Issc340 Week1Assignment

In: Science

Submitted By econ
Words 335
Pages 2
Name: Date: October 11, 2014
ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford

Lesson 1 Review: Overview of Local Area Networks
The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.

1. What are the main architectural components of a LAN? (Minimum word count: 60) I LAN is define as a local area network which consist of a croup of computers that are within the same geographical location such as a home, or building, or even a group of small buildings. The architecture that builds a LAN all includes these components. First and foremost it is the actual network topology and how it is laid out, weather this is by wire or wireless. Next is the network operation system or NOS, which is what manages all the resources that are within the network. This is usually a server of some sort. Another main part of the network is the network interface card or NIC, this serves at the actual interface between the network and the computer.
2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operation system (NOS) can be defined as a management system on a network that enables the provisions of one or more client or clients. It is a component that runs within a server that provides multiple users within a network, also can provide file and print servers, can provide a gateway for internet access, and can also implement a wide array of network securities. A good example of NOSs can include various Windows packages such as 2000,Server 2003/2008/2010 or UNIX and LINUX systems. Client machines must run operating systems that can communicate back to these servers. So a Windows XP machine can be on a client that is connected to a NOS system running Windows Server 2003.

3. Match each term below with the correct definition.
[pic]…...

Similar Documents

Issc340 Week 2 Assignment Lesson 2 Review: Wide Area Networks

...Name: ___ ____________ Date: __ 2013_________ ISSC340 Week 2 Assignment (3% of Grade) APUS/ Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) ____A T1 circuit is a DS1 WAN technology that is comprised of 24 x 64 kbps data channels and 1 x 8 kbps allotted for signal and network management for a total of 1.544 Mbps. It is versatile because data types can be divided into voice, video, and data channels from one T1. ________________________________________________________________________________________________________________________________________________________ 2. A statistical multiplexer provides each user with … (Word count: 15-25) ____bandwidth based on demand on the circuit as it is available. This is different and more efficient than TDM where each user is slotted a given bandwidth whether it is used or not. __________________________________________________________________________ ______________________________________________________________________________ 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) ____It provides the capability to add or extract part of the data payload without completely demultiplexing or remultiplexing the signal.____________________________ 4. Describe an ATM cell … (Word count: 15-25) ___ATM is a connection-oriented, packet-switching technology......

Words: 299 - Pages: 2

Issc340 Week 1 Assignment

...Name: _________________ Date: ___________ ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The network’s physical topology – how the nodes are connected. The access method – how nodes access the transmission medium. The transmission technique – how information passes through the network. The transmission media – wired or wireless. The use of specific protocols that define how communication between computers takes place – TCP/IP is the standard communication protocol in modern networks. The LAN’s interconnectivity – how the LAN shares information with other types of networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages resources on a network and enables the provision of services to one or more clients. A NOS consists of two components: a server component and a client component. The sever component is the more complex component that runs on the server. The server component can manage multiple users on a network, provide access to file and print servers, provide services such as Internet access and implement network security. The client component runs on the client machine and......

Words: 273 - Pages: 2

Issc340 Week 5 Assignment

...Name: _______________ Date: __ ISSC340 Week 5 Assignment (3% of Grade) APUS/Sanford Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) They are simplex, half-duplex, and full duplex. In simplex communication, data travels only in one direction, much like a PA system. While the half-duplex allows travel in two different directions, but only one direction at a time, much like a walkie talkie. The full-duplex communication allows data to travel in two directions at the same time, similar to a phone conversation. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) They are 7) Application, 6) Presentation, 5) Session, 4) Transport, 3) Network, 2) Data Link, 1) Physcial. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is a unit of data passed from one open system interconnection (OSI) level to another. The PDU consists of the payload or original information along with the header that is added in Layer 7 of the OSI. 4. List three practical functions of the OSI model. (Minimum word count: 60) The OSI practical functions are it describes the process of packet creation. It also explains the framework used to connect different types of systems, meaning......

Words: 444 - Pages: 2

Issc340 Week 1 Assignment

...Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are several main architectural components of a LAN. Included is the physical topology of the network determining how the nodes on the network are connected. Access methods are needed on the network to determine how the nodes will access the transmission mediums. The networks transmission techniques and the transmission media determine how the information will be passed throughout the network and if the network will use cables or be wireless. Protocols are a main component of a LAN because they lay out how the various machines will communicate between each other. The LAN’s interconnectivity is another main component because it determines how the information on its own network will be shared with other types of networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) allocates resources throughout the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS will be more complex than the clients because that runs the servers and consists of many more tasks. The server portion of the NOS will have many......

Words: 344 - Pages: 2

Issc340 Week 1 Assignment

...Name: _Aaron Hancock_ Date: _12OCT2014_ ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components are 1: The network's physical topography (how the nodes are connected) 2: The access method (how the nodes access the transmission medium) 3: the transmission technique (how information passes through the network) 4: the transmission media (wired or wireless) 5: the use of specific protocols (the language used to communicate between computers) 6: the LAN's inter-connectivity (how the LAN shares with other networks) 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages the resources used within the network and enebles select services to select nodes. A NOS consists of two main components: a server component and a client component. The server component is the most complex component that runs on the server. The server component can do many things, to include; manage multiple users, provide access to files and printers, provide internet access, and enforce network security protocols. The client component runs on the client machine and enables the client to participate on the network. A NOS client......

