CIS246 Course Discussions Week 1-7


CIS246 Course Discussions Week 1-7
Identify some pros and cons to the virtual classroom environment as compared…

SKU: CIS 246 All Discussions Categories: , Tags: , , ,


CIS246 Course Discussions Week 1-7

CIS246 Course Discussions Week 1-7

Week 1 All Students Posts – 56 Pages

Networking in Society – 30 Pages

Explain ways that networking has changed society in the past 10 years. Do you feel that computer networking has impacted your life? Please explain. Identify some pros and cons to the virtual classroom environment as compared to the traditional face-to-face classroom environment?
Pros of virtual classroom include being able to attend class at anyplace with an internet connection. You can attend class in the comfort of your own home and you wouldn’t have to worry about students in class distracting you like in a face-to-face classroom environment.

The cons of virtual classroom can include flaws in network connection which disconnects you from class. Teaching can also be more effective in a face-to-face classroom environment when compared to a virtual classroom…

Peer-to-Peer and Client-Server Environments – 26 Pages

What kind of network does your current or former workplace have: peer to peer or client-server? What problems does it have? What are some ideas to improve it? If you don’t know which, explain what you think would have worked best and describe the circumstances.

The way our networking is set up here is a little complicated. There are devices that are on MAC lists that have authorization to access the access point. There is layer 3 through 7 filtering. So yes… a little complicated. We have a LAN and wireless network in the house, with a domain controller, and a centralized Symantec EndPoint Protection (SEP) server. We also have a file share server with Access Controls List (ACLs) with permissions down to the file level. The client server aspect would be the SEP, the file share server, and the domain controller. The problems, is that there aren’t any redundancies for SEP or the domain controller so the if there is any maintenance that needs to be done that requires a reboot, the network can be unavailable. One of the good things is that the file share server is at RAID level 5, so we can lose up to, 2 hard-drives without losing data…

Week 2 All Students Posts – 51 Pages

Transmission Basics – 28 Pages

The lecture covers several standards. Which ones are most common? Which ones are more or less obsolete? What can you find out about the future of transmission and media types? What is happening with 10 Gbps? What about 100 Gbps? What environmental factors would you commonly take into account when choosing which media to implement in a given situation?

Most common transmission media today is fiber optics and the many variables of twisted pair copper cable. When discussing environmental factors everything is in risk mitigation. What I mean by this is that you really wouldn’t connect two routers together with copper cable, the amount of data and the speed required to have a good network just isn’t there with copper cable, thus you would use fiber optics. Then we discuss copper cable or twisted pair as it is most commonly know these days; coax is more for just your cable TV these days. So for twisted pair you have to know where the cable is being placed, do you need plenum cable or not. If you are running cable through the floor or wall then it is mostly required to be plenum, plenum means the space between the floor and walls and in cable terms it also means the cable is fire rated. Then you could use non-plenum cable to hook up the computer to the wall socket for connection. Are you concerned with security, then you would use shielded twisted pair and if security isn’t a large concern you can use un-shielded twisted pair. There are price challenges with each cable selection and possible training issue with the installation of a particular cable. Will CAT 5 cable suit your needs or should you purchase the CAT 6 cable. CAT 6 is certified for Gigabit networking and will show better performance within longer distances…

Networking Hardware and Topologies – 23 Pages

Let’s figure out what kind of networking equipment an organization would need to buy. You can make assumptions on size and budget. What do we need to purchase? Why do we need to purchase it? That is, what will it do for us? How do we hook them together? That is, how do we cable them (or not cable them) together? Why is there such a big difference in price with the brands? How do network topologies figure into our selections and designs?  Hubs were used frequently in the 1980s. Why don’t we incorporate hubs into our networks as much anymore? Can you name some additional network devices or cabling that have become obsolete? Why is that the case?

I believe that the reason hubs have become obsolete is because the switch box does more or less the same thing, but is actually faster at doing it. This is because with a hub, every device connected will always be communicating to every other device connected simultaneously. This creates a lot of unneeded traffic that slows down the overall process of data. The switch box, on the other hand, sends data directly between the devices that are involved with the exchange. This switch box is superior in speed and by relation it is also superior in security/privacy. As for obsolete cabling, the very first thing that comes to mind is the phone line. The telephone poles, as we still call them, seem to have just about everything BUT telephone lines on them now days. I believe this is because companies such as Verizon have actually integrated the internet, cable, and phone transmissions all into the same line. It’s not until these lines enter the individual house that they are divided into their respective functions…

CIS246 Course Discussions Week 1-7

Week 3 All Students Posts – 54 Pages

TCP/IP – 30 Pages

There is an alphabet soup of protocols in TCP/IP: HTTP, FTP, SMTP, POP3, TCP, UDP, IP, ARP, ICMP, and others. What are the characteristics of these protocols? What are they used for? Has there been an evolution in any of these protocols? Are there any weaknesses or disadvantages? What exactly is TCP/IP, and what are the four layers that TCP/IP can be broken down into?

