Networking Essay, Research Paper
For my independent study, I have created a network in my house. A network by definition are more than one computer that are linked together electronically via a protocol (common language) so the computers can communicate and share resources. This network improves the day-to-day life by adding value and usefulness to the computers. The processes and ideas that I have learned thru this experience can be applied directly into today’s rich electronic business environment.
Identifying the needs of the user is the first step for building a well-designed Network. A professional installation was needed to maintain the aesthetics of the rental house. Most of the wires are run in the attic and then down plastic conduit attached to the wall. The conduit is run all the way to the wall boxes where the Ethernet ports are located. Every wire is clearly labeled and included in an easy to read schematic of the house. This way future tenants will have the ability to utilize the network. Next, every room needed to have access to the network. In order to minimize the overall use of wires, hubs were placed in strategic locations. An 8-port 10/100-megabit auto-sensing hub is located in the computer room and a 5 port 10-megabit in the sound room. There, needed to be docking stations, so laptop users or visiting computers could easily plug into the network and utilize the pre-existing monitor, keyboard, and mouse. These are the basic needs that have been put into the design of the network.
Each computer setup is unique with certain strengths and weaknesses. The network takes advantage of the strengths of each individual computer and makes them available to all users. A network essentially expands the capabilities of each computer by increasing functionality thru resource sharing. In the house, there are a total of four computers and two laptops. Processing speed and an abundance of ram is not essential for a server with such low traffic. Thus the most antiquated computer was elected for this function. Between all the computers, we have several extra pieces of hardware such as a zip drive, CDRW, DVD ROM, scanner, and multiple printers. Each piece of hardware is dispersed between the computers.
There were several immediate efficiencies that occurred when the network went operational. The zip drive is located on the server while the CDRW is located on one of the individual workstations. Previously, if the need arose to burn some information stored on the zip disk to a CD, the individual computers were practically worthless for this task. However, with the network, one can map a network drive on the computer with the CDRW to the zip drive on the server. This allows information to be efficiently transferred from the zip drive to a CD. In addition, the server also has a scanner attached to it. The problem is that the server is too slow to handle sophisticated photo editing software. Now an image can be scanned on to the server and then a faster computer can be used to edit it. There are 3 different printers, each varies in quality, speed, and maintenance costs. The most expensive one is reserved for only making color photos, and the other two are used for everyday printing, one of which is much faster and has more reliable paper feeding. A user can easily choose a printer depending on their needs. This network takes full advantage of each computer through resource sharing which ads tremendous value for its users.
In Business it is important in any network to be able to restrict access to individuals private files or directories. Security would demand that not all users would be allowed access to highly confidential information. There is other information that would be made available to other users on a read only basis. The same is true of the users in my network. Microsoft developed NT to be very secure. Most of this security is devoted to protecting network resources and the filing system (NTFS). The administrator decides who gets access to which resources by setting up users and user groups. Each person is asked to choose a user name and password. Then the administrator identifies the needs and privileges of each individual user. Next the administrator grants users either full access, modify, change, read only, or no access at all to directories and resources on the network. In the house each roommate, trusted friend, and guest is given a user name and rights to the resources he/she needs. Roommates, as a profile group, have access to the Server’s C drive, which contains the core o/s. They are also given access to all directories on the D or storage drive except for the individual User and private directories. The User’s Folder has a directory for each user to store personal files on the Server. The read and write rights are given only to that user, so the data in that directory is secure. A Guest account is set up for anybody to use. This account is given minimal access to resources with no ability to adjust system settings or cause adverse affects.
There were four operating systems to deal with on this project. Two laptops and one of the PC’s use windows 98 while another pc runs 2000 Advanced server, and the server uses NT 4.0 SP 6 with a dual boot of Linux Red Hat 7.0. Microsoft developed windows 98 for the home user and did not include adequate security with the FAT32 filing system. When a user logs onto a machine utilizing the windows 98 o/s, they have access to all the information on that computer and have the ability delete, change, or modify directories. In any event the server still secures the rest of the network and only grants access to the pre-determined resources. The NT and 2000 machines can be set up to allow different levels of users access inside that machine, and also restrict rights to others on the network. On these operating systems A guest account would be denied most write privileges so they couldn’t accidentally delete important files. It is a security flaw in the network that cannot be fixed without upgrading the operating systems on machines that run windows 98.
