Archive for the ‘IT 242’ Category

IT 242 Week 8 Checkpoint – WLAN

Wireless Network Security Wireless networks have the unique distinction among computer networks of extending beyond their intended reach. Radio signals can be picked up outside their intended boundaries with nothing more than an iPod or a laptop equipped with a wireless network card. The consequences of unauthorized network access can be devastating; therefore, it is [...]

IT 242 Week 8 Assignment – Wireless Signals

Wireless Networking Technologies How would today’s communications take place if it had not been for the work of scientists like Marconi and Hertz, perhaps the two most recognizable names in communications? The early research into wireless communications has resulted in radio, infrared, satellite, and microwave communications. Each form of wireless communication has an ideal use, [...]

IT 242 Week 7 – DQ1

Week 7 – DQ1 What are some of the greatest security risks to a wide area network? Provide an example of one risk and discuss the potential consequences and possible precautions. Viruses and Trojans are by far the biggest security risk next to leaving unencrypted data in an insecure location.  Trojans are more chances than [...]

IT 242 Week 6 Checkpoint – Static or Dynamic

Introduction For routing between routers to work efficiently in an internetwork, routers must have knowledge of other network IDs or be configured with a default route. The routers are configured in two different ways- static and dynamic. And a network administrator decides the configuration according to the type of network that is being used within [...]

IT 242 Week 6 Assignment – Router and Switch Configuration Paper

Introduction Routers and switches are a main key component to connect the various networking components within the computer network. For better and efficient working the routers and switches are must be configured well so the user can utilize the all facilities available in the network. Most of the popular Cisco brand of equipment follows the [...]

IT242 Week 5 CheckPoint – Switching

WAN connections can be divided in four categories: Dedicated links Circuit switching Packet switching Cell Relay The most used connection type is circuit switching. Circuit switching is a connection that sets up a line just like a phone call. No data transfers before the end-to-end connection is established. ISDN, dial-up modems, ATM, ADSL and HDSL [...]

IT 242 Week 5 – DQ2

Week 5 – DQ2 ISDNs are sometimes used in locations that do not support DSL or cable modem connections. Your choices may be analog modems or an ISDN connection in those remote locations. Describe three benefits ISDNs have over regular dial-up modem connections. The benefits of  using ISDN over a regular dial-up modem is that [...]

IT 242 Week 5 – DQ1

Week 5 – DQ1 Identify the functions of a CSU/DSU. How are they used in a corporate environment? A CSU/DSU (Channel Service Unit/ Data Service Unit) is a hardware device about the size of an external modem that converts digital data frames from the communications technology…

IT 242 Week 4 CheckPoint – Ethernet or Token Ring

The Token Ring protocol is defined in the IEEE 802.5 specification. It’s physical topology is a star and it’s logical topology is a ring. In every LAN that uses this protocol, each network device connects to a multistation access unit (MAU) using STP or UTP cables. The access method used in this type of protocol [...]

IT 242 Week 4 Assignment – VLAN

In an Ethernet network the method used by the devices to connect and send data on the network  is CSMA/CD. The CD stands for collision detection. This means that before connecting to the network and sending data, a network device must first listen if there is any traffic on the network. If there is then [...]

|
Powered by WordPress | Designed by: WordPress Themes | Thanks to best wordpress themes, Find WordPress Themes and Themes Directory