Preview

Lan Operating Systems Scenarios

Satisfactory Essays
Open Document
Open Document
350 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lan Operating Systems Scenarios
Axia College Material
Appendix B

LAN Operating Systems Scenarios

Read the three scenarios below, then answer the questions that follow each scenario.

1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.

For this situation, I would first recommend a server, which an administrator can assign different security rights. Second, I would recommend a star topology network with a central switch. A star topology is the easiest topology to manage and add other devices. The switch is the best central device to use to segment traffic and alleviate collisions that would occur from a hub.

The components such as the nodes would connect to the switch, which would allow communication with the other nodes or devices. In addition, Ethernet cables would be needed to connect to the back of the PC or NIC card.

2. You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all of the components of this type of network.

In a peer-to-peer network, all of the devices connected to the network share each other’s resources. This is common in a LAN network that does not have a server.

3. You are the administrator of a client-server environment. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component of a typical client-server environment.

In this scenario, I would again recommend a star topology due to its manageability and scalability. In this model, one would need computers, server, cables, and operating systems. The nodes would go through the switch or router and then

You May Also Find These Documents Helpful

  • Good Essays

    It 240 Week 3 Checkpoint

    • 620 Words
    • 3 Pages

    The star topology would change to an extended star topology; I would upgrade the cables to Cat 5e or Cat 6 UTP. I would upgrade the Hubs to 1000 BaseT Switches, upgrade the 5 extra computers with 802.11n Mbps Wireless NIC, Upgrade the 10 computers with 10/100/1000 Mbps NIC, and install a 802.11n Wireless Router. I would add a server and restrict access as needed.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 273 Unit 1

    • 316 Words
    • 2 Pages

    4. Describe two hypothetical situations, one in which a peer-to-peer network would be most appropriate and one in which a client-server network would be most appropriate, and explain why the particular network type would be most appropriate for that case.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Comm

    • 501 Words
    • 3 Pages

    4. Discuss how you would add new users and groups to your server. Include a discussion of the permissions that you would need to consider in doing so.…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    A switch always broadcasts all the packets it receives to all the computers that are connected to the switch.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    Week 4 INDP NTC 362

    • 821 Words
    • 3 Pages

    There are a few requirements when building a network in order for the network to operate. There is the hardware components with the end nodes (i.e. the sending and receiving computers). The intermediate nodes that perform the data exchange (i.e. , switches, and hubs). And the telecommunication links (i.e. wired &…

    • 821 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    course study guide

    • 1397 Words
    • 6 Pages

    2. Networking is about give and take. Why is this important? What do you have to offer the members in your network?…

    • 1397 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch. 16 Solutions

    • 1258 Words
    • 6 Pages

    1. What type of network topology is used when five switches are used on a small LAN and each switch connects to multiple computers on the LAN?…

    • 1258 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab

    • 393 Words
    • 2 Pages

    To complete the Week 2 Lab Report, answer the questions below concerning the Network Design Lab Scenario found in Doc Sharing.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Patton Fuller Networking

    • 659 Words
    • 3 Pages

    These nodes are connected via a bus topology, where each node shares a single transmission medium (“Networking Topologies,” 2012 ). An Ethernet backbone connects these nodes, utilizing a CAT 6 cable transmitting 1000 BaseT (“IT Network Diagrams- Top View,” 2012).…

    • 659 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Client/ server computing – is a program that distinguishes relationship between the client and the server. The client will request a service or resource from another program and this is the server. Once the server has fulfilled the client’s request the connection is terminated. Overall a client/server computing is linking to a computer system where a central server supports a number of networked workstations.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    Since it is small peer to peer network we will be able to use this type of topology. This network is designed for a maximum of ten computers, if the lab where to exceed ten computers; the purchasing of network operation software would be needed and a new design (topology) may be necessary. A drawback to this type of topology is the fact that if the hub goes out (fails) the network will crash. On the upside however, if a node malfunctions it will not affect the rest of the network. Backing up the data for this lab will be a must in case a computer or the network itself crashes. Using an online backup will help not only keep data safe in case of a crash but also of a natural disaster or any other type of situation where data can be…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays