StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Diagram and Wireless Connections - Coursework Example

Cite this document
Summary
This coursework "Network Diagram and Wireless Connections" focuses on laptop and gaming devices such as Xbox and Wii that have support for Wi-Fi(Wireless internet) so we won’t need any hardware for them to connect to the wireless router, but we will need a Wireless Card…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Network Diagram and Wireless Connections
Read Text Preview

Extract of sample "Network Diagram and Wireless Connections"

1) a)Network Diagram: N/B All the connections from Wireless Router to the Devices/ Systems and Switches are Wireless Connections. b) They could use the home network by connecting the Broadband Modem to their Wireless router and then configure the wireless network to be able to connect to 10 devices/systems of which 9 will be used by Louis, Rena and their 3 children and 1 will be kept open in order any guest arrives and want to use internet in future. c) Hardware: Now a days in laptops and gaming devices such as Xbox and Wii we already have support for Wi-Fi(Wireless internet) so we won’t need any hardware for them to connect to the wireless router, but we will need a Wireless Card for Louis desktop computer in the office because desktop computers dont have wireless cards preinstalled on themselves. It’s not mentioned whether the printer supports Wi-Fi or not so we are going to assume that printer supports Wi-Fi printing so we wont need any extra hardware for printer as well. Now we will assume that Louise have three children as well as office at the home so definitely he won’t be needing disturbance in his office at the time of working so he will have a house of minimum three floor which in hardware terms increase our one more need of wireless switch with boosters in order to increase wireless signal strength on other floors. Software: In Software terms we will be needing only Child locks for Louis children in order they dont accidentally land on sites which they are not supposed to visit. Remaining software needs like protecting wireless network by locking it with password and making it compatible for only 9 systems can be done from the settings of the wireless router. Connectivity Components: Since we have installed the following things in hardware terms: 1. On Luis desktop we installed Wi-Fi Card 2. We provided one switch with Boosters 3. A Wireless Router to be connected to other Broadband modem (will be provided by service provider). So For Wireless Router we will just need is one Ethernet cable to connect Broadband modem with the Wireless Router thats all because everything else will be connected to the wireless router using wireless connection. d) Risk to their network is that some outside can access it if the network is visible outside their premises and if the network is OPEN to be accessed without having any security password on it. So in order to protect such use of their internet they will have to lock the security with using any password which is difficult for others to guess other than family members, as well as they can specify the MAC address of all 9 systems in the Router settings and bar any other service requests other than these 9 systems/devices. 2) PII is an Information about a person that recognizes, links, relates, or is exclusive to, or describes him or her, e.g. a passport number; age, police rank, civilian, marital status, race, salary, mobile numbers. Cybercriminal tactics Network attacks this is considered to be any action taken to interrupt, reject, damage or destroy information residing on a computer network I.e. fabrication, interception or modification Social engineering- is an act of manipulating people into performing actions or divulging information, rather than by breaking in or using technical cracking techniques e.g. via email, phone, dumpster diving, online, reverse, USB drives Hacking – breaching security safeguards on a computer and retrieving information illegally 3) Cache. Description, including the three levels of cache and indicating where each level resides on the computer. Speed comparison (L1 -> L2 -> RAM -> hard disk/CD). 4) Ergonomics comes from two Greek words “Ergon” meaning work and “nomos” meaning “laws” the word therefore describes the study of persons and their workstation. The design of a computer affects how people use the equipment. A poorly designed piece of equipment can help to increase health related issues. The resolution of ergonomics is to make working conditions and equipment harmless and more competent. There might be health linked problems like repetitive stress injuries, eyestrain, headaches. 5) A computer based information system is a mixture of software, hardware and telecommunication networks, which people build and later use to create, collect and distribute data. Transaction processing is a software system that supports transactions like collecting data, monitor performance, provide routine detail reports on routine activities. Decision-Support Systems provides more sophisticated analysis of data to support mid-level managers with decision-making- focus on future planning, business intelligence, aggregated data. These systems would help managers identify potential problems or opportunities. Executive Information system is a kind of controlling information system that enables and maintains supervisory and decision making needs. This provides friendly decision-support tools for higher level managers focused on strategic decision-making. 