Describe Wired LAN, Its Purpose, Basic Configuration, And Supported Standards.

Improved Essays
3-Describe wired LAN, its purpose, basic configuration, and supported standards. Specifically explain the VLAN concept and its use within the wired LAN infrastructure. What healthcare use can you envision for wired LAN? If unsure, search the literature for answers. A wired LAN connects computers within an organization in a network configuration and each PC on the LAN must connect to the network with a network interface card (NIC). The NIC needed varies by which cabling is used for the network (Cowley, 2012). NICs help to direct traffic on the network if a shared medium is used and they also help detect transmission errors (Cowley, 2012). Wired LANs can be complex and expensive to configure in an institution; some equipment needed for a wired LAN include hubs, switches, and routers. The hub, which is an OSI Level 1 device, acts as a signal booster within the LAN. Switches are OSI Level 2 devices and are actually intelligent devices that understand the addresses, connect different LAN segments, increase the bandwidth on the LAN, and are needed to create virtual LANs (VLANs) (Cowley, 2012; Morency, 1995). The wired LAN needs a dedicated location in a closet to house the patch panel/switchboard that connects all the wires from all the PCs on the network as well as the server. The equipment …show more content…
For example, Children’s Hospital in Boston moved all the servers that were on their wired LAN to a central location and began utilizing VLANs throughout the hospital. This reduced the need for distance cabling throughout the hospital which in turn reduced costs, as well as allowed for better server maintenance and monitoring since all the servers were in one location (Morency, 1995). VLANs can allow smaller IT departments to use their resources more efficiently and this is especially important for smaller health care organizations (HCOs) who may be struggling

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Interrupts are most important as they give user the better control over the computer. Without interrupts, a user have to wait for a given task to complete in a specific time management with the higher priotity. This ensures that the CPU will charge the process immediately. 2. What is a trap?…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy, and all other traffic is denied. ¥ 1.5 LAN versus WAN LAN, which stands for local area network, and WAN, which stands for wide area network, are two types of networks that allow for interconnectivity between computers. As the naming conventions suggest, LANs are for smaller, more localized networking than in a home, business, school, etc.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    to use. These are designed for the typical users to complete normal work, normally in the school’s network they will have limitations on student accounts, for example, there are many sites that they cannot access, and their computer will only hold the essential applications (software), etc. It is very common to see Windows operating system installed in these workstations however they might not be up to date as it can be costly, hence they would use older versions of windows operating system. • Interconnection devices are a physical piece of hardware used to connect the users to a network they are connected to, some examples of these interconnection devices are: o Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth. o Switches – While routers send data packets, switches filter these data packets and then send the data packet to its destination, however it has very limited functions, it is more advanced than a hub, however it is less compared to a router.…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    First we need to ensure that the information technology plan is going to align with the plans of Newcastle’s Hospital. The formulation will involve the ED affirming that their goals are to provide a higher quality of care. Corresponding the strategic organizational objective of “Getting better every day,” involves the overall improvement and patient safety provided at the hospital. The information system can enable the hospital to manage better patient care, allow for test results, and radiology report to be received faster and documented within the patient 's record. “Satisfying patients and staff,” by providing a better quality of care and making sure our employees can do this with ease.…

    • 823 Words
    • 4 Pages
    Decent Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Your healthcare organization, Harris Memorial Hospital, needs to look at both “hard” and “soft” savings when considering a system’s return on investment. Today’s presentation we will take a deeper look at the soft returns when implementing an electronic health record (EHR) system. It is important to remember that indirect savings are usually applied to processes not easily measured and, thus, quantifying savings can be difficult to see at first. We will look at the three steps in documenting soft returns: (1) identifying a process improvement opportunity, which is improved time/efficiency; (2) create a formula to calculate the benefits; (3) and determine the costs of the process and the net benefits. In order to determine the return benefits from EHR implementation, it is necessary to establish baseline metrics that can be used as a guideline for measuring success after the implementation.…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays