems Administration

...NT2580 Introduction to Information Security STUDENT COPY: FINAL EXAM 30. What does risk management directly affect? a. Company investments b. Security policy framework c. Security controls d. Number of employees 31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of? Positions, with Z wrapping back to A? a. Transposition b. Vigenere c. Caesar d. Vernam 32. Identify a security objective that adds value to a business. a. Revocation b. Authorization c. Anonymity d. Message authentication 33. Which of the following is an asymmetric encryption algorithm? a. AES b. 3DES c. RSA d. RC4 34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. a. Nonrepudiation b. Integrity c. Authorization d. Access control 35. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and Nonrepudiation a. Cipher text b. Cryptography c. Access control d. Hashing 36. In which OSI layer do you find FTP, HTTP, and other programs that end users interact with? a. Application b. Network c. Physical d. Data Link 37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives. a. Multilayered firewall b. Screened subnet firewall c. Border firewall d. Ordinary firewall...

Words: 606 - Pages: 3

Principles of Network and System Administration

...CST 2405 Subject: Home work #1. Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must...

Words: 337 - Pages: 2

Specialized Network Administration

... Specialized Network Administration INTA 457-1404A-01 AIU Online Anthony Cox 8/31/2014 Introduction Today’s business world requires network administrators to keep their systems compatible and competitive. Compatibility will keep their network systems current with today’s trends and recent developments and while there can be a certain cost expected when upgrades are implemented, it is a relatively small price to pay to remain competitive in today’s market. Questions have arisen about the current network and ways to improve the efficiency and effectiveness of our network system. The following problems have been researched and addressed in the following pages: 1. Toll charges are currently being applied to communications between Los Angeles (LA) and Miami offices 2. Network upgrade needs to be implemented to remain competitive a. Eliminate all interoffice toll charges b. No adverse effects on the Wide Area Network (WAN) c. Diagram the network layout The current network has been around for a while and is in desperate need of upgrade. It is my belief that the upgrade should begin at the local area networks (LANs) in both Miami and LA. Only by upgrading both offices equally, can we expect to achieve the efficiency which we desire. The recommended changes should be enough to lower the collective overhead and operational expenses while preparing the company for continued future growth. To implement this growth, many challenges...

Words: 645 - Pages: 3

Network Systems Administration

...Everyone loves pizza and beer and I am certainly no exception so it would have surprised no one to find me at Frank’s Pizza on an otherwise unremarkable evening in 1987, what did surprise many was what happened less than a year after this particular night. In a small town in Northern California more famous for its rich gold rush era history than any culinary notoriety in a downtown still dominated by structures from the late 1800’s is a pizza joint named Frank’s, no one remembers who gave it that name, the owner for the vast majority of my life is named William Jackson Davis and if he ever knew the titular namesake he never told me or anyone I know, but history or name aside no one I ever heard of had anything but praise for the pies that were produced there, 4 hour waits on a Friday or Saturday were not uncommon. So it was there I was headed on that portentous evening nearly thirty years ago after a back breaking week of working in construction putting drywall on houses, with a great hunger and thirst only such demanding and dusty work can produce and looking forward to nothing more than the filling and delicious pizza and ice cold refreshing beer when I noticed that the owners had hired a new waitress, a striking Green eyed beauty with a bust that would cause babies for miles around to begin salivating, now as a young single man not many years out of the Marine Corps my reaction was somewhat predictable, I hit on her like a Miner Forty-niner on a rich vein in the...

Words: 821 - Pages: 4

Network Administration Portfolio

... Internet has knocked down barriers to innovation globally. With universal access to technology, and resources innovation has accelerated substantially compared to just five years ago. For example someone in the US can build an application, and have their manager verify their progress while conducting business on another continent. Disadvantages Installing or upgrading a network can quickly become expensive depending on the customer’s requirements. Sometimes the service package helps justify the cost, but often the price displayed is for the equipment alone. When this is the case, the service package would have to be purchased separately. Networks require constant and dedicated administration. Managing a large network is complicated, requires training, and a position for a network manager usually needs to be created. If the file server breaks down the files on the file server become inaccessible from this location until either the issue is corrected, or the network settings are changed to have all systems retrieve the data, and save it to a backup server. (Email might still work if it is on a separate server.) Computers could still be used but are isolated. Viruses can spread to other computers throughout a computer network without proper security-settings and tools in place. There is a danger of hacking particularly with wide area networks (WAN). Security measures are needed to prevent such abuse, i.e., a firewall. Backups for the network will also require a...

