It 240 Lan Introduction

Submitted by: Submitted by

Views: 999

Words: 1380

Pages: 6

Category: Science and Technology

Date Submitted: 09/16/2010 10:45 AM

Report This Essay

Axia College Material

Appendix B

LAN Operating Systems Scenarios

Read the three scenarios below, then answer the questions that follow each scenario.

1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.

In administering a LAN with the use of a subnetwork, which include client/server using frontend and backend approach in security rights for each user. Using this methodology of topology in the physical approach would consist of two servers consist of main server and file server, CAT # 5, cable-modem, Coax-cable, switch, printers, and client computers. In the relationship with these components the performance of the star network would be adequate for the LAN setup. The relationship would consist of the server the topology of the physical star method of the first server and second server. The file server relationship to the main server is applications and data, which will be transmitted to the main server, thus to each users permission rights. The main server would have two Ethernet –cards or net-cards their relationship to the modem, router, switch and computer. The physical topology is connecting all the components in making the star-network. Using the CAT # 5wire in connecting the file server to the main server this allows the file server be access in the main server. The main server in return connection is transferred to the router where the modem and switch are connected. Therefore, by applying each computer and printer connection will inhibit the use of the switch. This would imply a physical topology method which would be used, though the logical topology is transferring the permissions and rights to each computer. This is accomplished through the...