Itm Lan, Man, Wan

In: Computers and Technology

Submitted By prafull
Words 301
Pages 2
2nd slide
Defintion : Computer Network means a collection of interconnected Computer or devices
Different types of networks – Major LAN ,WAN, MAN , also can, ban,pan
3rd slide- application- staright forward
4TH SLIDE
TOPOLOGY DEFINITION- A TOPOLOGY REPRESENT THE RELATIONSHIP OF ALL THE LINKS & DEVICES.
MESH TOPOLOGY- EVERY DEVICE IS CONNECTED TO EVERY OTHER DEVICE VIA DEDICATED POINT TO POINT LINK
STAR TOPLOGY- STAR TOPOLGY CONSISTS OF A HUB.ALL THE DEVICES ARE CONNECTED TO THIS HUB.THE DEVICES ARE NOT CONNECTED TO EACH OTHER.
BUS TOPOLOGY- ALL DEVICES ARE CONNECTED TO THE LONG CABLE(BACKBONE) USING DROPLINES & TAPS.
RING TOPOLGY-EACH DEVICE IS CONNECTED TO THE NEXT DEVICE;WITH THE LAST DEVICE CONNECTED BACK TO THE FIRST DEVICE.

5th slide
Lan-
* Definition-Computer network that interconnects computers in a limited area (for details refer wiki) * Characteristics- higher data-transfer rates(SPEED), smaller geographic area, and minimum need for leased telecommunication lines. * Technology -Previously ARCNET, Token Ring were used..At present Wifi, Ethernet are being used. * Application- home, school, computer laboratory

6th slide
Advantages- straight forward

7th slide
MAN-
* Defintion- A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology. * Characteristic- Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, lower speed than lan. * Technology -High-capacity backbone technology, such as fiber-optical links * Applications- Connect lan to various wider area networks like the internet, cable television.

8th slide-
Wan-
* Definition-A private or public telecommunication network that links network or regional or national boundaries. * Technology- Leased Line, Circuit switching,…...

Similar Documents

Wan 1

...IT 320 WAN Homework Unit 1 Vocabulary Exercise: Matching (Pg 3) Matching a) When referring to clocking, the CSU/DSU is this piece of equipment Data Circuit Terminating Equipment (DTE) b) The software used by a router Cisco IOS c) Dialup and ISDN are examples of these types of networks Circuit Switching d) Describes the timing between the router and the CSU/DSU Synchronous e) Lost when a device is powered down or rebooted Contents of RAM f) Wires or other media through which data is transmitted from one place to another Serial Link g) Connects LANs to WANs Interface h) The physical connection point on networking devices where signals enter and exit Router i) A smaller, more compact physical connection physical interface specification Smart serial interface j) A WAN link contracted for use by the customer Leased Line k) Frame relay and ATM are examples of these types of networks Packet Switching l) When referring to clocking the customer’s router , this piece of equipment is used Data Terminal Equipment (DTE) m) A communications link that is outside the normal IP network, like a console cable or a phone call between two modems and the aux port. Out of Band Management n) A network that spans a large geographic region WAN o) A telecommunications path that sends 1 bit at a time Serial Interface p) The router port that connects a WAN link Bus ...

Words: 320 - Pages: 2

Lans and Wans

...hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to......

Words: 1327 - Pages: 6

Define a Lan-to-Wan, Internet, and Web Surfing Aup That Restricts Usage of the Company’s Internet Connection and Permits the Company to Monitor Usage of the Corporate Internet Connection.

...responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain is the access of LAN to Wan, web surfing, and internet. LAN to Wan is the activities between LAN to Wan and firewalls, routers, intrusion, detection, and workstations. Web surfing determines what a user can do on company time with company resources. Internet is when the user has access to the internet what types of controls should the organization have on the certain internet sites being accessed. Although they all sort of are the same they are very much different (Cordero, 2013). For the Lan to Wan AUP will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations that have databases with sensitive information may also require a criminal background check before granting access. This all prevents risks, threats, and vulnerability that could compromise an organization’s system, applications, and/or data. Lan and Wan AUP helps in preventing users from destroying the firewalls and protection programs from leaking sensitive......

