It240

In: Computers and Technology

Submitted By yacoubkane
Words 2355
Pages 10
|[pic] |Syllabus |
| |College of Information Systems & Technology |
| |IT/240 Version 4 |
| |Intro to LAN Technologies |

Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved.

Course Description

This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts.

Policies

Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents:

• University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum.

University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.

Course Materials

Stallings, W. (2009). Business data communications (6th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

Tomsho, G. (2011). Guide to networking essentials (6th ed.). Clifton Park, NY: Course Technology, Cengage Learning.

All electronic materials are…...

Similar Documents

Lan Topologies

...LAN Topologies IT240 10/14/12 1. Case Project 2-1 With a network of 50 computers I will use the Ring Topology to upgrade this network. With this type of topology all the devices are connecting in a loop form and the information travels in one direction, thus avoiding collisions. Here the cabling doesn’t terminate, it continually goes from one device to another till it gets back to the original device. It is also easier to manage the network since all the information is passed around the ring in the same direction. 2. Case project 2-2 With that many computer and four servers, I will use an Extended Star Topology. As pointed out in the case project that there are a few switches available here, I will use a central switch and connect the rest of the available switches to it and connect the 200 PC’s to those switches. Switches are good for determining each individual packet’s destination and ensuring that they are delivered to the right device. Note Even though they might have two different uses in some cases, the hubs in my diagram represent the switches. 3. Case project 2-3 * Physical versus logical topology: A physical topology defines how the devices on a particular network are physically connected; logical on the contrast tells us how the systems on the...

Words: 415 - Pages: 2

It240 Check Point Threat Categorization

...Check Point Threat Categorization IT240 May 10, 2013 Check Point Threat Categorization |Define each of the following terms in your own words: | | | |Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from | |because the codes are located here. | |File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. | |Multipartite - divided or having many sectors, very applicable to computers since they have many parts and are divided into sectors and sections. | |Macro – Instructions, usually one that can automatically turn into more instructions. | |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored | |on the infected computer to be stolen. | |E-mail worms – A worm......

Words: 829 - Pages: 4

It240 Appendix C

...Associate Level Material Appendix C OSI Model Key Terms Table Use the following table to define the key terms related to the OSI model. Describe the functions of any hardware connectivity devices and tools listed. |Term |Definition |Function | | | |(if applicable) | |Physical layer |Transmits bits throughout the network’s |Changes data packets to physical signals | | |physical medium. Performs services |which symbolize 1’s and 0’s and later sends| | |requested by the data link layer. |the physical signal to the destination | |Data link layer |The data link layer is in charge of |Splits data that is obtained from the | | |transmitting data error free and to set up |network layer into frames the physical | | |local links between two computers |layer can transmit. It also has packages | | | |data into frames which are workable by the | | | ...

Words: 843 - Pages: 4

It240 Week 1

...11/7/2013Associate Level Material Appendix C OSI Model Key Terms Table Use the following table to define the key terms related to the OSI model. Describe the functions of any hardware connectivity devices and tools listed. |TTerm |Definition |Function | | | |(if applicable) | |Physical layer |Responsible for the transmission of bits |Converts data to physical signals that | | |across the network’s physical medium. |represent o’s and 1’s and then transmits | | | |the physical signals to its destination. | |Data link layer |Responsible for error free data |Divides data received from the network | | |transmission and establishing local |layer into frames the physical layer can | | |connections between two computers. |transmit. | |Network layer |Responsible for addressing and routing |Establishes, maintains and terminates | | ......

Words: 754 - Pages: 4

Textiles Company Network Disaster Plan

...123 Textiles Company Network Disaster Plan Keith A Manley IT240/ Sorrells 11/30/2012 The 123 Textile Corporation has several solvable issues that we will address in this network updating proposal. They have been exposed to inclement weather and as of late a break in resulting in the companies sever and all pertinent data for sales, production, human resources. This proposal will lay out all necessary hardware upgrades as well as the software upgrades needed to maintain the new hardware. It will also look at off-site back up as a potential resolution to being in an area that may be more susceptible to break-ins resulting in equipment loss and or damage. The proposal will also address the issues of inclement weather and possible protection from natural disasters. Hardware and equipment proposal; A required designated space for the new computer equipment should be around 50 square feet with through wall ventilation but no window or exterior access points. In addition a cable line for modem connection and power source will be required. Power source should be of 20 amp circuit and non GFI, number of circuits at primary location in room to be four. In consideration of power outages that could result in loss of data a recommended solution will be the installation of an online UPS battery backup unit which provides continuous power while plugged in through the unit’s battery allowing for smoother and quicker power transition. This unit......

