Premium Essay

Local Area Network

In: Computers and Technology

Submitted By milly212
Words 924
Pages 4
Step by Step Guide to Setup LAN for Internet Cafe and Homes

Creating a Local Area Network is very easy. You can either hire someone to do it for you or do it yourself. In both cases the guide that follows comes handy. It teaches you how setup a LAN for your home or office or Internet cafe.
LAN is a network of connected computers and it can be used to organize a LAN party with your friends so you can enjoy multi-player games with them. In business it can help you share files between computers and share a single Internet connection.
Other uses of LAN are sharing Internet connection with neighbours and reducing the cost for everyone in the neighbourhood.

Requirements:

1) UTP Cat-5 Cables
[pic]

UTP Cat-5 Cables
2) RJ-45 Connectors
[pic]
RJ-45 Connectors
3) Crimping tool
[pic]
Crimping tool
4) Cable stripper
[pic]
Cable stripper
5) Broadband router
[pic]
Broadband Router
6) Switch
[pic]
LAN Switch

1. Choose a central location for the switch and the Broadband router 2. The cables from each outlet will reach the switch so locating the switch along with the router at the center of the network is the best option to save the cable lengths. Place the router and the switch close to each other. 3. Measure the distance of each computer from the switch. 4. Prepare cables to connect the computers with the switch. 1. Cut the required length of the cable. 2. Strip it up to 2 inches with the stripper from one end 3. Arrange the cables in the Straight-Through manner. 4. Cut the cables in such a way that the stripped length is less than ½ inch. 5. Hold the RJ-45 connector in an upside-down manner (i.e. the little pin is downward) 6. Insert the wires into the connector so that the color combination is not disturbed. 7. Punch the connector with the crimping tool 8. Repeat the steps ‘1’…...

Similar Documents

Premium Essay

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link......

Words: 572 - Pages: 3

Free Essay

Implementation and Analysis of a Wide Area Network

...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................

Words: 1948 - Pages: 8

Free Essay

Contrasting Web Browsers and Local-Area Networks

...Browsers and Local-Area Networks Using Quaketail T. Lam Abstract Many electrical engineers would agree that, had it not been for virtual machines, the practical unification of Scheme and semaphores might never have occurred. After years of confirmed research into 802.11 mesh networks, we disconfirm the visualization of SMPs. In our research we verify that operating systems and access points are mostly incompatible. Quaketail is not able to be visualized to manage lambda calculus. The shortcoming of this type of approach, however, is that linked lists and Web services are never incompatible. We emphasize that Quaketail turns the encrypted archetypes sledgehammer into a scalpel. The effect on steganography of this has been adamantly opposed. Combined with metamorphic modalities, it harnesses a Bayesian tool for synthesizing redundancy. Leading analysts continuously analyze the refinement of Internet QoS in the place of redundancy [16] [16]. The shortcoming of this 1 Introduction type of solution, however, is that Byzantine fault tolerance can be made low-energy, cerDistributed configurations and IPv6 have tifiable, and scalable [30, 24]. We emphasize garnered tremendous interest from both in- that our heuristic is NP-complete. Clearly, formation theorists and information theorists Quaketail harnesses 802.11 mesh networks. in the last several years. We emphasize that Here, we make two main contributions. our algorithm simulates the construction of wide-area networks, without......

Words: 2613 - Pages: 11

Free Essay

Local Area Network

...Local Area Networks Vorlesung Prof. Dr. Michael Tüxen Klausurenzusammenfassung • • • • • 2005 2006 2008 2009 2010 Keine Garantie gegen Fehler! Inhalt 1 2 3 OSI Modell .............................................................................................................................................................................................. 4 Schichten angeben und Protokolle SMTP, TCP, IP (IP-Suite) zuordnen. ............................................................................................. 4 Grafische Darstellung der Protokolle ...................................................................................................................................................... 4 Kommunikationsarten ............................................................................................................................................................................ 4 3.1 Anycast .............................................................................................................................................................................................. 4 3.2 Unicast ............................................................................................................................................................................................... 5 3.3 Broadcast .............................................................................................................................................................