Words: 771 - Pages: 4

Wan 3g

...Wan | Ancho de Banda, 3G | | Profesor: Ismael Silva Dzib | | Sergio Eduardo Marín Rodríguez | 09/04/2013 | | Servicios de Banda ancha y 3G “Any place, Every where” When wideband speech refers to a system for Internet connection and data transmission. Currently, broadband is one of the best options to enjoy as a data rate much higher than what happens with access via dial-up. In addition, broadband also maintains a permanent Internet access without interrupting the telephone line and resorting to external modems. Cuando hablamos de ancho de banda nos referimos a la velocidad y capacidad de la transmisión de datos en una red. Dicho dato depende tanto del tipo de estructura que presenta la red como los dispositivos que soportan y emiten la señal. En el mercado existen varias tarifas, fijas las cuales brindan un servicio básico, limitado, y las dial up o Premium, las cuales ofrecen una conexión más rápida y estable a cierta red. El funcionamiento  de la banda ancha se basa en la utilización de tecnologías DSL y de cable módems. Sin embargo, en la actualidad, la tecnología WiFi, que no necesita cableado, está creciendo más y más, especialmente para suplir a aquellos usuarios que viven en áreas sin las tecnologías o capacidades necesarias para establecer complejos sistemas de cable módem. La fibra óptica, el material utilizado para la transmisión de datos en banda ancha, ha demostrado ser mucho más eficiente que el cobre y mucho más eficaz en......

Words: 1668 - Pages: 7

Virtual Lan

...telecommunications infrastructure, while also allowing a greatly simplified means of aggregating packetized data from many customers into the provider’s access and metro networks. The RPR fairness protocol and algorithm insures fair medium access among an RPR’s users. RPR also provides the high reliability that has become increasingly important for enterprise network users. This paper reviews the key aspects of RPR, including medium access control and its fairness mechanism, physical layer options, protection/restoration options, and bridging and routing within and across an RPR. INTRODUCTION The increasing importance and bandwidth demands of enterprise networks in the 1990s generated the desire for a new metropolitan area network (MAN) and wide area network (WAN) protocol. From a data network perspective, the existing protocols lacked a fast, simple Layer 1 mechanism to recover from network faults. From a telecommunications network perspective, it was critical to have a network access technique that would allow maximum re-use of the existing SONET/SDH network infrastructure. These needs were the primary drivers behind the development of the Resilient Packet Ring (RPR) protocol in IEEE 802.17, which has recently been approved as a standard [1]. A ring topology was chosen in order to meet the need for robustness with fast recovery from network faults. The topology consists of two fiber-optic rings in which data is transmitted in opposite directions on the two rings.......

Words: 7303 - Pages: 30

Lan, Man and Wan

...LAN, MAN and WAN Student Name University Network Telecommunication Professor Name October 21, 2013 LAN, MAN and WAN Computer networking is simply the communication between two or more computers that allow them to share information and hardware resources. This is really one of the most important contributions to the information age since personal computers were invented. The connection and communication of just two computers exchanging data and devices is the most fundamental of networking. The computer systems may communicate over a computer network and share their resources (Computer Network, 2009). A computer network can be wire and or wireless. When a network is wired, it uses cables to connect group of computers together to enable data communication. Wireless networks allow computers to communicate by using radio signals, so the computers aren't restricted by physical cables (Lowe, 2011). For example, it uses bluetooth, infrared rays and radio waves to send and receive signals over the network. Peer-to-peer (p2p) and client-server are the two computer networks in use today. In a p2p network, every computer has the same or equal capabilities and responsibilities. And with a client server it is nothing like peer-to-peer, some computers are the clients that request for resources and the servers make available the requested resources. There are many categories of computer networking, but the most common are local area network (LAN), metropolitan area......

