ACIT 2620 – Principles of Enterprise Networking
Lab 5
Name __________________________________________________ Set _____
Perform the following tasks on the lab computers, by yourself and answer the following questions. Marks will be taken off for answers that are copied down from the internet or software when the question states “in your own words”.
1. SLAs. Find and include here an SLA for Telus, Shaw, or another ISP. What guarantees do they make? 2. Using Visio, create the following wired LANs with 9 workstations, 2 servers, and 2 printers (adding in the switches that you need) a. Bus
b. Star
c. Extended Star/Hierarchy
3. Using Visio, create a LAN for the following machines (include any switches, routers, or wireless access points that you may need) d. A home network with 3 wireless devices, 1 server, 2 desktops (in one room), e. What topology(s) did you use? f. Include the diagram HERE g. Explain in a paragraph (in the document) why you made the design decisions that you did. 4. Using Visio, create a LAN for the following machines (include any switches, routers, or wireless access points that you may need) h. An office network with 4 stories, a server room with 6 servers, 20 machines on the top floor (one in 10 offices, and 10 in the main room), 100 machines on the second and third floors, 50 machines on the first floor, all floors should be able to serve the same number of wireless devices as machines. Also, there is a printer on each floor. i. What topology(s) did you use? j. Include the diagram HERE. k. Explain in a paragraph (in the document) why you made the design decisions that you did. 5. Cost analysis (2 points) l. Create a spreadsheet that includes the costs that would be incurred by
social networking websites, chat rooms and blogs. What this shows is that we are living in the digital age were 70 percent of us need to be able to access information from the web. Now we now that there was 1.2 billion user of the rail network and we also now that more then half of the UK adult population use internet daily. We therefore argue the point that more then half of the rail network users use internet which means more then 600 million users of the rail network are internet users. Another…
• IT-241 • WEEK 7 POWER POINT • 12-14-2014 PUBLIC P O H S K R WO G N I S S U DISC ALL 3 TYPES. S, N O TI RA U G FI N CO WLAN T EN TO IMPLEMEN H W D N A , PE TY EM RK TH . CH NETWO EA F O S N O C D N A S PRO BEGINNINGS • THERE ARE THREE DIFFERENT CONFIGURATIONS OF WIRELESS NETWORKING SERVICE SETS, WE WILL DISCUSS THEM ALL. • ILLUSTRATIONS, SHOWING WIRELESS ACCESS POINTS, WIRELESS DEVICES, AS WELL AS PHYSICALLY WIRED NETWORKS. • PROS AND CONS OF BSS TYPES OF WIRELESS CONFIGURATIONS • INDEPENDENT…
Secure Your Home Wireless Network Why you should secure your wireless network Home wireless networks are becoming more common every day. These networks provide the ability to have multiple computers set up all over your house or apartment without a mess of wires running through your home. With a wireless network and a laptop, you can surf the web from your couch, your kitchen table or even your bed. However, with this increased convenience comes increased dangers. Hackers and identity thieves…
(Microsoft, 2015). An example of wireless access point or WAP exploitation is creating rogue access points within your system and tricking your employees into using it vice the secure method. This can occur through the use of personal computers or through PDAs and smart-phones (Wright, 2007) . As previously states, the impact of the three potential threats identified could be detrimental to the company’s assets. A compromised FTP server could grant an unauthorized user access to confidential corporate and…
throughput. Conversely, “dual band” describes a wireless access point’s ability to transmit data in both the 2.4ghz and 5.0ghz range. This results in a device that can transmit data between devices (if they're configured this way) on whichever frequency is “best” at any given moment… also, “dual band” makes it possible to have older wireless devices running in your network through the same access point. When should you implement a dual band access point? When you have older devices on your network that…
11 February 2015 Homework 7 Survey 1. What kind of precautions do you take when connecting to a wireless network of any kind outside your home? 2. Are you ever asked for payment information when using these services? 3. Are you aware of the dangers of connecting to a wireless network? 4. Do you know the difference between an ad hoc and a secure wireless connection? 5. When connected to these wireless networks, do you typically leave it in an always on state? Similarly, do you have any particular…
Week 6 iLab Report Marc Hughes DeVry University NETW360: Wireless Technologies and Services Evaluate and Solve Common Security-Related Problems Submitted to: Professor: Md Habibul Islam Date: 06/13/13 Evaluate and Solve Common Security-Related Problems Introduction Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are. * What is the intent of the lab? What issues are addressed…
into the analogue wave needed for transmission. At the receiving end the opposite occurs. The analogue wave is converted into a digital signal. 3. A mobile telephone is an example of a wireless device that can be web-enabled. What does the term ‘web-enabled’ mean? A web-enabled device is one that provides access to the Internet and email from any location. It can be held in one hand. 4. Describe the five main advantages of using a network over stand-alone computers. The advantages of a network…
Information Security – 3153020 Assignment: Wireless Security Done by: Abdullah Ali Alwan 201410419 Wireless Communications: Wireless communications are defined as the transmission of digital data while connected to some type of data network, without the use of any cabling. A device that utilizes wireless communications would be a smartphone, as it can connect to a network without using a wire. There are different technologies that uses wireless communications, such as: 1. Wi-Fi: The…
implement Information Security & Effective implementation of security policy will helps the organization to solve the issues related to the user access and authentication. Introduction This paper starts with examining about how manufacturing industry computer network encounters security threats and the vulnerabilities currently facing in organization’s Wireless LAN and mobile computing networks and also examine threats in real time shop floor production and process control systems, how to secure the…