Words: 1548 - Pages: 7

Premium Essay

Body Area Networks

...Healthcare IT Emerging Technology Body Area Networks; Device Interference Suppression Kimberly Miller PSIS 4199 Fall 2013 The advances in microelectronics and wireless networking are contributing to the evolution of medical devices once thought of as science fiction into clinical reality. Ultra-small medical sensors/actuators worn or implanted inside the body have the capability to collect or deliver a variety of medical information and services. The networking ability between these body devices and the possible integration with existing IT infrastructure could allow them to transmit health-related information between the user's location and the healthcare service provider. This opportunity for greater physical mobility can directly translate into a significantly better healthcare experience; and therefore, higher quality of life. Body Area Network (BAN) is the technology that allows communication between ultra-small and ultra-low power intelligent sensors/devices mentioned above. The wearable or implantable nodes can also communicate to a controller device that is located in the vicinity of the body. These radio-enabled sensors can be used wirelessly to continuously gather a variety of important health and/or physiological data that is critical to providing care. Radio-enabled implantable medical devices allow us to further pursue applications that can revolutionize care delivery including smart pills for precision drug delivery,......

Words: 473 - Pages: 2

Premium Essay

Fundamentals of Local Area Network

...another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices. a. Describe what network device or devices are recommended for purpose for the given home network scenario(s). For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables. b. Explain the recommendations justifying why these would suit the needs for the network The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An advantage of having a wireless router is that it provides more safety, compared to connecting your broadband directly to your computer, because your computer's local IP addresses aren’t visible to the Internet, which......

Words: 1210 - Pages: 5

Free Essay

Voice over Wireless Local Area Network

...Voice over Wireless Local Area Network In this week’s report I will be discussing how voice traffic is went over a typical wireless local network. I will also provide information on what the advantages to using a wireless network, the problems associated with using a wireless network and what are the best solutions in overcoming these issues. A Wireless Voice network or VoWLAN (Voice over WLAN) is how we send digital voice traffic over a wireless broadband network. The type of wireless set up is basically VoIP sent over a WiFi Access Point. Within the industry this type of VoIP set up is call VoWLAN or WiFi VoIP because it uses the standards set for transporting data by the IEEE 802.11 for wireless technology. In order to use this technology we have to use a VoWLAN enabled device; the most common device on the main stream market is the PDA. There are other devices available like the WiFi handset which looks like a cell phone, but it allows voice data packets sent over the network rather than the normal analog voice signal. One of the other major enterprise level devices is not a device at all. It is software based and is loaded on to a workstation or laptop. This type of software is call softphone. It is a virtual phone that routes call through the WLAN AP to the VoIP gateway or IP PBX. There are some advantages and disadvantages to using this type of technology. One of the major advantages is cost a majority of user have WiFi hotspot available in order to stay connected.......

Words: 661 - Pages: 3

Free Essay

Submission to Local Network Cib

...ASSESMENT 2 – Report By Brenda Widjaja Lala Director, Corporate Communications South Africa HSBC Mandela Rhodes Place Cnr Wale Burg Street Cape Town South Africa April 23, 2012 Mrs. Grace Executive of the Local Network 3rd Floor, MPF House 32 Princess of Wales Terrace Sunnyside Office Park Park town Dear Mrs. Anne Marie Gutierrez, Executive of the Local Network Submission to Johannesburg the Local Network of South Africa This proposal is presented to the local network of South Africa in order to against human rights and environment cases. According to the United Global Compact, HSBC strives to encourage the changes of human rights and environmental cases to the better side. HSBC is supporting to the first of ten principles which is “Business should support and respect the protection of internationally proclaimed human rights” and also the eighth principles which says that “Business should undertake initiative to promote greater environmental responsibility” (Ten Principles 2012). In 2007, HSBC has encouraged the changes in the environmental cases by cooperating with First Direct, they plant for more than 20.000 trees in each country (First direct 2010). They also encourage their customers to switch to use online banking. More than one million of HSBC and First Direct customers switch to use online banking. On the other hand, there is a risk of doing this system. More than 3.1 million customers are left from the HSBC members (Espiner 2006).......