TCP stands for transmission control protocol. IP stands for Internet protocol. TCP/IP is the basic communication language (or protocol) of the internet. There are four layers: application, transport, Internet, and network interface. The application layer provides user access to network resources. It basically ensures a connection is made to an appropriate port. It also defines the rules, commands, and procedures that client software uses to talk to a service running on a server. The lecture has a good example: The HTTP protocol defines how Web browsers and Web servers communicate…

Network Servers – 24 Pages

Search the Internet for Windows servers by Dell, IBM, HP, and others. What are the features and prices? Which ones do you think would be appropriate for the various Windows Server 2008 editions? It is okay not to understand all of the specifications. When you find something you don’t know, ask the class. Server virtualization is the way forward for many organizations today. What is server virtualization all about? Why is it beneficial? When would it not be useful?

Server Virtualization is the masking of server resources such as the number and identity of individual physical servers, processors, etc. With the rising costs of technology, virtual servers allow people/companies to keep having to have physical servers at every worksite, you can virtualize that server and thus save some cash and also reduces service interruptions. One of the drawbacks to server virtualization is when one server fails, they all do. Another drawback is that virtual servers require a lot of space/hardware to run effectively…

CIS246 Course Discussions Week 1-7

Week 4 All Students Posts – 52 Pages

Understanding and Applying Active Directory – 24 Pages

Active Directory (AD) is arguably the most critical component of Windows Server 2008, certainly for larger organizations. It enables corporations to manage and secure their resources from a single directory service and with a common interface—a very powerful tool. Because it is so powerful and offers so many features and capabilities, it sometimes can be complex to those looking at it for the first time. This week, we are going to learn about AD in detail, starting with the fundamentals. As we progress during the week, you will begin to see it’s not that intimidating after all. First, though, let’s get the fundamentals down. What exactly is a directory service and what are some examples in industry? Next, let’s get the definition of Active Directory down—what exactly is it and what benefits does it provide? After this, we’ll look at the details on how it is implemented in the business environment.

AD is basically a database.  It’s a directory that stores information about objects that are used within a network.  It provides hierarchical organization and management access to those objects.  Another aspect to AD is login and authentication services, and also the ability to delegate administrative control.  A couple examples of information it holds are available services, user accounts, and group accounts.  Using an AD makes it easier to manage the network…

Linux Versus Windows Administration – 28 Pages

In what ways do you think administering Linux is better than Windows? In what ways is Windows better than Linux? This can be with regard to having to manage a single server or multiple servers.  Do Linux administrators make more money than those with only Windows experience?

It seems that familiarity and support are some of the biggest issues, especially for entry level businesses. I know that Linux seems to be a better performer in many aspects such as security and stability, but not nearly as many people are familiar with it. I am one of those people. Maybe companies with deeper pockets can really capitalize on Linux because they can hire Linux trained people to provide the necessary support and customized development needed, as is the case with Amazon. I think over the long term, using Linux can be a huge performance cost advantage over Windows systems if a company can overcome the initial hurdles. For turn-key systems with plenty of sales and tech support, Windows is hard to beat…

CIS246 Course Discussions Week 1-7

Week 5 All Students Posts – 52 Pages

Wireless Networks – 27 Pages

Today, wireless transmission media are commonplace in business as well as residential applications, and their application is growing. This week, we will learn about wireless technology by starting with the fundamentals. How are wireless signals carried? What are the obstacles to successful transmissions and their repercussions? What standards govern wireless transmissions? How do we secure our wireless networks?

WPA2 has started to replace WPA, as it is more secure. WEP is also a wireless method that is another option. WEP is part of the IEEE 802.11 wireless networking standard and was designed to provide the same level of security as that of a wired LAN. WEP provides security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, recently it has proven to not be as secure as originally thought. WEP is used at the two lowest layers of the OSI model – the data link and physical layers; it therefore does not offer end-to-end security…

VoIP – 25 Pages

Traditionally, packet-switched networks carried primarily data and the public switched telephone network (PSTN) carried telephone calls and fax transmissions. Convergence is the use of one network to carry data, voice, and video communications simultaneously. Let’s begin this discussion by identifying and discussing key terms such as IP telephony or VoIP, VoATM, VoDSL, Internet telephony, FoIP, and video over IP.