6) CMOS Chips: Complimentary metal-oxide semiconductor used to store supple informations CMOS chips are powered by a battery and thus are volatile. CMOS chips contain flexible start-up informations like time, date, and calendar is must be updated whenever the computer is turned off. Differently from ROM chips, CMOS chips can rather be programmed again, as when you need to alter time for daylight savings time. RAM Chips: Random access memory chips is used to temporarily store program instructions and data. RAM chips temporarily hold software instructions and data before and after they are processed by the CPU. Since RAM’s contents are temporary, RAM is said to be unstable (volatile) i.e. the contents are lost when the power is turned off. ROM Chips: Read Only Memory chips is generally used to store nonvolatile informations. Distinct from RAM, to which data is constantly being added and removed, ROM cannot be erased by the computer user without special paraphernalia. ROM chips contain programs that are built in at the factory which are necessary for basic computer operations. It is mainly used to distribute software that is very closely tied to specific hardware and unlikely to require frequent updates. Flash Memory Chips: is used to store supple programs. They are nonvolatile form of memory, flash memory chips can be deleted and reprogrammed more than once. Flash memory, which does not require a battery and which can range from 128 megabytes to 32 gigabytes in capacity, is used to store programs not only in personal computers but also in pagers, cellphones, MP3 players, Palm controllers, printers, and digital cameras. Flash memory is also used in newer PCs for BIOS instructions. Microsoft team usually recommends 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) windows 8 and office 2013. 7) Pie charts are best to use when you are trying to compare parts of a whole.e.g. If a company has five divisions, and the pie chart shows revenues per dissection, the sum of all the slices/divisions is the total profits of the company 8) Conditional formatting with Highlight Cells Rules permits you to express formatting for cells that meet specific statistical or script criteria. 9) Highlighting cells with matching values can be particularly helpful when you are examining data like for highs and lows, before and after definite periods, etc. 10) A relative reference is a cell reference that changes when copied and filled to another cells. Absolute reference is a cell reference which remains constant no matter where they are copied. Example for absolute referencing is when calculating camera’s tax with excel formulae. 11) You can either type the formula directly in the formula bar, you can use formula AutoComplete, On the Formulas tab, select the Insert Function button to choose a function from the Insert a Functional dialog, Furthermore, you can click the Insert Function button to the left of the formula bar and finally you can use the AutoSum button to insert common functions. 12) A relational database (RDB) is a collective set of multiple data sets organized by tables, record and columns. A table of Students data might include fields for StudentID, Last Name, First Name, E-mail Address, RegNumber, and Department. Another table for entering student’s academics grades might have fields for RegNumber, StudentID, AcadYear, and GPA. The two tables are related by the Student RegNumber field, so the database can generate reports combining information from the two tables. 13) You may have made a backup of your file by File/Save and Publish/ Save Database as (Advanced)/Backup Database/Save As/Save You may have copied the file to another hard drive, to cloud storage etc. Find the good copy of the database that you earlier saved and move it to the location where the missing database should be. 14) Through the use of slide masters in power point presentation, it’s stress-free to generate a typical look throughout an entire presentation by adjusting layouts and design elements which includes backgrounds and themes, at the presentation level relatively at the slide level. When you use a slide master to create slides in your presentation, you only need to modify the slide master in Slide Master View to make changes to all the slides in the presentation 15) Firs after typing your work on the power point, you would click the Transition tab from the Microsoft office and click on one of the listed options, such as fade, push or wipe; Select Effect Options to set direction i.e. left to right, top to bottom, add Sound if you choose. If you want the transition applied to all slides, also select Apply to All. 16) For the references to be put in the correct format on the article, you need to select the suitable Reference Style so Word applies the correct set of guidelines for your bibliography,therefor you must have distinct the sources throughout your article. The two title choices are either the Bibliography or Works Cited. 17) SDLC is covered in the modules the three segments are Preliminary Investigation, Systems Analysis and Systems Development References Nardi, B. A., & Day, V. (1999). Information ecologies using technology with heart. Cambridge, Mass.: MIT Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Exam Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1636869-exam
(Exam Coursework Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1636869-exam.
“Exam Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1636869-exam.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Diagram and Wireless Connections