Words: 1350 - Pages: 6

Premium Essay

Lab7 Wide Area Networks

...Wide-Area Networks | | | David | 4/30/2014 | | Exercise 7.1.1: Owning the entirety of a WAN is impractical for an organization because there are no limitations and they can be custom built to the organization. It is favorable for the organization to maintain a LAN for expansion purposes. Exercise 7.1.2: On a WAN there is no absolute limit for the distance of a leased line. Table 7-1 WAN Physical Media Media | Infrastructure | Summary | UTP | Phone lines | Uses copper lines between all locations, limited speed with the lines. Already in place, can be very cheap to use | Coaxial | Television cable | Must run cable to all locations, can carry much higher speeds than Telco. Is a little more expensive to run. Needs boosters at specific distances | Fiber-optic | Glass cables with POP’s at specific distances | Uses a customized infrastructure to run dedicated connections: this is a costly option | Electric power lines | Power lines. They are everywhere and the infrastructure is already there | This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already | Table 7-2 WAN Wireless Media Media | Summary | Satellite | Not very fast, has a delay of about 1 second, very costly to use. Uses a star topology | Imax (Worldwide Interoperability for Microwave Access) | This has 75Mbps speeds and can transmit for distances up to 30 miles. It is designed for metropolitan areas.......

Words: 784 - Pages: 4

Premium Essay

Issc 340: Local Area Network Technologies

...Case Study 2 January 24, 2013 ISSC 340: Local Area Network Technologies American Military University   This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance. First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high......

Words: 1522 - Pages: 7

Premium Essay

Auditing Local Area Network

...NIST The purpose of this publication is to provide organizations with recommendations for improving the Security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified wireless networks and unclassified facilities within range of unclassified wireless networks. This publication supplements other NIST publications by consolidating and strengthening their key recommendations, and it points readers to the appropriate NIST publications for additional information (see Appendix C for the full list of references and Appendix A for a list of major security controls relevant for WLAN security). This publication does not eliminate the need to follow recommendations in other NIST publications, such as [SP800-48] and [SP800-97]. If there is a conflict between recommendations in this publication and another NIST wireless publication, the recommendation in this publication takes precedence. NIST Special Publication 800-53 is part of the Special Publication 800-series that reports on the Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and on ITL’s activity with industry, government, and academic organizations. Specifically, NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection for federal information systems in......

Words: 1201 - Pages: 5

Premium Essay

The Future of Wireless Wide Area Networks

...send data across the public internet, the space agency uses a shadow network called ESnet, short for Energy Science Network, a set of private pipes that has demonstrated cross-country data transfers of 91 gigabits per second–the fastest of its type ever reported. NASA isn’t going bring these speeds to homes, but it is using this super-fast networking technology to explore the next wave of computing applications. ESnet, which is run by the U.S. Department of Energy, is an important tool for researchers who deal in massive amounts of data generated by projects such as the Large Hadron Collider and the Human Genome Project. Rather sending hard disks back and forth through the mail, they can trade data via the ultra-fast network. “Our vision for the world is that scientific discovery shouldn’t be constrained by geography,” says ESnet director Gregory Bell. In making its network as fast as it can possibly be, ESnet and researchers are organizations like NASA are field testing networking technologies that may eventually find their way into the commercial internet. In short, ESnet a window into what our computing world will eventually look like. The Other Net The first nationwide computer research network was the Defense Department’s ARPAnet, which evolved into the modern internet. But it wasn’t the last network of its kind. In 1976, the Department of Energy sponsored the creation of the Magnetic Fusion Energy Network to connect what is today the National Energy Research......

Words: 426 - Pages: 2

Premium Essay

Network Design for a Local Business

...Network Design for A local Business Name: Course: Instructor: Institution: Date of Submission: Network Design for A local Business The world is moving towards technology, therefore, each and every business whether local or international need to have a well equipped and reliable network. Network design simply ensures that a new technological service satisfy the various needs of the operators and also the subscribers. A network design involves connections of different devices with some end systems, for example, computers or mobile phones and servers that can link to each other well (Juan, 2004). However for our case various locations or departments in our local business need to relate or communicate to each other to provide smooth flow of information. When designing a network for a company we require equipment such as the physical components. These components are the hard drive devices, and they form a computer network through interconnection. Therefore, we shall vary the number and size of these physical components to the size of the network that the business requires. However, our local business has little number of employees of approximately 50 people. In computer network design there are mainly four major physical components. These components have been placed in categories that include but not limited to personal computers (PCs), routers, switches and lastly the interconnections. However, to implement this network design, the following equipment are...

Words: 1355 - Pages: 6

Premium Essay

Local and Wide Area Networks

...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the......

Words: 1253 - Pages: 6

Premium Essay

Riordan Manufacturing Company Inc. Wide Area Network

...The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network and network security in place requires updated documentation. The purpose of this paper is to gather the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their networks today, a plan for future upgrades and a baseline to evaluate security. The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning. Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes......

Words: 11081 - Pages: 45