The Importance Of Network Configuration

Improved Essays
The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade.

Network Configuration
Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.” (What is Network Configuration, n.d.). Networks
…show more content…
The Internet in the way most people recognize it was formed around the beginning of the 1990s when scientist Tim Berners-Lee developed the World Wide Web. It has changed how we shop, how we are entertained, how we receive the news and how we get information. (Thomas, 2016). The Internet moves data from one place to another very …show more content…
Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4.
Missing Elements
In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet. Although the diagram included key components it is missing several other important elements (modem, wireless access point, and Ethernet switch). Database Report For the database report, the scenario requires for the modification of the sections of the provided database with the information regarding the employees’ computers and the upgrade dates, followed by running the query that will identify each employee’s upgrade

Related Documents

  • Improved Essays

    Employees who require privileged access to administer devices and services on the network, should be issued a second card with separate administrative credentials. b)…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    TASK 3 Do some research and produce a word-processed report for the Managing Director of PVMS. Your report must explain how these improvements could be made and evaluate their impacts on PVMS and its staff. There are various ways Progress Vinyl Music Stores could improve the stores and head office, and centralise procedures for recording stock. For example, the employees are able to email their colleagues through web mail. Moreover, no email software’s require a computer just needs to be connected to the Internet and a browser.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Remote access is the one which helps us to get access to a computer or network form a remote distance. In many organizations branch offices, telecommuters, and people who are traveling may need access to the corporation’s network. Home clients gain admittance to the internet through remote access to an Internet Service provider(ISP). Dial-up association through work area, scratch pad, or handled PC modem over general phone lines is a typical technique for remote access. Remote access is additionally conceivable utilizing a committed line between a PC or a remote neighborhood and the central or main corporate local area network.…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Its overall company network is well separated with three networks (Whitman & Mattord, 2011). The first is a wireless guest network, the second is a financial network ,without any wireless access and the third is a production network (for employees and other functions) with wireless access (Whitman & Mattord, 2011). All networks are…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Discipline Investigation: Network System Analyst Introduction Information system is the most popular technology in the past two decades, but I have decided to get into the field is not because of the popularity. I have chosen network analyst as my future path because my mom used to restrict my internet usage. The reason sounds unique but that is why I initiate my interest on this “forbidden thing”. However, I never learn anything about it until I took a class in my high school, call Network Administration. The teacher has explored a new world in the class, and I have realized that my interest can be my future career choice.…

    • 1954 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    client /server computing system, and TCP/IP (Transmission Control Protocol/Internet…

    • 1141 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Hr Audit Paper

    • 1056 Words
    • 5 Pages

    HR Audit Strategic Management of Human Capital Jasmine Flores [Date Submitted] HR Audit Introduction Any organization faces an essential requirement to follow a certain number of rules, regulations, practices and other detailed procedures for staying on the path of success. For an organization to be successful, some of the most significant aspects which can assist it in relation to this include different instances of HR metrics. By following and monitoring significant HR metrics, a company can deal with issues effectively and raise the standards of its operations and outcomes in an informed manner.…

    • 1056 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Internet is global network that allows you to connect to the world. In 2006, Dr. Leonard Kleinrock had given speech on Internet at Infocom. It includes – the situation before Internet was invented, how internet was invented, brief overview on Arpanet (beginning and growth), what all barriers had been removed after using internet, early pioneers, implementers contributions, some good and some dark sides of Internet, his future vision about internet and five golden guidelines to research. He has defined Internet by using example of Larry Garwood and his father.…

    • 1354 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

     Can share varied forms of documents and files together with music, video, photos, etc.  Store all files - documents, music library, video, digital photos, alternative documents in one place {that will which will that may} be accessed sharing or maybe run a security WHO can scan and write, or WHO will access what files 3-Why should you characterize the logical structure of an internetwork and not just the physical structure? The media access technique, the approach network access is controlled and collisions prevented, relies on the network topology instead of the network topology. To effectively troubleshoot communications issues, it's necessary to understand not solely the network topology of a network however conjointly the network topology, so you recognize what path the info packets take as they travel from one laptop to a different. to higher perceive current and future configuration, routing, security, DNS, workload, performance, and economic problems.…

    • 670 Words
    • 3 Pages
    Improved Essays