Words: 1340 - Pages: 6

It240 Week 6 Work Group Scenarios

...Work Group Scenarios Jenna Cullen IT240 Work Group Scenarios Read the following scenario: Your Microsoft® Windows® 2000-based office network has three domains: ALPHA, BETA, and OMEGA, all in the same Active Directory tree. Required result: You must provide access to some users with accounts in the ALPHA domain to some resources in the OMEGA domain, but users in the OMEGA domain should not have access to resources in the ALPHA domain. Optional result: If possible, changes to the ALPHA users’ accounts should be reflected in the accounts they use to access OMEGA resources. Proposed solution: Add the ALPHA users to a global group in ALPHA, and add that group to a local OMEGA group that has permissions to the required resources. Based on your goals and your actions, determine which of the following statements is true and explain. Response In my opinion, the statement “You accomplished both your required result and your optional result” is true. According to Guide to Networking Essentials (Tomsho, 2011), “Administrators use user accounts to assign permissions to network resources and define the types of actions a user can perform (referred to as rights in Windows)”. The required result indicates that some accounts in ALPHA be able to access resources in OMEGA but not vice versa. The optional results indicate that ALPHA accounts need to be changed to enable access to OMEGA resources. The optional result is already a given factor because you......

Words: 449 - Pages: 2

It240 Week 6

...Your Microsoft® Windows® 2000-based office network has three domains: ALPHA, BETA, and OMEGA, all in the same Active Directory tree.   Required result: You must provide access to some users with accounts in the ALPHA domain to some resources in the OMEGA domain, but users in the OMEGA domain should not have access to resources in the ALPHA domain.   Optional result: If possible, changes to the ALPHA users’ accounts should be reflected in the accounts they use to access OMEGA resources.   Proposed solution: Add the ALPHA users to a global group in ALPHA, and add that group to a local OMEGA group that has permissions to the required resources. Based on your goals and your actions, determine which of the following statements is true and explain:   •        You accomplished both your required result and your optional result. •        You accomplished your required result, but not your optional result.   Post your assignment as a Microsoft® Word attachment. The goals and actions in this scenario would accomplish both the required results and the optional results. The required results state that you provide access to some users in the ALPHA domain to some resources in the OMEGA domain. Users in the OMEGA domain should not have access to resources in the APLHA domain. Enabling access for certain ALPHA users to view resources in the OMEGA domain must be completed by the Administrator. By doing this it will not allow OMEGA users to access the ALPHA domain resources......

Words: 263 - Pages: 2

It240 Week 8 Disaster Plan

...Individual: Disaster Plan Jaime DiPaulo Jr 04/7/14 IT/240 John Helt I chose to analyze and formulate a disaster plan for Company A -Computers. Although the differences between Company A and Company B are more than slight in the approach they choose for the operation of their network, the concept of network security means the same thing. Zooming in on Company A, there is information of approx. 10,000 employees that travels through an unprotected portal that shares the company email server. This is about as serious of a threat as there is. Laid out within this written document are enactments much, much recommended. These implementations work together much like the individual pieces of a knight’s armor overlap each other a bit, meanwhile the sword and shield are actively about in front of; ready for an attack on their network. The following paragraphs are outlined in the order of the OSI model. Protecting all of the important assets of XYZ Computers means keeping them in a safe place, whether in storage or in full operation. According to Appendix G, there was a flood on the first floor that caused damage to all of the equipment. To protect the equipment from flooding, which is a seemingly big problem in the south, the equipment should be elevated from the immediate floor by means of some type of moat around the equipment or moved up to the second floor. The drainage system should also be further inspected to ensure there are not other pipe-bursting dangers.......

