Preview

Unit 6 Assignment 2- Welcome to Network Protocols

Better Essays
Open Document
Open Document
925 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 6 Assignment 2- Welcome to Network Protocols
Welcome to Network Protocols

Kaplan University

True or False: Remote Desktop relies on SLIP.

True or False: Broadband cable relies on the PSTN for transmission medium.

The 802.11 standard specifies a frame type at the MAC sub layer.

GEOSYNCHRONOUS orbiting satellites are the type used by the most popular satellite Internet access service providers.

The WIRELESS SPECTRUM is a continuum of the electromagnetic waves used for data and voice communication.

2. For the client situation described in Discussion Topic 1, use Microsoft Visio 2007 to generate a diagram for a proposed network design. Write a 1-2 page proposal for the research group explaining why that design would best meet their needs.

For this question I would have to go with the WLAN Star topology, the main reason for using the WLAN is for your wireless users to be able to connect to the network via an access point. Other reasons for using a WLAN, you would be able to have the ability to have the pc’s connected via CAT 5 still connect to the network. Security is a big issue for your company, the purpose of that would use the WPA, IDS/IPS, proxy servers, packet filtering firewalls that are locked a room like we have in Amazon, it’s a secure badge and pin combination room called out MDF room that is always cool with 2 cooling systems in there it have limited access to only IT personal. With the following security measure and the knowledge I have obtained up this point in these current and previous classes and working for Amazon, this would be a great way to have a fully secured network. With having WPA it will provide a strong data that will allow only authorized users to be able to access the wireless network. Like in the Visio diagram, the IDS/IPS with both enable the network to find anyone that tries to log into the network and allow to quarantine any hackers, like at Amazon we have the software Tanium to cover that. With having the firewalls and packet filters will examine the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    2007 to generate a diagram for a proposed network topology. Write a 1-2 page proposal for…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Chapter 7

    • 2209 Words
    • 9 Pages

    8. A satellite that rotates around the equator 22, 300 mi from the earth is said to be in geosynchronous or geostationary orbit.…

    • 2209 Words
    • 9 Pages
    Good Essays
  • Good Essays

    When running any type of network you need to have security in place to keep threats out. I would like to start with the WLAN by using a WPA2 which will encrypt the network with a 256 bit key that would be required to log into the network. Risk of running a WLAN is higher because of the threats of hackers that may try to crack the system. This is why using a WPA2 is better because of the long key lengths to improve security. Employees of Kudler fine Foods should not be given the…

    • 502 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    Construct a diagram of the most effective structure for the organization's WAN connections and justify your choices.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    For a business setting up a WLAN security is very important and should be top priority. If you do not secure your WLAN you are opening your business up to hackers that can ruin your business. Before you set up the WLAN a site survey should be done. This will determine what level of exposure your company is at and help decide how much security is needed.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Radio waves offer another benefit to the wireless system in addition to their range. With radio signals it is possible for multiple carriers to exist in the same space at the same time without interfering with each other. The key to making this possible is variation of frequencies. As long as concurrent frequencies are no…

    • 920 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IPv4/IPv6 Transition Mechanisms- It will be a long transition between IPv4/IPV6 Internet today. A system for promising smooth, stepwise and free switch to IPv6 administrations is vital. Such a factor must help the reliable combination of IPv4 and IPv6 hubs within the move time frame. IETF has made the Ngtrans Group to encourage the smooth change from IPv4 to IPv6 administrations. The diverse move methods can be lengthily subdivided into three modules, including double stack, burrowing and understanding systems.…

    • 1621 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    protocol paper 1

    • 831 Words
    • 4 Pages

    Recall: In "The problem of evil," James Rachels and Stuart Rachels provider some important point: 1) Pain is not body’s warning system needed, because newborn babies did not deserve inexorable pain; 2) Even If we need evil to appreciate the good, but it is does not explain why there is such an extraordinary amount of evil in this world; 3) The doctrine of original sin was absurd. According to authors, it would be come to a conclusion that a newborn baby did deserve terrible disease. 4) The idea that Free Will Defense is in apparent contradiction to the natural evil in the world. 5) Based on the idea that a world without suffering would be void of the virtues necessary for good moral development. It does not explain the reason that God allowed the Holocaust or isolated cases of extreme cruelty to happen. 6) The theory of moral development does not explain the reason why animals suffering.…

    • 831 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You are allowed ten minutes extra reading time during which you are not to write.…

    • 1887 Words
    • 8 Pages
    Good Essays
  • Good Essays

    protocols

    • 1257 Words
    • 6 Pages

    Vehicular Ad Hoc Networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between non-revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables non-revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient.…

    • 1257 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Internet Protocol

    • 461 Words
    • 2 Pages

    The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internet work using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.…

    • 461 Words
    • 2 Pages
    Satisfactory Essays