Words: 270 - Pages: 2

Issc340 - Lesson 1 Review: Overview of Local Area Networks

...ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components of a LAN are the network’s physical topology and how the nodes are connected; the access method and how the nodes access the transmission medium; the transmission technique and how the information passes through the network; the transmission media showing if it is wired or wireless; the use of specific protocols defining how the computers communicate; and the LAN’s inter connectivity such as how the LAN shares information with other networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system is an operating system that manages network resources and enables the provision of services to clients. It consists of two components: A server and a client. The server is the most complex of the two. Its duties consist of managing multiple users on a network, provide access to file and print servers, provide services like internet access, and implement network security. An example of a server network operating system is Windows 2000, UNIX, and Linux. The client runs on a client machine. It allows the client to have access to the network and see storage locations as if they were......

Words: 268 - Pages: 2

Issc340 Final Paper

...For over the past several decades, information technology companies have been striving to figure out new and more effective ways to ensure that their computers and associative equipment, as well as, their clients’ devices are secure from unwanted intrusions. As computers and other electronic devices become more sophisticated and start storing more and more personal information, which includes, but is not limited to the development of technologies such as the fiber-optics, satellite communications, Bluetooth and the innovation of cloud storage, users are attempting to ensure their personal items are safe. However, while device users are trying to ensure their items are secure, there are the opposing parties that are constantly attacking and attempting to infiltrate any and all defenses posed by a target computer. An attacker can gain personal information, such as finance data, including credit card information as well as account numbers, and other important information relevant to your life. These attempts can eventually lead to success and jeopardize the people being attacked. These attacks are becoming more sophisticated and complex as well, meaning not only that technologies need to be evolved and enhanced, but also that the user needs to be more conscious than ever of exactly what they are doing on their systems. According to Dictionary.com Network security is “The protection of a computer network and its services from unauthorized modification, destruction, or......

Words: 3328 - Pages: 14

Week 5 Assignment

...Name: Charles Buchanan Date: 12/07/2014 ISSC340 Week 5 Assignment (3% of Grade) APUS/Sanford Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) Whenever we connect devices there must be away for one device to communicate to another. The three basic modes of operation annoy network are Simplex, Half-Duplex, and Full-Duplex operation. in simplex operation, a network cable or communication channel can only send information in one direction. Half-duplex operations are capable of sending information in both directions between nodes, but only one direction can be utilized at a time. Full-duplex operation is a connection between two devices and is capable of sending information in both directions simultaneously. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The Open Systems Interconnect (OSI) model has seven layers. The application, presentation, session, transport, network, datalink, and physical layers. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is an open system interconnection term use in telecommunications that refers to a group of information added or removed by a layer of the OSI model...

Words: 500 - Pages: 2

Issc340

...2. Literature Review Many network applications are built on top of TCP. And many are continuing to be built on TCP in the future. Up to date studies show that several alternatives have been proposed to lessen the poor end-to-end performance of the unmodified TCP in the wireless medium. The protocols in this section will point out the advantages and disadvantages of each approach. • Congestion Avoidance: It is assumed that all losses are due to congestion avoidance, which becomes quite problematic over wireless links. Congestion avoidance is a way to deal with lost packets. In packet-switched networks, packets move in and out of the buffers and queues of switching devices as they pass through the network. A packet-switched network is often referred to as a “network of queues”[W. Stevens 2]. A characteristic of packet-switched networks is that packets may arrive in bursts from one or more sources. Buffers help routers absorb bursts until they can catch up. If traffic is excessive, buffers fill up and new incoming packets are dropped. Increasing the size of the buffers is not a solution, because excessive buffer size can lead to excessive delay. Congestion can occur when data arrives on a fast LAN and gets sent out a slower WAN [Allen 2]. Congestion can also occur when numerous input streams arrive at a router whose output capacity is less than the sum of the inputs. Now, any host injects packets at anytime and those packets are variable in size, which makes......

Words: 702 - Pages: 3

Issc 340 Assingment 2

...Name: Fabian Calle-Calle Date: 11 Feb 2015 ISSC340 Week 2 Assignment (3% of Grade) Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) A T1 circuit is the most common connectivity method in the United States and Japan and it is 24 different channels of voice and data that carries signals at a speed of up to 1.544 mbps 2. A statistical multiplexer provides each user with … (Word count: 15-25) The ability to have a faster connection depending on the transmission trends by switching between channels according to the demand of the network 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) It provides the capability to add or drop part of the transmission payload without the overhead of completely demultiplexing and remultiplexing the entire signal. 4. Describe an ATM cell … (Word count: 15-25) It is a data frame that is always 53 bytes long that serves as the basic unit of ATMs packets switching technology 5. Which technologies provide affordable high-speed connections for home-based networks? (Word count: 15-25) There are three main methods of connecting to the internet that is available for an affordable price. Cable Internet which is the most common, and reliable this method provides a good amount of speed for a reasonable price. DSL connections is the cheapest high speed connection......

