Preview

Lan Operating Systems Scenarios

Satisfactory Essays
Open Document
Open Document
350 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lan Operating Systems Scenarios
Axia College Material
Appendix B

LAN Operating Systems Scenarios

Read the three scenarios below, then answer the questions that follow each scenario.

1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.

For this situation, I would first recommend a server, which an administrator can assign different security rights. Second, I would recommend a star topology network with a central switch. A star topology is the easiest topology to manage and add other devices. The switch is the best central device to use to segment traffic and alleviate collisions that would occur from a hub.

The components such as the nodes would connect to the switch, which would allow communication with the other nodes or devices. In addition, Ethernet cables would be needed to connect to the back of the PC or NIC card.

2. You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all of the components of this type of network.

In a peer-to-peer network, all of the devices connected to the network share each other’s resources. This is common in a LAN network that does not have a server.

3. You are the administrator of a client-server environment. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component of a typical client-server environment.

In this scenario, I would again recommend a star topology due to its manageability and scalability. In this model, one would need computers, server, cables, and operating systems. The nodes would go through the switch or router and then

You May Also Find These Documents Helpful

  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    A network is defined as computer components such as hardware, assorted cables, and fiber optics, networking equipment used to link a company’s computers so that they can assign files, printers, software, and additional computer-related assets across short and long distances.…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    B. PC and switch. C. Router and hub D. Wireless access point (Ethernet port) and switch.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    2. For the Network you would consider routers for distribution of packets, bridges for physical connections of routers, switches for direct connections and the cabling for the connections and other sorts of informational distribution. Patch Panel connections.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    Since it is small peer to peer network we will be able to use this type of topology. This network is designed for a maximum of ten computers, if the lab where to exceed ten computers; the purchasing of network operation software would be needed and a new design (topology) may be necessary. A drawback to this type of topology is the fact that if the hub goes out (fails) the network will crash. On the upside however, if a node malfunctions it will not affect the rest of the network. Backing up the data for this lab will be a must in case a computer or the network itself crashes. Using an online backup will help not only keep data safe in case of a crash but also of a natural disaster or any other type of situation where data can be…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    You are the administrator of a client-server environment. What kind of network would you install and how would the pieces and components of this…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab

    • 393 Words
    • 2 Pages

    To complete the Week 2 Lab Report, answer the questions below concerning the Network Design Lab Scenario found in Doc Sharing.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Comm

    • 501 Words
    • 3 Pages

    4. Discuss how you would add new users and groups to your server. Include a discussion of the permissions that you would need to consider in doing so.…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    NT1210 Introduction to Networking Unit 2: Chapter 2, Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises. …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    course study guide

    • 1397 Words
    • 6 Pages

    2. Networking is about give and take. Why is this important? What do you have to offer the members in your network?…

    • 1397 Words
    • 6 Pages
    Satisfactory Essays