Most businesses store their vital records in the form of digital data. Keeping this data secure is a key issue. Many problems may arise that can cause the loss or corruption of data. A virus attack, system crash, hardware failure, or a natural disaster are just a few potential problems that could cause loss of information and in turn devastate a company. It is imperative for a business to consider these possibilities and make sure they back up their data.
As college students living in the technology age, we too have lots of important data stored on our computers. This information ranges from term papers to financial records that would be devastating if lost. This is even a bigger worry with laptops as they go thru the daily rigors and abuse of being transported and connected to many different networks. It only takes one bad bump (over 14 to 17 G’s of force) to break a hard drive arm and/or data reading heads to render it useless. Possible virus threat, accidentally transmitted thru email, could corrupt a hard drive and render the O.S. useless and trash the hard drive. For all the above reasons we needed to put a system in place to back up all of our information. One of the benefits of the network is that backing up data is both fast and convenient. For example, the users in my network back up their data onto their user directory located on the server. Once a month, the user directory is burnt onto a CD. This back up is then stored in a fireproof lockbox, where it is guaranteed to be safe. Getting into the habit of such practices is imperative for today’s I.T. professional.
Connecting a network to the Internet can bring tremendous improvements in productivity, but not without posing major security issues. A network always has to be on the defense, making sure the information and systems that lie within are protected. Anybody can hack right into an unprotected network with just a little bit of knowledge. Once inside, a hacker can access confidential information, read, write, install a virus, or delete whatever he/she sees fit. In order to prevent such attacks over the Internet, a firewall needs to be installed. A firewall is powerful defensive software that blocks unauthorized intruders from entering a network. There are many ways to configure a firewall. Generally, a firewall locks down all ports except for ports being managed by secure communication programs, such as email. It also does not allow in coming request from the Internet for network resources. Sybergate Personal Firewall has been installed on the network to protect it from outside attacks. Once configured, I tested it at scan.sygatetech. It scans all the ports and tries some Trojans to ensure that the network is protected.
Overall I view the project as being successful. The network is up and running and all the users are able to be more productive. The ability to access all the different peripherals is a real money saver for the budget conscious college student. Personally I found the setting up of the security features and the installation of the software to be the most rewarding part of the experience. My next step in my ongoing process to improve the network is to install and configure Apache. This gives a unique opportunity to see first hand how Unix manages a network as compared to Windows. I have learned marketable job skills that I intend on applying in the interview process. I am even now considering becoming a network specialist as a career.
Другие работы по теме:
College Admision Essay Research Paper Being accepted
College Admision Essay, Research Paper Being accepted into College would open up a lot of opportunities for my future. Ever since I was a child, I have been in awe about how computers operate. At the age of fifteen, I got a summer job at Fallon Clinic, doing computer repair and computer networking. Later I proceeded to build a computer out of spare parts, and from then on I have wanted to be a computer engineer.
Pysch Essay Research Paper Research Methods is
Pysch Essay, Research Paper Research Methods- is when you make and test prediction of the relations between variables. Its the study of behaviour. Variables is any condition, event, characteristic or behaviour.
September 11 Essay Research Paper During the
September 11 Essay, Research Paper During the summer of tenth grade, I took a number theory course at Johns Hopkins University with students from Alaska, California, and Bogota, Colombia. My attendance of the New Jersey Governor’s School in the Sciences is another accomplishment that exemplifies my dedication to knowledge.
Truth Essay Research Paper Is there any
Truth Essay, Research Paper Is there any objective truth? Or must we finally accept that at bottom, in the end, philosophically speaking, there is no “real” or “objective” or “absolute” or “foundational” or “fact of the matter” or “right answer” truth about anything, that even our most confident convictions about what happened in the past or what the universe is made of or who we are or what is beautiful or who is wicked are just our convictions, just conventions, just ideology, just badges of power, just the rules of the language games we choose to play, just the product of our irrepressible disposition to deceive ourselves that we have discovered out there in some external, objective, timeless, mind-independent, world what we have actually invented ourselves, out of instinct, imagination and culture?
