StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Classification of Access Network Types - Assignment Example

Cite this document
Summary
The paper "Classification of Access Network Types" suggests that a domain is a security boundary for a network located and made operational on the Local Area Network (LAN). It actually is a subnetwork made up of clients and servers, that actually are under the control of one central security database…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Classification of Access Network Types
Read Text Preview

Extract of sample "Classification of Access Network Types"

? MegaCorp Surf Shoppe Information Techonology [Pick the Domain basically is a security boundary for a network located and made operational on the Local Area Network (LAN). It actually is a subnetwork made up of clients and servers, that actually are under the control of one central security database. Megacorp can instead of moderately and repeatedly authenticicating or validating to its individual servers and clients, stay within a domain . It lets the users have to just for once authenticate to a centralized server known as a domain controller (University of Exeter, 2012). Organizational unit is a part of active directory that is used for its organizing and management. Under Microsoft’s documentation,the term “organizational unit” is interchangeably used with the term “container”.It is a further subdivision of an active directory into which can be placed users, different systems (computers) and other organizational units that are operational in megacorp. These organizational units can be used for mirroring the organization’s structuring i.e., megacorp forest’s working and its operational maintenance. In fact, every domain can independently organize, implement and maintain its own organizational unit hierarchy. If megacorporation incorporates several domains, it can conveneiently create organizational unit structures in each domain that stands idependent and self operational against the structures in other domains. (Wei Wei, Bing wang & Chun Zhang, 2004) 2. If Megacorp services intend to connect and yet stay separate from the Megacorp forest structure, this can be done through offline domain join, which is progressively used in Windows Server 2007 and Windows Server 2008. It can be used to join a domain without actually engaging or contacting the domain controller. This way, megacorp Forest structure would connect and yet emain separate (karen Coyle & diane Hillman, 2007). Megacorp might intend to deploy many virtual machines in the data centre. Offline domain join would make it possible for the virtual machines to be joinesd to the domain name when they nitially start after the installation of windows 2008. This would additionally save a huge amount of time that could be required for wide scale virtual machine deployments. This scenario of domain join creates an aunthenticity relationship and a trust between the active directory domain and the system running the windows 2008 operating system. Windows 2008 server also offers a mechanism that can be used by negacorp services to connect and yet maintain their separate identity. Under this mechanism, domain join operations are performed undera read only domain controller (RODC). The following muktiple steps have to performed by read only domain controller (RODC) to process the domain join operation: 1. The computer account has to be created in advance in the directory and further settle certain attributes through the scripts. 2. Alongside, the Password Replication Policy (PRP) of the Read Only Domain Controller (RODC) has to be modified so as to permit the system that you want to join to be cached by RODC. 3. Duplication and replication of the system has to ensured so as to further facilitate the system through joining the domain. 4. Inform the computer that is about to join the domain through offline sources. 5. Finally, test through running a custom script that targets the Read Only Domain Control to facilitate the join. (University of Exeter, 2012) 3. Access networks are dramatically of different types as they consist of links between connecting the end user systems and the edge routers. The three most pervasive and widespread types are:Dial up, Assymetric Digital Subscriber Line (ADSL) and Hybrid Fiber Coaxical Cable (HFC). Ethernet and switched Ethernet are the commonly classified Local Area Network (LAN) technologies that can be incorporated by megacorp since most of the businesses use it. Mgacorp can additionally focus on the Wireless Local Area Network (WLAN) using the IEEE 802.11d standard that is most frequently being used in the offices. The various type of access networks have different type of functuniong oprerational setup based upon their capacity, the symmentry of horizontal, vertical and/or upward downward downloads and the physical media. Where dial up connections have a record of lesser time span, megacorp should experience with cable, modem and Assymetric Digital Subscriber Line as they provide a longer on line time. 1. IEEE 802.11d Mrgacorp can use this since it provides a physical layer for media access control (MAC) for WLAN. It coordinates the shared media through the use of multiple stations. If the media is busy, megacorp can still operate using a binary exponential backoff procuder. 2. DOCSIS If megacorp uses a cable network, it can avail the downstream channel from the Cable Modem Termination System (CMTS) to the headend to the cable at the main point shared by many different domains. (University of Exeter, 2012) 3. Ethernet, ADSL and Dial up They can be equally beneficial for megacorp since they have a dedicated access ang high bandwith. Another additionally advantage megacorp can have of using this access is that it has a high ability to detetct collisions. (Wei Wei, Bing wang & Chun Zhang, 2004) 4. The eqiupmwnts neede by surf shopping building to settle the minimum requirement list of display screen workstation system is as follows: Display screen keyboard Mouse WorkChair Desk Working Environment Display Screen: The screen must be placed at alomist a distance of 35 – 60 cm at all floors from the user’s eye sight. For touch typists, the screen should be elevated, with their eye levels conveneiently settled to be positioned abovethe eye glance level. Keyboard: The keyboards should have adjustable rear supports so as to raise the keyboard to a certain level. Mouse or Track ball: The mouse should be accessible with an easy reach and their should be sufficient space to move the mouse. Some mouse pads have a buiklt in wrist rest. All the users at different floors should be equipped with these pads Work Chair: The chair should be confortable in height and posture maintainence and have a five footed base with a castors and a swivel seat of comfort. It should have an adjustability to ensure horizontal handling of the keyboard. Desk: The work surface should have enough space for hurdle free writing. The tableis the actual work station and thus it shiuld be furnished well enough to equio the worker with all the facilities to focus on the target wriring/working. Environment: The working environment is in fact the biggest contributive factor. The lighting should be focused in brightness and quality based upon the floor it is used at. Ceiling light on the thir floor should not be too light to cause eye fatigue. Desk lamps should be arranged to overcome any light problems. The working space should be very conjusted that can create a problem for the mobility. Temperature, humidity and ventilation should also be focued since as a general rule, office environment temperature should not be lower than 16 degrees. The humidity level should be maintained at a suffice level on the third floor Fire Protection: There should be easy exit for third floor workers in case of any fire alarm and an easy to use fire extinguisher that can be used to kill the fuming before the fire breaks. There should also be equally suitable fire working for the workers on the first floor. 5. Since magacorp has rented its second floor to webheads, a different business entity has envaded their premises that could bring in a lot of additional environmental nuisance. Although the Webhead is on a different floor, the customer are employeemovements across the building can contribute towards creating lack of concentration amongst the employees. It also leads to lack of confidentiality of information. 6. Task: Preparation for active directory Installation: Procuder: Install the DNS Server Tool: Control panel Task: Install Active Directory Procuder: verify DNS registration and functioning, verify IP address maps, Install active directory,verify communication with other domain controllers, verify the operation of masters Tool: Dcpromo.exe, Dcdiag.exe and Netdiag. exe Task: Perform active directory post installation task Procuder: Determine whether a server object has child objects, verify the site assignment of a domain controller, move domain controller to a different site, check the status of the shared system volume. Tool: Active Directory Sites and Services 7. (visio.org, 2013) References karen Coyle & diane Hillman. (2007). D - Lib Magazine Organization. Retrieved from http://www.dlib.org/dlib/january07/coyle/01coyle.html University of Exeter. (2012). Retrieved from http://www.exeter.ac.uk/staff/wellbeing/oh/services/displayscreenequipmentdse/dseworkstationassessmentguidance/ visio.org. (2013). Retrieved from http://www.visio.org/knowledge---expertise/research Wei Wei, Bing wang & Chun Zhang. (2004). Classification of access Network types. University of Massachusteus. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MegaCorp Surf Shoppe Assignment Example | Topics and Well Written Essays - 1250 words”, n.d.)
MegaCorp Surf Shoppe Assignment Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1483306-megacorp-surf-shoppe
(MegaCorp Surf Shoppe Assignment Example | Topics and Well Written Essays - 1250 Words)
MegaCorp Surf Shoppe Assignment Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1483306-megacorp-surf-shoppe.
“MegaCorp Surf Shoppe Assignment Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1483306-megacorp-surf-shoppe.
  • Cited: 0 times

