Local Area Network

In: Computers and Technology

Submitted By joaslol
Words 1548
Pages 7
Local Area Networks
Vorlesung Prof. Dr. Michael Tüxen

Klausurenzusammenfassung
• • • • • 2005 2006 2008 2009 2010

Keine Garantie gegen Fehler!

Inhalt
1 2 3 OSI Modell .............................................................................................................................................................................................. 4 Schichten angeben und Protokolle SMTP, TCP, IP (IP-Suite) zuordnen. ............................................................................................. 4 Grafische Darstellung der Protokolle ...................................................................................................................................................... 4 Kommunikationsarten ............................................................................................................................................................................ 4 3.1 Anycast .............................................................................................................................................................................................. 4 3.2 Unicast ............................................................................................................................................................................................... 5 3.3 Broadcast ........................................................................................................................................................................................... 5 3.4 Multicast ............................................................................................................................................................................................ 5 Ethernet…...

Similar Documents

Local Area Network

... Step by Step Guide to Setup LAN for Internet Cafe and Homes Creating a Local Area Network is very easy. You can either hire someone to do it for you or do it yourself. In both cases the guide that follows comes handy. It teaches you how setup a LAN for your home or office or Internet cafe. LAN is a network of connected computers and it can be used to organize a LAN party with your friends so you can enjoy multi-player games with them. In business it can help you share files between computers and share a single Internet connection. Other uses of LAN are sharing Internet connection with neighbours and reducing the cost for everyone in the neighbourhood. Requirements: 1) UTP Cat-5 Cables [pic] UTP Cat-5 Cables 2) RJ-45 Connectors [pic] RJ-45 Connectors 3) Crimping tool [pic] Crimping tool 4) Cable stripper [pic] Cable stripper 5) Broadband router [pic] Broadband Router 6) Switch [pic] LAN Switch 1. Choose a central location for the switch and the Broadband router 2. The cables from each outlet will reach the switch so locating the switch along with the router at the center of the network is the best option to save the cable lengths. Place the router and the switch close to each other. 3. Measure the distance of each computer from the switch. 4. Prepare cables to connect the computers with the switch. 1. Cut the required length of the cable. 2. Strip it up to 2 inches with the stripper from one end 3. Arrange the cables......

Words: 924 - Pages: 4

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link......

Words: 572 - Pages: 3

Contrasting Web Browsers and Local-Area Networks

...Browsers and Local-Area Networks Using Quaketail T. Lam Abstract Many electrical engineers would agree that, had it not been for virtual machines, the practical unification of Scheme and semaphores might never have occurred. After years of confirmed research into 802.11 mesh networks, we disconfirm the visualization of SMPs. In our research we verify that operating systems and access points are mostly incompatible. Quaketail is not able to be visualized to manage lambda calculus. The shortcoming of this type of approach, however, is that linked lists and Web services are never incompatible. We emphasize that Quaketail turns the encrypted archetypes sledgehammer into a scalpel. The effect on steganography of this has been adamantly opposed. Combined with metamorphic modalities, it harnesses a Bayesian tool for synthesizing redundancy. Leading analysts continuously analyze the refinement of Internet QoS in the place of redundancy [16] [16]. The shortcoming of this 1 Introduction type of solution, however, is that Byzantine fault tolerance can be made low-energy, cerDistributed configurations and IPv6 have tifiable, and scalable [30, 24]. We emphasize garnered tremendous interest from both in- that our heuristic is NP-complete. Clearly, formation theorists and information theorists Quaketail harnesses 802.11 mesh networks. in the last several years. We emphasize that Here, we make two main contributions. our algorithm simulates the construction of wide-area networks, without......

Words: 2613 - Pages: 11

Fundamentals of Local Area Network

...another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices. a. Describe what network device or devices are recommended for purpose for the given home network scenario(s). For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables. b. Explain the recommendations justifying why these would suit the needs for the network The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An advantage of having a wireless router is that it provides more safety, compared to connecting your broadband directly to your computer, because your computer's local IP addresses aren’t visible to the Internet, which......

Words: 1210 - Pages: 5

Voice over Wireless Local Area Network

...Voice over Wireless Local Area Network In this week’s report I will be discussing how voice traffic is went over a typical wireless local network. I will also provide information on what the advantages to using a wireless network, the problems associated with using a wireless network and what are the best solutions in overcoming these issues. A Wireless Voice network or VoWLAN (Voice over WLAN) is how we send digital voice traffic over a wireless broadband network. The type of wireless set up is basically VoIP sent over a WiFi Access Point. Within the industry this type of VoIP set up is call VoWLAN or WiFi VoIP because it uses the standards set for transporting data by the IEEE 802.11 for wireless technology. In order to use this technology we have to use a VoWLAN enabled device; the most common device on the main stream market is the PDA. There are other devices available like the WiFi handset which looks like a cell phone, but it allows voice data packets sent over the network rather than the normal analog voice signal. One of the other major enterprise level devices is not a device at all. It is software based and is loaded on to a workstation or laptop. This type of software is call softphone. It is a virtual phone that routes call through the WLAN AP to the VoIP gateway or IP PBX. There are some advantages and disadvantages to using this type of technology. One of the major advantages is cost a majority of user have WiFi hotspot available in order to stay connected.......

