Network Operations - Coursework Example

Comments (0) Cite this document
LAN network covers small geographical area like homes, office or a school up to a range of 1km. Tamara, (2009) says that WAN covers a broad area of metropolitan, regional boundaries up to a distance of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Network Operations
Read TextPreview

Extract of sample "Network Operations"

Network Operations Question Criteria NetWare Windows Unix Linux Mac OSX Server Operating Systems NetWare Version 6 Windows Server 2008, 2012R2
Unix Linux Netware
Fedora , Ubuntu Network Server
Mac OS X Server
Very wide
TCP/IP support
NDS, file server
Microsoft name, Application Server
Stability, Speed, Flexibility
Stability, cost, Speed, flexibility
Stability, Speed
Question 2
LAN stands for local area network while WAN stands for Wide Area Network. LAN network covers small geographical area like homes, office or a school up to a range of 1km. Tamara, (2009) says that WAN covers a broad area of metropolitan, regional boundaries up to a distance of 10000km. LAN uses a peer to peer network topology while WAN, on the other hand, uses a Client to Server model of the topology. LAN uses Ethernet standard while WAN uses T1. LAN uses layer two devices switches and bridges and Layer 1 devices like hubs and repeaters. WAN mostly uses layer three devices like routers, multi-layer switches and other devices like ATM and Frame Relay switches.
Question 3
The user that gave the request might not have correct access rights to the application given, and it will result into the request failing. The issues can be avoided by setting the client and server to be in the same Windows domain. Make sure the user id of the customer is configured on both the client and server computers. There might be a failed communication between the client and server due to faulty connection hardware or no internet. No connection problems can be avoided by first establishing if there is a link to the server through the ping command. Problems might arise from weak firewall configurations. Firewalls might deny a client access to certain resources on the server, (Tamara, 2009). The problem can be avoided by first disabling firewall to ascertain if that is the cause of the problem and then configuring the firewall setting for the client in question. The transmission might not be successful due to power or electricity interruptions of either the client or server or both. Power interruptions can be avoided by having power backups. Transmission problems might arise due to change of IP addresses. The problem can be solved when using DHCP by setting client lease time to at list 24hrs. The problem can also be solved assigning static IP addresses to client, server or both.
Question 4
Setting up of the a WAN that covers a large area has a lot of challenges during the initial setup. The major challenges are staffing, existing applications, network equipment and managing connectivity outside of the primary organization location. Staffing and personnel implications to consider include; making sure that the correct employees with the required skills are available at every global location. The senior network designer should make sure there is constant communication with all the teams in all the locations. The personnel should have the correct motivation in terms of pay. Another staff implication from different regions is the situation of the working environment in their area. Barriers to an effective global team include: time restrictions where the working times are different which might create problems in coordination. Language barrier can also be a major challenge since there will be a lack of adequate understanding between the personnel. Other barriers include effective communication like challenges of video conferencing and coordination of all the staff and having the same schedule to adhere to is very hard.
Question 5
Setting up an effective WAN network requires powerful equipment and servers to implement the network (Tamara, 2009). The devices that will be needed include; several workstations, printers Ethernet cables, layer three devices like routers and multilayer switches. Each location in Peru, France, Hungary will have several servers preferably windows server 2012. Tere shall be a windows server 2012 standard and data center edition. Since the main office will be in USA, the servers to be used will be mainly data center edition. Each of the global locations will have a primary server, file sharing server and print server. The location in the USA will also have a web server to handle the website of the company. Users in each location will be able to access specific files from any of the locations if they have the correct access rights. The users will also have Internet access points in each site or network connectivity through LAN.
Shared devices in each location will include computer operating systems, data storage hard disks and printers. Resources of a computer will be shared through virtualization where several users can use a computers resources. It will be effected through the windows server. Printers will be shared through correct configuration of print servers in each location and storage hard disks will be shared through LAN connections and file sharing server.
Tamara Dean, (2009). Network+ Guide To Networks. Cengage Learning. New York. Read More
Cite this document
  • APA
  • MLA
(“Network Operations Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Network Operations Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from
(Network Operations Coursework Example | Topics and Well Written Essays - 500 Words)
Network Operations Coursework Example | Topics and Well Written Essays - 500 Words.
“Network Operations Coursework Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Network Security

...created new trends of doing business and communication. Furthermore, technology has provided a new approach of operating businesses during the past several years, and continues to provide numerous benefits as it spreads all over the world. However, with its extensive adoption, threats and vulnerabilities are also growing. Organisations spent vast funds to secure their confidential data and network environment. In addition, hardware security modules are taken into consideration for securing mission-critical data. However, these modules need frequent updates for virus definitions and new threats, which may disturb the network. Every now and then, new threats are designed and developed by...
24 Pages(6000 words)Essay