CHECK THESE SAMPLES OF Classification of Access Network Types

Neural Networks for handwriting recognition

16 Pages (4000 words) Essay

Social Classification in America

In this direction, the paper examines the various bases for the classification of people and households in America.... Historically, the most popular basis for the classification of people in American society has been racing (Thompson & Hickey, 2005).... owever, in the 21st Century, the classification of people into groups based on their racial features has been found to be unconstitutional, unfair, illegal and unacceptable.... he different methods of classification of social groups are based on a number of criteria....
6 Pages (1500 words) Essay

Information Communication Technology

Diagram of Network Classification: types of Network:"Networks are often classified into different types as local area network (LAN), wide area network (WAN), metropolitan area network (MAN), personal area network (PAN), virtual private network (VPN), campus area network (CAN), storage area network (SAN), and others, depending on their scale, scope and purpose.... Usage, trust level, and access right often differ between these types of network....
8 Pages (2000 words) Essay

Social Networks User Types, Models

From the paper "Social Networks User types, Models " it is clear that the social networking sites must implement the data mining techniques like classification and clustering.... This paper deals with the various user types and the models of social networking.... Social networking users are generally classified into six types.... These types of users are classified based on their personalities and their types....
4 Pages (1000 words) Article

Information Security Audit and Assurance

he time of access and use of KD 2.... In this regard, access to and use of this laboratory is restricted to half past 8 in the morning to 5.... ith particular reference to the university classification criteria, all the laboratory users shall be classified as level 1 (regular students), level 2 (P-3 and below) and level 3(P-4 and above).... This university standard model for classification is contained in the University Human Resource Management Framework....
7 Pages (1750 words) Case Study

The Development of Network Intrusion Detection Systems

he paper also includes an analysis of research results that classified the types of intrusion by developing a classification tree.... The paper 'The Development of network Intrusion Detection Systems' presents validating an approach against actual real-time data – an approach that addresses two major issues that have been left unattended in the development of network Intrusion Detection Systems by previous researchers.... With the restriction placed on the type of packets and in a controlled environment, the approach has proven that anomalies such as probes and denial of service attacks can be easily distinguished from the normal packets in a high traffic network system....
5 Pages (1250 words) Research Paper

Computer Network Design Issues

We have several types of computer networks depending on the criterion adapted to classify them.... All these types of topology require different designing requirements and posses' different merits and demerits.... (UNIVERSITY)IntroductionComputer networking is the communication of two or more computers that are in a network.... This process is very important as it enables the computers that are in the network share resources such as printers, files or data....
7 Pages (1750 words) Assignment

The Protection of the Information in BioMed Company

The paper "The Protection of the Information in BioMed Company" examines the vulnerabilities associated with this information when the GSM network is used to conduct project activities.... An action was developed to cater to the effective protection of information being subjected to the GSM network.... Of late, the GSM network is the hotspot target of the attackers.... BioMed Company like other enterprises has corporate cell phones that use the GSM network....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us