The biggest problem I have found with VoIP is the call quality and the fact that switching to VoIP is not always a savings. Just recently I canceled my home phone service and just use cell phones and internet. Since the only internet provider in my area was my phone company, they wanted to charge nearly the same amount for just internet as they did for a phone/internet package. They just recently changed their pricing to where it made sense to drop my phone service. I was already aware that I would lose internet during a power outage, and therefore would lose phone service if I was using VoIP. I have used a VoIP service in the past called MagicJack and it seemed fine. You could take it anywhere you had internet and make and receive calls. I just rarely used it because I rely predominantly on my cell phone. I would definitely use it for my business phone and drop the land line if the prices were any different. The phone company still abuses you if you are a business…

CIS246 Course Discussions Week 1-7

Week 6 All Students Posts – 52 Pages

Network Security – 27 Pages

In this topic please discuss security measures you see in everyday life that you could adopt in a network environment. You can also include security implementations of places you have worked. How does physical security contribute to network security?

Network security is a large chunk of security for systems. If you can stop an attacker from entering the network then the host security will withstand the attacks. For most systems the worst attack you can receive is from the insider, a disgruntled employee. Network security has to not only think of attacks from the outside but from the inside as well. One of the basic ways to secure the network is with a firewall, every system has one by default but a firewall is a basic network security principle. You can set up firewalls in a number of various ways to protect your network and the systems that reside on the network. You can restrict ports, protocols, and specific IPs from your network. You can setup a zone based firewall to ensure a computer from the warehouse zone (warehouse IP range) can’t enter your HR zone (HR IP space) and such examples.

Another way to defend from outside threats is to incorporate an DMZ into your outside facing network to trick malicious people from attacking your local network by making them think they are in the local network when they are actually not. A DMZ can be the best initial roadblock for unwanted network traffic…

Network Integrity and Availability – 25 Pages

In this topic, we will discuss measures that can be taken to ensure that a network’s programs, data, services, devices, and connections are sound and protected from anything that might render them unusable. What situations can compromise integrity and availability and what, specifically, can we do to protect our networks?  What is fault tolerance, and what network aspects must be monitored and managed to ensure fault tolerance?

Network integrity can mean different things to different people within an organization. Integrity means that the network is stable and available at almost all times, it also means that every transmission on the network is secure and has a high reliability of not becoming hijacked and changed. The first thing to look at in a security department is redundant connections to the outside world. This means not only multiple connections to the outside world but multiple ISPs to support those connections. There is a story of an airport that had multiple connections to the outside world and was service by two different ISPs. One day while a construction crew was digging they accidently cut the lines from the airport to both ISPs. This happened because even though the airport had good security with multiple connections to the outside world both connections ran through the same location. The airport failed to have a large separation between the redundant connections to the ISPs.

Wireless overlapping is also a great way to have redundant connections for wireless users in a company. If one wireless access point fails then there are redundant access points to pick up the slack. Anti-Virus, Anti-spyware, Anti-mailware, firewalls, are just a few things to help keep the network safe from outsider threats. Job rotation, mandatory leave, using least privilege, account administration, and active scanning are ways to help prevent insider threats to the network and the software and systems that reside on the network…

CIS246 Course Discussions Week 1-7

Week 7 All Students Posts – 47 Pages

Using a WAN – 24 Pages

Find WAN organizations (ISPs) that will connect you to the Internet or connect your offices. What services do they offer? What costs are involved? Explain and compare X.25 and its updated, digital version which is Frame Relay.

DSL, which stands for digital subscriber line, provides an internet connection using your home phone line. It does this without affecting the normal use of your home phone. This is not to be confused with a dial up connection, which prevents you from using your phone while an internet connection is established. Some advantages of using a DSL are the speed, and also a reliable connection isn’t impacted when many users in the same are are on the internet at the same time. Some disadvantages are you have to install filters on all your phone lines, which can be costly. Another issue with DSL is that it cannot match the speed you get with a broadband cable connection…

Linux and Windows Integration – 23 Pages

What are some ways you could integrate Linux servers into a Windows network to share information? What would be the advantages and disadvantages? Feel free to get into the details of Samba, which is covered in the lab. Are there any other products out there? You can get creative on this one. You could also offer scenarios for FTP, Web, or even Telnet. Samba is a great product. However, what other ways can we communicate? Linux servers can be very cheap to set up. What things would we need Linux to store cheaply, and how would we get the information when we need it?

Integrating Fedora Linux into Windows network as long as SAMBA utilities.  Linux serve looks and acts exactly like any other server on Windows intranet. You can drag and drop files view server contents and directories when using Windows File Manager. SAMBA is an open-source program that provides server message block/common internet file systems. SAMBA acts just like windows file and printer servers to all your desktop clients…

CIS246 Course Discussions Week 1-7

Week 1-7