Social network

...?Dangers in Social Networking Sites Social networking sites paved way in connecting individual with one another via the internet, making the collective connections a virtual community – thus the term “social network” indeed. The interesting nature of the social networking site is that it is able to provide the users the freedom to express themselves and this makes social network sites very addicting. Facebook, My Space, Friendster, Twitter are among of the popular social networking sites to date, with Facebook as the most famous with the list and followed by Twitter – also known as micro-blogging site. A report stated that there are some...
3 Pages(750 words)Research Paper

Network Security

.... In addition, the additional integrated influence of encryption technique is regarded as the data compression feature. Therefore encryption is an outstanding technique of securing the communication and imperative business data and information (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Password Authentication Password authentication is a safety method which is implemented to validate network as well as web based users. In addition, the PAP transfers ASCII format passwords on the network and thereafter network server machines authenticate these passwords. Moreover, approximately all the network operating systems or NOS are compatible with...
13 Pages(3250 words)Research Paper

Network Security

...transport and Wi-Fi transport. This transport allows a device to directly link up with its associated BlackBerry enterprise server via Blackberry infrastructure. Connection in this instance can be made using Wi-Fi or mobile radio but, all settings lie on the blackberry platform thus giving access to more features. Finally, the WAP transport is a model that uses radio connection through a service provider’s WAP gateway. Like the cellular transport, configurations are done by either the service provider or device user. BlackBerry Network Operations Centre (NOC) is responsible for handling mobile user data between the cellular network and the internet. Seamless and successful data transfer...
7 Pages(1750 words)Essay

Network Security safeguard the flow of information to and from the said device on a given network whether public or private or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for a team to administrate this. There has to be a fine balance between the two whilst still safeguarding the network and the information it contains. Attackers generally have motives or goals—for example, to disrupt normal business operations or steal information. To achieve these motives or goals, they use various methods, tools, and techniques to exploit...
3 Pages(750 words)Case Study

Information and Network Centric Operations

...INFORMATION & NETWORK CENTRIC OPERATIONS Book Network Centric Warfare: Developing And Leveraging Information Superiority By: - David S. Alberts, John J. Garstka, Frederick P. Stein. This book is intended to describe with analytical rigor the concept of distributed networked operations, which is a refinement of what have popularly been called "network centric operations." an emerging concept to the fielding of real operational capability. Distributed networked operations envision combat being conducted by large numbers of diverse and small units-rather than by small...
13 Pages(3250 words)Essay

Operations And Operations Management

...Running Head: OPERATING SYSTEM & OPERATION MANAGER OF ORGANISATION One Way Of Considering An Organisation Is As An Operating System Which Converts Resources Into Goods And/Or Services [Writer's Name] [Name of Institute] One Way Of Considering An Organisation Is As An Operating System Which Converts Resources Into Goods And/Or Services Operations And Operations Management - Introduction From the definition given by Bennett Lewis & Oakley (1998, Pg 2-3) Operations management is a practical appearance of management sciences that assists organisations build up procedures to manufacture their goods and services more...
14 Pages(3500 words)Essay

Network Technology and Network Administration

...--------------------------- --------------------------- --------------------------- --------------------------- Network Technology and Network Administration Introduction Computers and the Internet are a wonderful addition to our lives. In today's computer world almost every person is connected to computer and internet in a way or other. A person spends a large portion of his life, interacting and collaborating with people all over the world, through the use of and Internet. But that does not mean that every user know every thing about computer and internet. It can be generalized that about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people possess only...
5 Pages(1250 words)Essay


...ETHERNET/ 802.3 Table of Contents Introduction 2.Basic Design Issues of an Ethernet network 1 Using Hubs/Repeaters 1.2. Hubs/Repeaters Limitations 1 1.3. Using Bridges/Switches 3 1.4. Basic Bridges/Switches Operations 4 1.5. Using Routers 6 3. References 7 Technick n.d. Ethernet Tutorial Part I: Networking Basics, viewed 23 May 2011, 7 List of Figures Figure 1 Repeater and Hub with different topologies 2 Figure 2 Basic Switch Setup 3 Figure 3 Loop Removal Through STP 6 Figure 4 Typical Router Configuration 7 List of Tables Table 1 Node Limitation in Hubs 5 Till present, Ethernet maintains its position...
4 Pages(1000 words)Essay


...Network International Company profile Network international is an independent card solution involved in payment services and providing solutions in the Gulf and Middle East region. It has pledged to fulfill the needs of institutions dealing with finance, corporate business and retailers (Network International). Network international gives a variety of services such as credit and debit card payment. According to Jim Randel, credit cards are used to borrow money from banks, which is a loan without collateral. A debit card is used to access a customer’s own money, which is backed by his or her own account. Outsourcing is important to keep up with the competition in the...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Network Operations for FREE!

Contact Us