Appendix B Lan Operating Systems Scenarios

Only available on StudyMode
  • Download(s) : 282
  • Published : June 12, 2011
Open Document
Text Preview
Axia College Material
Appendix B

LAN Operating Systems Scenarios

Read the three scenarios below, then answer the questions that follow each scenario.

1.You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.

2.You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all of the components of this type of network.

3.You are the administrator of a client-server environment. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component of a typical client-server environment.

1)The network that I would install is a LAN network. With this network I would have an Operating System, Computers, Ethernet cables, Server, Hub, Printers and Network Adaptors. I will have a server which will be my central computer for all the data. The Hub will be connected to the Server which is where all the Ethernet cables from all the computers will be connected so that everyone has access to the internet as well as to the Operating System. The Network Adaptors will be hooked to all the computers in order to plug the Ethernet cables to all the computers. The computer will have the network adaptor connected and to it will be connected an Ethernet cable. The other end of the Ethernet cable will connect to the hub and then the hub will be connected to another network adaptor which is connected to another Ethernet cable which runs to the server. By having the network set up this way server will be able to set up who has access to what things on their computer by setting levels of security on each...
tracking img