Words: 1498 - Pages: 6

It240

...DOMAIN NAME ARNESHEA DAVIS IT/240 AUGUST 29, 2014 JENNIFER LLOYD When you have a not for profit organization, the ORG could be an overall choice. I feel when using ORG would be a good way to be somewhat high-class and able to increase an improved method from the different users and the outsiders, that has been compared to the not for profit that’s using a COM. I believe that the best web page that I would want to select would be free-flu.org. In a way it will be very much available and it’s very simple to remember. This name free-flu has been left intact in a way of not having to add any further letters that has to be used for the domain. I feel that best thing to be used is the dash because it’s more simple to use than the underscore. This way it will break it up enough to make things a little easier to understand and to escape of misunderstanding. There are key selections with the domain and they are NET, COM, EDU, ORG and GOV. Well when using COM, it was supposed to be used for the different type of commercial business and organizations. The COM domain was the one that has grown fastest and it’s a little more widely used. There has been some current worries about COM, with those have been the overgrowth and this will continue to raise at the recent rate. There could be a time in which that the commercial groups will only be permitted to sign up with the COM domain. The NET was supposed to be the domain for any type of computer industry. This was used for networking,...

Words: 505 - Pages: 3

It240 Week 2 Osi

...|Week Two Check Point: OSI Model Key Terms Table | |  |Points Earned |Points Possible | | |Suggested response: | | | |Term | | | |Definition | |Function | |(if applicable) | | | |Physical layer...

Words: 556 - Pages: 3

It240 Week7

...Answer to problem 1: DECLARE string Studentname DECLARE integer test1 DECLARE integer test2 DECLARE integer test3 INITIALIZE test1 to zero INITIALIZE test2 to zero INITIALIZE test3 to zero OPEN the file Grades.dat for writing PRINT ‘Enter Student name and test scores' READ Studentname WHILE Studentname is not equal to "ZZZ" APPEND Studentname to file Grades.dat INSERT delimiter READ test1 READ test2 READ test3 APPEND test1 to file Grades.dat INSERT delimiter APPEND test2 to file Grades.dat INSERT delimiter APPEND test3 to file Grades.dat INSERT new line character READ Studentname END WHILE CLOSE the file Grades.dat Answer to problem 2: DECLARE string Studentname DECLARE integer test1 DECLARE integer test2 DECLARE integer test3 DECLARE integer totalscore OPEN the file Grades.dat for reading WHILE not end of file Grades.dat GET(Studentname) from file Grades.dat REMOVE delimiter GET(test1) from file Grades.dat REMOVE delimiter GET(test2) from file Grades.dat REMOVE delimiter GET(test3) from file Grades.dat MOVE file pointer to new line totalscore = test1 + test2 + test3 PRINT Studentname, test1, test2, test3, totalscore END WHILE CLOSE the file Grades.dat CERTIFICATE OF ORIGINALITY I certify that the attached paper is my original work. I am familiar with and acknowledge my responsibilities, which are part of the University of Phoenix Student Code of......

Words: 343 - Pages: 2

Lan Topologies

...LAN Topologies Lord Bones IT240 Jan 01, University of Phoenix - AXIA College LAN Topologies With this assignment I will discuss some topologies of a LAN as requested by questions 11, 12, and 13, chapter three from the textbook Local Area Networks. A “LAN (Local Area Network) topology is the appearance or layout of a network” (Regan, 2006). There are two forms of topologies of a network, namely, the physical- and logical topology with each its own types of topologies. The physical topology is what someone can see with his or her own eyes, i.e. a workstation, servers, cables, etc. while the logical topology is the dataflow of the network, how the data is moving from one point to another (Regan, 2006). In the following I will describe two physical topology types and one logical topology type, following the scenarios in the question’s mentioned above. In the first scenario there are four servers in the network with no hub present. The first (A) server is connected to the second (B), third (C), and the fourth (D). The second is connected to the third and fourth, while the third is connected to the fourth. (See figure 1.) This type of physical topology is called a Mesh Topology. A Mesh Topology is a topology where “every computer is linked to every other computer” (Regan, 2006). With this type of topology there is no hub or a similar device present. Also this type is difficult to install and certainly when it has to be reconfigured when a new computer is added to the......

Words: 817 - Pages: 4

It240 Week 6 Assignment

...Associate Program Material Appendix K Currency Conversion Peer Review Design Inspection Report |Programmer’s Name: |Ken | |Date of Inspection |4/1/2012 | |Inspector’s Name: |Ken | Use the following criteria to evaluate the Currency Conversion Test Procedure. If the answer to the item question is yes, place an X next to that item under the Yes column. If the answer is no, add details next to that item under the Comments column. | |Yes |Item |Comments | | |X |Is the problem description clear, concise, and accurate? | | | |X |Are the inputs to the program identified? | | | |X |Are the outputs to the program identified? | | | |X |Does the test input result in the expected output? | | List of Defects Identify defects by checklist number and observed error, but do not include......

Words: 399 - Pages: 2