Words: 661 - Pages: 3

Issc340 - Lesson 1 Review: Overview of Local Area Networks

...1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components of a LAN are the network’s physical topology and how the nodes are connected; the access method and how the nodes access the transmission medium; the transmission technique and how the information passes through the network; the transmission media showing if it is wired or wireless; the use of specific protocols defining how the computers communicate; and the LAN’s inter connectivity such as how the LAN shares information with other networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system is an operating system that manages network resources and enables the provision of services to clients. It consists of two components: A server and a client. The server is the most complex of the two. Its duties consist of managing multiple users on a network, provide access to file and print servers, provide services like internet access, and implement network security. An example of a server network operating system is Windows 2000, UNIX, and Linux. The client runs on a client machine. It allows the client to have access to the network and see storage locations as if they were on the client......

Words: 268 - Pages: 2

Submission to Local Network Cib

...ASSESMENT 2 – Report By Brenda Widjaja Lala Director, Corporate Communications South Africa HSBC Mandela Rhodes Place Cnr Wale Burg Street Cape Town South Africa April 23, 2012 Mrs. Grace Executive of the Local Network 3rd Floor, MPF House 32 Princess of Wales Terrace Sunnyside Office Park Park town Dear Mrs. Anne Marie Gutierrez, Executive of the Local Network Submission to Johannesburg the Local Network of South Africa This proposal is presented to the local network of South Africa in order to against human rights and environment cases. According to the United Global Compact, HSBC strives to encourage the changes of human rights and environmental cases to the better side. HSBC is supporting to the first of ten principles which is “Business should support and respect the protection of internationally proclaimed human rights” and also the eighth principles which says that “Business should undertake initiative to promote greater environmental responsibility” (Ten Principles 2012). In 2007, HSBC has encouraged the changes in the environmental cases by cooperating with First Direct, they plant for more than 20.000 trees in each country (First direct 2010). They also encourage their customers to switch to use online banking. More than one million of HSBC and First Direct customers switch to use online banking. On the other hand, there is a risk of doing this system. More than 3.1 million customers are left from the HSBC members (Espiner 2006).......

Words: 1350 - Pages: 6

Issc 340: Local Area Network Technologies

...Case Study 2 January 24, 2013 ISSC 340: Local Area Network Technologies American Military University   This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance. First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high......

Words: 1522 - Pages: 7

Auditing Local Area Network

...NIST The purpose of this publication is to provide organizations with recommendations for improving the Security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified wireless networks and unclassified facilities within range of unclassified wireless networks. This publication supplements other NIST publications by consolidating and strengthening their key recommendations, and it points readers to the appropriate NIST publications for additional information (see Appendix C for the full list of references and Appendix A for a list of major security controls relevant for WLAN security). This publication does not eliminate the need to follow recommendations in other NIST publications, such as [SP800-48] and [SP800-97]. If there is a conflict between recommendations in this publication and another NIST wireless publication, the recommendation in this publication takes precedence. NIST Special Publication 800-53 is part of the Special Publication 800-series that reports on the Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and on ITL’s activity with industry, government, and academic organizations. Specifically, NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection for federal information systems in......

Words: 1201 - Pages: 5

Netw 561 You Decide Week 5 Wireless Local Area Networks Keller as

...NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS Click Link Below To Buy: http://hwcampus.com/shop/netw-561-you-decide-week-5-wireless-local-area-networks-keller-as/ Or Visit www.hwcampus.com NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS GenMax is a large package delivery service company. While the company was once an industry leader with more than 30% market share, you now see that lead declining to 27% and continuing to slide. Your nearest competitor has gained ground and is now at 25% market share. The CEA has asked you to develop a strategy to regain market share and industry leadership. You have decided on the strategy of installing a real-time tracking system on the trucks, so that drivers can report the exact moment when a package is picked up and delivered. This information can then be made available to end-users through the website. The GenMax IT department has already selected the application that will be used for this project. The application is called ALLTRACK and is provided by an outside third-party supplier. Your team will pick a wireless transport technology and a wireless carrier to run the application…. Preview: The U.S. is served by a number of wireless telecommunication carriers among them being Sprint/Nextel, Verizon Wireless, Cingular, and T-Mobile. Verizon is the largest wireless operator in the U.S and it also has a strongest balance sheet resell (Sarkar, Cavusgil & Aulakh, 1999). AT&T is the......