Advances in Wireless Networks

The basic purpose of this report is to offer a detailed analysis of new wireless network technology implementation at University of Iland (UoI).... This network will be a controller-based wireless LAN technology that will be used to modernize the daily tasks University of Iland (UoI).... Introduction In this report I am going to specify a new controller-based wireless LAN design for University of Iland.... This specification report will present a comprehensive analysis and specification of new wireless network technology, its requirements, design, systems, equipment and computations required for the establishment of LAN network at University of Iland....
10 Pages (2500 words) Essay

Setting up Connection at Home

For this purpose, I have searched for a number of solutions such as DSL cable, Cable TV, and wireless connection: Proposed Solution With the passage of time, there has emerged a lot of innovative technologies and wireless technology is one of them.... At the present, more and more people are going toward wireless solutions.... The wireless broadband connection is presently more appropriate solution for establishing an internet connection (OpenBookProject; Nash)....
6 Pages (1500 words) Essay

Evaluating benefits of networks and performing network management responsibilities

Local Area Networks (LAN) can be described in various configurations and layouts referred to as network Topology.... network topology determines the connectivity and communications mode of nodes on a network.... The most popular network topologies are:Bus topology provides the simplest network connection.... A single cable connects all the computers and network peripherals.... Each node communicates with any other node by using the physical address of the network card of the destination node....
7 Pages (1750 words) Essay

Wireless networking

It is widely used in home computer networking connections.... The access point connects to the broadband router, allowing wireless clients to join the home network without needing to rewire or re-configure the Ethernet connections.... Popular protocols include TCP/IP , the most common protocol found on the Internet and in home networks Networking can be of different types like; Local Area Networking (LAN), wireless Local Area Networking (WLAN), Wide Area Networking (WAN), Metropolitan Area Networking (MAN) etc....
5 Pages (1250 words) Essay

Information Communication Technology

he Network is classified into Wired Technology and wireless Technology ... It is not affected by other wireless signals like portable/cellular phones, microwaves; etc.... wireless LANs - wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology.... Bluetooth - A short range wireless technology.... Bluetooth is an open wireless protocol for data exchange over short distances....
8 Pages (2000 words) Essay

Growth of Electronic Connectivity

network Requirements The company's large computing requirements require very sophisticated networking equipments.... Item DescriptionQuantity Required 1Siemon cat 6e networking cable 500 meters 2RJ 45 Clips 100 pieces 3Wireless print servers 5 units 448 port networking switches 8 units 5Wireless internet router3 units 6Wireless internet radio 2 units 7Servers 4 units 8Client workstations (personal computers)35 units 9Wireless Access point 5 units10 Firewall 3 units Equipments used Siemon cat 6 e network cabling media Here we are proposing to use Siemon Z-MAX 6A UTP cabling technology....
15 Pages (3750 words) Assignment

Integrated Software and Hardware Trading

The design of the network as elaborated in this report has been subject to providing the optimum network connections to all Integrated Software and Hardware Trading (ISHT)'s branches and mobile workers within and on the internet with all the constraints of costs, connection capacity, and speeds, network media, hardware and addressing space.... This report, therefore, has focussed on the establishment of the Integrated Software and Hardware Trading (ISHT) network that will ensure the continuous availability of stable connections and consequently ensuring the achievement of business goals....
8 Pages (2000 words) Report

Wireless Networks: Technology and Applications

The wireless network has standards that help to regulate the connections seen in the wireless networks.... It is well suited for connections that are meant for streaming purposes and also for connections that are meant for heavy downloads and uploads.... The paper "wireless Networks: Technology and Applications" looks at 802.... 1 vs Bluetooth wireless networks.... Bluetooth was a technological idea conceived by Ericsson Mobile Communication in 1994, it is a wireless communication based on a radio system that enables devices to communicate in a short range....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us