Words: 302 - Pages: 2

Issc340 Week 6 Assignment

...Name: Jerry Cunningham Date: 16 March 2015 ISSC340 Week 6 Assignment (3% of Grade) APUS/Sanford Lesson 6 Review: Transmission Media The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is the difference between standard voice-grade cabling and data-grade cabling? (Min. word count: 30) When determining the difference between voice-grade cabling and data-grade cabling, user much keeps in mind that twisted pair cables such as voice grade can support data speed of 19Kbp up to a distance of six miles. On the other hand data grade cabling have a speed of to 100 Mbps. 2. True or false: A diameter of a 22AWG twisted-pair cable is smaller than a 26AWG twisted pair cable? Explain… (Min. word count: 10) The answer would be false because due to being bigger in the numbers of AWG the diameter of the cable would be much smaller 3. In which frequency bands to do short-range wireless transmission operate? (Min. word count: 10) When dealing with frequency band short-range wireless operates in both 2.4(Ghz) microwave band and 5 (Ghz) band 4. What are the two types of light source used to transmit signals over optical fiber? (Min. word count: 10) According to textbooks, the two different types of light source use to transmit signals over optical fiber are: analog and digital data 5. True or false: Bluetooth is a good example of short-range wireless......

Words: 297 - Pages: 2

Issc340Wk1

...ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are six parts to the to the LAN architecture components which include the network’s physical topology, the access method, the transmission technique, transmission media, protocols, and LANs interconnectivity. The architecture is the layout of how the network will be connected. The access method is how a particular node (network component) will gain access to a transmission medium. The transmission technique is how data passes throughout the network. Transmission media is the connection to the network whether it be wired or wireless. The protocols are the set of rules that defines how the nodes will communicate with each other. Last but definitely not least is the interconnectivity which determines what and how information is shared. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) is what manages resources of the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS is the more complex portion because it is what manages who can access what resources. It......

Words: 330 - Pages: 2

Issc340 Week 4

...Name: ___________________________Date: ____________________ ISSC340 Week 4 Assignment (3% of Grade) Lesson 4 Review: LAN Topologies The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. What are the two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously? (Min. word count: 15) Carrier sense multiple access methods are detection where a transmission is cancel when collision is detected and avoidance where transmission is delayed. Which topology would you use when unable to install network cable? (Min. word count: 15) Mesh topology because is provides has separate cables for each connection, meaning a cable can break without interfering with the rest of the network. What is inherent in mesh topologies that enable them to provide high reliability? (Min. word count: 20) Mesh topology provides fault tolerance by having separate cables for each connection, allowing any one cable to break without interfering with the rest of the network. What are advantages of star topologies? (Min. word count: 10) Star topology gives great fault tolerance as any device/cable failure will not affect the rest of the network. Compare the two modes supported by wireless topologies. (Min. word count: 20) In ad-hoc mode data in the network is transferred to and from wireless network adapters connected to PCs. An infrastructure network enables you......

Words: 454 - Pages: 2

Issc340 Week 1 Assignment

...Name: Date: ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components of any LAN starts with the layout for how the nodes connect, the access method (which is how the node gain access to a transmission medium), the transmission technique (which is how the information passes through the network), transmission media (which is defined by either wired or wireless connections), the use of very specific protocols (which are sets of rules that define how the computers communicate and define the LANs interconnectivity), which then determines how the LAN shares information. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) One of the biggest differences between a Network Operating System and a regular operating system is that unlike the OS which can run a single computer, the Network Operating System can run multiple computer on a network at once and allow the network to continue running. The Network Operating System is an essential element of the LAN that can consist of server components and a client component. The server components have multiple responsibilities that can range from managing multiple users on a network, providing access to......

Words: 297 - Pages: 2

Issc340

...Wireless Security T 01/15/2015 ISSC340 American Public University System Eric Yocam When it comes to dealing with wireless security, it happens to be a problem for everyone. The rise in devices being made during the last decade has put a strain on the amount of data being requested by users. The statistics show that 64 percent of Americans who have internet service providers that impose a broadband cap, have a meter for the cap that is presented. Recent studies have shown that five out of seven people’s meters don’t count your bits correctly. This allows for the chance of assuming what data is being used and being overcharged for what is not actually used. Other statistics show that the laptops that were purchased in 2005 and later were equipped with wireless connectivity. This created an issue with wireless laptops connected to the corporate network, it presents a situation where a hacker could sit in the parking lot and receive information through laptops and other devices, or break in using the wireless card-equipped with this wireless connectivity option. In order to test the strength of most wired and wireless networks the intrusion detection system was implemented. This is a software application that monitors the network activity for malicious activity or privacy violations. The way this works, is that the incidents get reported to a management station. The two different types of intrusion detection system are (NIDS) network based and (HIDS) Host...

Words: 3051 - Pages: 13

Es sind noch 45 weitere Releases vorhanden. | Cultural perspective | Anatomical Terms Of Motion