Words: 1265 - Pages: 6

Lan - to - Wan Domain

...Michael Bearcroft Week 4 Lab 2 Part 1 Introduction The LAN-to-WAN Domain provides Internet access for the entire organization and acts as the entry/exit point for the wide area network (WAN). This domain is where all data travels into and out of the IT infrastructure. There are many threats and risks here, as the attack could come from inside the network or it could be trying to get into the network. Threats With this domain as the buffer between two other domains it gets the majority of the traffic through it. Some of the treats, risks, and vulnerabilities are as follows. Threats from people, this could be misconfigured equipment, equipment not being used correctly, unauthorized use, use of personally owned software/hardware. There are also viruses, Trojans, and network worms that can inflict damage on the network. Some of the physical threats are fire, water, electrical disturbances, and hardware failures. Mitigation Here is some of the ways in which the threats to the domain can be mitigated. Security training for the employees, so they will know what to do in specific scenarios. Security training is mandated by the Computer Security Act of 1987, so it’s not just a good idea but a requirement. Strict personnel screening by the HR department will also screen out any personnel that could cause issues in the future. User Identification and authentication is another way to keep the LAN – to – WAN domain safe. Another important safeguard is encryption, if the......

Words: 904 - Pages: 4

Lan, Man and Wan Network Topologies

...network topologies, but the three most common types are LANs, MANs, and WANs. The LAN topology is probably the most common of the three. The MAN and WAN topologies are used but not nearly as much as the LAN topology is, although the WAN is starting to be used more and more because of the growing population of networks. The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN's in them for certain purposes. When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization. A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically a dispersed collection of LAN's.......

Words: 522 - Pages: 3

Acceptable Use Policy for Wan/Lan Access

...Acceptable Use Policy (AUP) for use of WAN/LAN owned and maintained by Richman Investments Statement of Policy: The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and other authorized individuals who are granted access to any Local Area Network and/or Wide Area Network or other service maintained and provided by Richman Investments or its subsidiaries. It is expected that all departments will enforce these policies. ANY USER FOUND VIOLATING THESE POLICIES OR PROCEDURES WILL FACE PUNISHMENT WHICH MAY INCLUDE DISCIPLINARY ACTION, SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION. Users of the any Local Area Network and/or Wide Area Network owned and maintained by Richman Investments understand they are subject to monitoring by the Information Technology department in order to maintain systems security and prevent unauthorized access and usage of equipment. Richman Investments assumes no responsibility for actions performed by users which violate any laws, foreign or domestic. If discovered, these users will be reported to the proper authorities for prosecution. Prohibited Use of Equipment or System: * No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers * No exporting internal software or technical material in violation of export control laws * No accessing unauthorized internal resources or information from external sources * No......

Words: 339 - Pages: 2

Lan/Wan

...to pull necessary files. For the phone system we will use VOIP phones to allow all locations to be connected on the same system to allow call transfer. We will then use Barracuda systems for security and backups. We will then use Active directory, to create group policies and add restrictions per site. The 5 main sites will have Servers that will allow additional locations to connect through VPN. Each server will being using barracuda security along with backup systems to secure information. Barracuda will provide Email security Web security Network security Web application security data protection and file sync & share, Barracuda will also provide VOIP services. Our international will be connected WAN to WAN and the locations will be connected LAN to WAN to LAN. We will be using a layered network for when changed are made to the network it does not change all layers but will change the one layer that is to be changed. We will have access layer which connects end users to the network this will be achieved by using a hub to which PCs will be connected. The distribution routing is going to connect to our multiple properties from our central company. We will also be using Scalability which is we can add users and give them additional access layers without having to replace al the distribution and core devices at the same time. It’s much easier to add extended functionality one later at a time as needed instead of all at once. This will be cost efficient......

Words: 565 - Pages: 3

Lan Lan Lan Aland

...LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. 1.2. I would install a client/server network on a local area network (LAN). Every computer connected to the network would have a network interface card (NIC) and through the use of Ethernet cables, connect to the company server. Users would be able to store files and share company resources through the server. Implementing a Windows based operating system on the server will allow for the network administrator to assign different security rights and privileges to different users. I think that for this particular situation I would set up an extended star network. I would choose this one because the business is relatively small and plans to grow, this type of network setup is very easy to add users onto and also still provides the access restriction needed for lower level employees and the ease of access for higher level employees without them being able to see what the other is able to access. “As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle...