Two Kinds Essay Research Paper The protagonist
Two Kinds Essay, Research Paper The protagonist Amy Tan, in the short story “Two Kinds” is a character that evolves and undergoes a lot of phases throughout the story to finally come to a point where she is happy and independent. At the beginning of the story Amy seems to be a happy and obedient little girl that agrees with everything her mom tells her.
Three Vitures Of SelfControl Moderation And Independent
Thinking Essay, Research Paper People possess many virtues. They can vary from person to person. Some of them are good and others aren?t. The three best virtues to have would be self-control, moderation and independent thinking.
Independent Spirit Essay Essay Research Paper There
Independent Spirit Essay Essay, Research Paper There can be a difference between a dependent and independent spirits. Independent spirits can be found in everyone and how your independent spirit can help others.
Gaming In Society Essay Research Paper Gaming
Gaming In Society Essay, Research Paper Gaming in Society A wide variety of gaming activities are available in most communities in Alberta. It is possible to gamble almost anywhere in the province because of things like satellites and cable networking. Surveys and research from Alberta Alcohol and Drug Abuse Commission show : the vast majority of adult Albertans gamble at least occasionally during the course of a year. about 40% gamble at least once per week. most gamble for the entertainment value, or to win money.people who gamble all have different amounts of income and are in all different age groups. the percentage of adults who gamble is higher than those who consume alcohol, or smoke tobacco, or take illegal drugs. per capita, adults in Alberta spend $1,344 per year on lotteries and gaming. on average, people in Alberta spend as much on gaming as they do for clothing.
Drugs And Alcoholism Why Are Teenagers Involved
? Essay, Research Paper Adolescence is much like a midpoint in ones life; when a person is neither a kid nor an adult. At this period, teens have passed the age when they were called kids but are not yet qualified to be adults. Teenagers want to think like adults, behave like adults and also start to view themselves as independent beings in decision making.
The Patriotic Canadian Essay Research Paper For
The Patriotic Canadian Essay, Research Paper For over 130 years, Canada still keeps its word. Our Fathers of Canadian Confederation expressed their firm commitment when they signed the British North Amerian Act 139 years ago. Peace, Order and Good Government. For as long as I can remember, Canada has promoted peace any way possible.
Jane Eyre EssayIndependence Essay Research Paper Jane
Jane Eyre Essay-Independence Essay, Research Paper Jane Eyre, a novel written by Charlotte Bronte, is about a young girl named Jane that struggles to discover her identity. Jane’s a girl who is “unhappy, very unhappy”(23). She grows up with relatives that treat her unfairly because her diseased family was not wealthy.
The Importance Of Budgeting And Long Range
Financial Goals Essay, Research Paper The Importance of Budgeting and Long Range Financial Goals Me, being a financial independent have experienced first hand how important it is to keep a financial plan. Using a financial plan I have elevated my savings abilities a long way. Knowing where each dollar is being spent helps the spender to manage each dollar in an uplifting way.
Scripts Essay Research Paper 30
Scripts Essay, Research Paper 3.0 Variables Scripts may contain variables. Variable names must begin with a letter or an underscore (’_'), and may contain any sequence of upper- or lower-case letters, digits, and underscores. You cannot use a reserved word as a variable name. For more information, see the list of reserved words at the end of this document.
Divine Command Theory Essay Research Paper The
Divine Command Theory Essay, Research Paper The Divine Command Theory Religion and ethics are seen to be somehow inseparable in our culture. Religious leaders are usually appealed to in some capacity when
Independance Essay Research Paper IndependenceIt is frightening
Independance Essay, Research Paper Independence It is frightening to be alone and to have to fend for yourself and make your own choices. Sometimes though it is a good thing to think for yourself and to not let other people tell you what to do with your life. When you are independent you do what you really want to do and stop letting others influence your decisions.