Words: 262 - Pages: 2

Netw 561 You Decide Week 5 Wireless Local Area Networks Keller as

...NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS Click Link Below To Buy: http://hwcampus.com/shop/netw-561-you-decide-week-5-wireless-local-area-networks-keller-as/ Or Visit www.hwcampus.com NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS GenMax is a large package delivery service company. While the company was once an industry leader with more than 30% market share, you now see that lead declining to 27% and continuing to slide. Your nearest competitor has gained ground and is now at 25% market share. The CEA has asked you to develop a strategy to regain market share and industry leadership. You have decided on the strategy of installing a real-time tracking system on the trucks, so that drivers can report the exact moment when a package is picked up and delivered. This information can then be made available to end-users through the website. The GenMax IT department has already selected the application that will be used for this project. The application is called ALLTRACK and is provided by an outside third-party supplier. Your team will pick a wireless transport technology and a wireless carrier to run the application…. Preview: The U.S. is served by a number of wireless telecommunication carriers among them being Sprint/Nextel, Verizon Wireless, Cingular, and T-Mobile. Verizon is the largest wireless operator in the U.S and it also has a strongest balance sheet resell (Sarkar, Cavusgil & Aulakh, 1999). AT&T is the......

Words: 262 - Pages: 2

Netw 561 You Decide Week 5 Wireless Local Area Networks Keller as

...NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS Click Link Below To Buy: http://hwcampus.com/shop/netw-561-you-decide-week-5-wireless-local-area-networks-keller-as/ Or Visit www.hwcampus.com NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS GenMax is a large package delivery service company. While the company was once an industry leader with more than 30% market share, you now see that lead declining to 27% and continuing to slide. Your nearest competitor has gained ground and is now at 25% market share. The CEA has asked you to develop a strategy to regain market share and industry leadership. You have decided on the strategy of installing a real-time tracking system on the trucks, so that drivers can report the exact moment when a package is picked up and delivered. This information can then be made available to end-users through the website. The GenMax IT department has already selected the application that will be used for this project. The application is called ALLTRACK and is provided by an outside third-party supplier. Your team will pick a wireless transport technology and a wireless carrier to run the application…. Preview: The U.S. is served by a number of wireless telecommunication carriers among them being Sprint/Nextel, Verizon Wireless, Cingular, and T-Mobile. Verizon is the largest wireless operator in the U.S and it also has a strongest balance sheet resell (Sarkar, Cavusgil & Aulakh, 1999). AT&T is the......

Words: 262 - Pages: 2

Netw 561 You Decide Week 5 Wireless Local Area Networks Keller as

...NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS Click Link Below To Buy: http://hwcampus.com/shop/netw-561-you-decide-week-5-wireless-local-area-networks-keller-as/ Or Visit www.hwcampus.com NETW 561 You Decide Week 5 Wireless Local Area Networks Keller AS GenMax is a large package delivery service company. While the company was once an industry leader with more than 30% market share, you now see that lead declining to 27% and continuing to slide. Your nearest competitor has gained ground and is now at 25% market share. The CEA has asked you to develop a strategy to regain market share and industry leadership. You have decided on the strategy of installing a real-time tracking system on the trucks, so that drivers can report the exact moment when a package is picked up and delivered. This information can then be made available to end-users through the website. The GenMax IT department has already selected the application that will be used for this project. The application is called ALLTRACK and is provided by an outside third-party supplier. Your team will pick a wireless transport technology and a wireless carrier to run the application…. Preview: The U.S. is served by a number of wireless telecommunication carriers among them being Sprint/Nextel, Verizon Wireless, Cingular, and T-Mobile. Verizon is the largest wireless operator in the U.S and it also has a strongest balance sheet resell (Sarkar, Cavusgil & Aulakh, 1999). AT&T is the......

Words: 262 - Pages: 2

Netw 561 Week 5 You Decide Wireless Local Area Networks

...NETW 561 Week 5 You Decide Wireless Local Area Networks Purchase here http://chosecourses.com/index.php?route=product/product&path=537&product_id=1615 Product Description NETW 561 Week 5 You Decide Wireless Local Area Networks GenMax is a large package delivery service company. While the company was once an industry leader with more than 30% market share, you now see that lead declining to 27% and continuing to slide. Your nearest competitor has gained ground and is now at 25% market share. The CEA has asked you to develop a strategy to regain market share and industry leadership. You have decided on the strategy of installing a real-time tracking system on the trucks, so that drivers can report the exact moment when a package is picked up and delivered. This information can then be made available to end-users through the website. The GenMax IT department has already selected the application that will be used for this project. The application is called ALLTRACK and is provided by an outside third-party supplier. Your team will pick a wireless transport technology and a wireless carrier to run the application…. NETW 561 Week 5 You Decide Wireless Local Area Networks Purchase here http://chosecourses.com/index.php?route=product/product&path=537&product_id=1615 Product Description NETW 561 Week 5 You Decide Wireless Local Area Networks GenMax is a large package delivery service company. While the company was once an industry leader with more than...

Words: 2281 - Pages: 10

Local and Wide Area Networks

...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the......

Words: 1253 - Pages: 6