Words: 867 - Pages: 4

Network Systems Administration

...7.1.1 Cost and manpower and materials would be enormous. 7.1.2 Signal lost would affect transmission by increasing distances. 7.1.3 UTP is used for LAN’s as well as phone lines. Coaxial cables are also useful for internet connection. 7.1.4 Satellite is a way of creating a network over long distances. WiMAX, is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. HSPA+, enhances the widely used WCDMA (UMTS) based 3G network with higher speeds for the end user. 7.1 Review 1) UTP and Coaxial cables can be used if signal enhancers are placed at correct distances. 2) WLAN’s are limited to shorter distances due to signal interference from attenuation and objects between the AP and devices. 7.2.1 Dedicated lease lines are very effective in transmission, but can be costly. 7.2.2 Full mesh topologies are good for no fault networking. Creating it can be difficult to maintain and assemble. Partial mesh is good when every computer is not important in the network. 7.2.3 Star topologies are great for small LAN’s. But, they have a high level of fault error in the system. 7.2.4 T1 uses 24 DSO channels, E1 has a speed of 2048 Mbps, E3 has 16 E1 channels, T3 has 43,736 Mbps and 28 DS1 channels. 7.2 Review 1) PPP allows their frames to flow from the customer router to the ISP router. A control protocol is used to set a standard everyone can understand. 2) LAN’s tend to have more immediate......

Words: 341 - Pages: 2

Network Security Administration

...Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or parity. The capacity of a RAID 0 volume is the sum of the capacities of the disks in the set, the same as with a spanned volume. There is no added redundancy for handling disk failures, just as with a spanned volume. Thus, failure of one disk causes the loss of the entire RAID 0 volume, with reduced possibilities of data recovery when compared to a broken spanned volume. Striping distributes the contents of files roughly equally among all disks in the set, which makes concurrent read or write operations on the multiple disks almost inevitable and results in performance improvements. The concurrent operations make the throughput of most read and write operations equal to the throughput of one disk multiplied by the number of disks. Increased throughput is the big benefit of RAID 0 versus spanned volume. (unknown, 2015) b. RAID 1 RAID 1 consists of data mirroring, without parity or striping. Data is written identically to two (or more) drives, thereby producing a "mirrored set" of drives. Thus, any read request can be serviced by any...

Words: 808 - Pages: 4

Technology and Healthcare Administration

...Technology and Healthcare Administration Warren Thomas Kaplan University HS290-01 Technology and Healthcare Administration As technology continues to improve and become more cost effective, how providers store and access their patient’s medical records has evolved. Many providers now opt for electronic records. Some providers enter information directly into their systems, having a computer station in each exam room. Other providers will hand write on paper forms and will have them coded later. This can sometimes cause delays in the update of the medical records. Each record keeping system has its own benefits and issues unique to it. For electronic records, the first benefit is a reduction of cost in record keeping. While there is an initial cost of implementing an electronic filing system, the cost of these systems will be less in the long run. Less time will be required to manage, file, and maintain the records. This time savings can allow doctors to see more patients and can even reduce the number of employees required to run a clinic. There is, however, a learning curve when using electronic records. Not only will the entire staff need to be trained when a new system is emplaced, new employees who may be veterans of the healthcare fields will need training. Even someone experienced with electronic records may have to learn a new system when changing job. Adding to the cost savings, storage space will also be reduced. Since healthcare providers are...

Words: 693 - Pages: 3

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network...

Words: 423 - Pages: 2

Network Administration

... some of the unresolved research questions. 1 T FEDERAL SUPPORT FOR GIGABIT NETWORKING The High Performance Computing and Communications Program (HPCC) is a multiagency program that supports research on advanced supercomputers, software, and networks.2 In part, these technologies are being developed to attack the “Grand Challenges”: science and engineering problems in climate change, chemistry, and other areas that can only be solved with powerful computer systems. Network research is one of four components of the HPCC program, and represents about 15 percent of the program’s annual budget of close to $1 billion.3 1 High-Perfo rmance Computing Act of 1991 (HPCA), PL 102-194, Sec. 102(a). Office of Science and Twhnology Policy (OSTP), “Grand Challenges 1993: High Perfo rmance Computing and Communications, ’ 1992. 3 Ibid., p. 28. 2 The HPCC program funds the development of new communications technologies. 2 I Advanced Network Technology Box l-A–Broadband Networks Figure l-A-l—Digital Data Computers and networks handle information as patterns of electronic or optical signals. Text pictures, sound, video, and numerical Electrical or optical signal data can then be stored on floppy disks, used “ 1 in computations, and sent from computer to ~ computer through a network In digital/computers or networks, the electronic or optical signals that represent information can take on one of Binary representation two values, such as a high or a low voltage, ,,(),, H,,, “o” “l” “o...

Words: 37290 - Pages: 150