Mr Essay Research Paper Aspects of the
Mr. Essay, Research Paper Aspects of the Perfect Female The ideal woman of today’s society would contain the following qualities: intelligence, honesty, a sense of humor, spontaneity, assertiveness,
Necessity Of The US Civil War Essay
, Research Paper Necessity of the U.S. Civil War- When Abraham Lincoln was elected president in 1860, the south saw their economy and way of life threatened. They didn’t like
Black Boy Paper Essay Research Paper Black
Black Boy Paper Essay, Research Paper Black Boy Paper When put into a foreign environment animal s adept, so do humans when they need to learn they ways of life. Richard Wright, due to his surroundings, had to adapt and become independent early in his life. In the book, Black Boy, Richard shows how he progressively became independent in his writings.
Media Essay Research Paper Media AwarenessThe case
Media Essay, Research Paper Media Awareness The case that I decided to focus on is an older abuse case, but it has recently been resolved in the courts. It is a child abuse case involving James and Bonnie Zeleski. They
Different Learning Styles Essay Research Paper In
Different Learning Styles Essay, Research Paper In our English class we took a test on what kind of learning style characteristics we have. Learning the different style writings that I have helped me discover mor of what I’m about. When people learn more about their learning styles, they can take what they have learned and turn it toward your job, but mostly just toward life in general.
Old Africa Vs New Africa Essay Research
Paper Old Africa vs. New Africa Aaron S On my essay about “Out of Africa” I will compare and contrast old Africa and new Africa. During the movie Africa was under European power. There were only independent countries. European leaders dictated their government. Africa has since become independent. European power has greatly changed education over the years.
Admisions Essay Research Paper What a Regis
Admisions Essay, Research Paper What a Regis University Education Will Mean to Me I want to learn to take risks. I want to change my attitude about taking chances, and if I do take chances to take the right ones. By assessing my academic and extracurricular achievements, I am proud of my accomplishments. I see myself as an open-minded, goal-oriented person who achieves and succeeds through hard work and determination.
Privacy Essay Research Paper As laws policies
Privacy Essay, Research Paper As laws, policies, and technological design increasingly structure people’s relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging.
Asynchronous Transfer Mode Networking Atm Essay Research
Paper Asynchronous Transfer Mode (ATM) Networking Asynchronous Transfer Mode (ATM) is, and will be for many years to come, the top of the line in networking technology. Since the creation of the Network (the ARPAnet (Advanced Research Project Agency Network)) scientists and engineers have strived to achieve the fastest information exchange speeds combined with the most cost-efficient hardware and software.
Windows 95 Beats Mac Essay Research Paper
Windows 95 Beats Mac Over the years, there has been much argument over which computer platform to buy. The two contenders in theis competions have been the PC , with its Windows
Independence Day Relfection Essay Research Paper Independence
Independence Day Relfection Essay, Research Paper Independence Day! A day of celebration for all ages and races. Independence Day was the day in which the nation of Stars and Stripes became free and independent from the British. A day when the 13 colonies united to become one. It’s now a day when Americans commemorate the signing of the Declaration of Independence by kicking back and having a cold one.
Networking Essay Research Paper There are many
Networking Essay, Research Paper There are many kinds of networks, however this paper will be about networking computers. As we move further and further into the paperless society, the need for people to be connected and able to exchange data just as fast as they could by handing a paper to someone increases.
Lucent Technologies Report Essay Research Paper LUCENT
Lucent Technologies Report Essay, Research Paper LUCENT TECHNOLOGY COMPANY OVERVIEW Lucent Technologies is a company that is focused on being a leader in the field of technology in building a broadband and mobile Internet community that will hopefully make a difference in the way people communicate. Lucent also provides the systems, software, silicon, and services for what has been created as the largest networking company built from the ground up in history.
Token Vs Ethernet Essay Research Paper Well
Token Vs Ethernet Essay, Research Paper Well, now I feel confused about this whole situation. I started taking classes part time at BU about five years ago. I took two networking classes, Network hardware and Network management. I didn?t transfer my credits to um because the technology had changed so fast, and I wanted to learn the newest technology.