Words: 583 - Pages: 3

Lan / Wan Research Project

...LAN / WAN Research Project 1) You have just begun working as a networking consultant with MTI Technologies Inc. One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office in the city of Chicago. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance? I would inform them that they might have a NIC card that is not capable of 100baseT, this would make all the other NIC cards run on 10baseT regardless of it’s capability. I would suggest that they purchase a new NIC card and I would inform them that they need to update their drivers whenever they do upgrades. 2) The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is now running more smoothly. However, they have realized that their Internet connection is too slow. They have been using a dial-up BRI ISDN connection. They want to spend no more than $250 per month on an Internet connection (not including installation fees). They also need a......

Words: 583 - Pages: 3

Wan Structure

...each of the provided locations, and then connecting all the offices together in an effective Wide Area Network (WAN) Design. The network design will include both voice and data sharing. Microsoft Project will be used as a tool to organize and manage the complete project, and it will include budget and schedule. We also must remember that the main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo, with Corporate Headquarters lodged in San Francisco. The remaining offices are used as sales offices. Consider the company to operate on a 24 hours a day and 7 days a week basis, because it is global. It has been said, that with the advent of globalization, WAN has become a major artery for communication between remote offices and customers in any corner of the globe. Additionally, with data center consolidation, applications are moving to centralized data centers and clouds. We can also take advantage of virtualization within the centralized data center. WAN plays an even more critical role, because ABC survival is dependent on the availability and performance of the network. In the past reliable connectively was predicated upon performance with the utilization of private WAN using Multiprotocol Label Switching (MPLS) or leased line service. This norm is very expensive and the least cost effective for ABC. It was basically impossible to have WAN transport in order to support growing bandwidth requirements for remote-site connectivity. ABC needed another......

Words: 1405 - Pages: 6

Lan Wan

...Local are networks (LAN) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. Has a High speed (1000 mbps) Tends to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs tend to have fewer problems associated with them, as there are smaller numbers of systems to deal with. Wide area network (WAN) is a computer network that covers a broad area. It does have slower speeds of about 150 mbps. WANs tend to use technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances Differences between (LAN) & (WAN) (LAN) is typically owned and managed by a single company or organization. LAN also experiences fewer data transmission errors and overall fewer problems as a whole as opposed to WAN. WAN has a high cost maintenance and lower bandwidth. In conclusion the major differences are going to be cost, efficiency and coverage Describe common physical topologies and a logical topology : Physical topology refers to how the network is wired it can be either a ring topology where all the hosts are connected together or a bus topology where there is a network medium and each host connects to that medium by wire. A logical topology in the other hand governs how the network is going to work. For example all the hosts in the network are connected through a central connecting point that’s the physical topology however the way the protocols and hardware are designed to......

Words: 273 - Pages: 2

Lan/Wan Networking Project

...Consultant at MTI Technologies Inc (800) XXX – XXXX Ext – 5555 2. The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is running more smoothly. However, they have now realized that their Internet connection is too slow. They have been using a dial-up BRI ISDN connection. They want to spend no more than $200 per month on an Internet connection (not including installation fees). They also need a transmission method with fairly good security and a guarantee of adequate throughput during the daytime hours. What solution can you recommend that will offer them the most throughput at this cost? As you see in this type of situation they are dealing with a LAN a local area network and of course they do not really need anything that is incredibly expensive. The first thing that they want to do is simply get a Router from a telephone company and of course a switch that has about 4 to 5 ports in this case would be super great. After this, they will be easily on the Internet running at great speeds (Please do not forget upgrade your driver cards!!!!!!) ------------------------------------------------- The Internet connection you have selected for the tax preparation firm is working well. Recently, however, they have learned that their firm will be merging with another firm across town (right here in NYC). They need a way to connect the two offices. They have heard about using data lines to......

Words: 681 - Pages: 3