Free Essay

Lan Consultation

In: Computers and Technology

Submitted By dragunlord
Words 1841
Pages 8
LAN Consulting Plan
IT/240
February 26, 2012
James (Garrett) Miller

LAN Consulting Plan

Data Assurance:
1. Backup system:
a. Type?
Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site.
b. Backup Schedule?
The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan?
The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network.

Data Integrity:
1. Antivirus system:
a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail.
b. Scan Schedule?
The anti-virus software will be scheduled to scan incoming and outgoing e-mail messages. It will also scan packet files as they are received. The program will be scheduled to scan the whole system every night when the business operations have ended for the day.
c. Quick reaction plan for system(s) infection?
The protection program will be directed to attempt to repair any infections found as a first resort. If the infection is not repairable by the system it is then directed to a quarantine file for further review by the IT technician(s). As a last resort to protect the system the program will be directed to remove the infected items from the system.
Data Reliability:
1. Disaster Recovery Plan:
a. Site location? The offsite recovery backup data is located at a remote company location (NAS) designed especially to house the backup data servers of the company. It is designed this way to keep the information safe in case of a geological network failure.
b. Data/Systems replication plan?

i. Systems:
1. …The network data is copied from the main data storage located at the Central Office to the external backup location using Veritas Replicator. This program is additional security software from Symantec that coincides with the virus package.
2. …The Operating Software, Windows 7 premium, the development software, and all other business related applications have been copied to disk. One copy is located at the central office for intermediate recovery needs. The other copy is located at the backup site.
3. The employees use a thin client platform that retrieves the information from a central server. On hand replacement servers will initiate the repair of the network in a timely manner.
4. Repair tactics or replacement thin client system components, to include monitors, hardware, and printers to recover the critical business functions will be available at the remote location. …
5. The routers necessary for the fast recovery of the business operations will be available at the remote location for quick replacement.
6. The switches that are critical for the fast recovery of the network will be available and located at the backup site.…
c. Full site recovery schedule?
The full site recovery schedule will begin with identifying the disaster and will focus on the recovery of the critical business systems that are needed immediately to ensure business continuity. Once the business is running the focus will be on restoring and recovering the business essential and secondary aspects of the network. i. Services Recovery Priority: 1. Business Critical systems?
The business critical systems include a power supply, the primary database located in the Central office, the critical presentation servers and databases located at the central office. A goal time to recovery these systems is within 36 hours. 2. Business Essential systems?
The business essential systems include any remaining presentation servers and application servers necessary for the continuity of the business practices. Must be restored starting at 36 hours and within 5 days.

3. Secondary systems?
The secondary business systems include any repairs or replacement of hardware and replacing of cords, cables, misc. Can be restored in as little as 5 days, but may take longer.

2. System Redundancy protection:

a. Fault-Tolerance systems?
The fault tolerance is provided with the use of the RAID technology which provides redundancy and speeds up data transfer. b. Load balanced systems?

The load balancing on the network will be accomplished using routers, such as the Linksys WRT54GL to forward data packets between the computers in the network, and also provide redundancy. c. Clustered services?
Clustering services will be used to provide redundancy by connecting two or more computers together to act as one computer. Load balancing clusters are used to distribute client connections over multiple servers.

WAN Infrastructure:
1. Circuits Type/Provider:
a. New Mexico?
The circuit from the central office to the New Mexico location is a T1 dedicated connection provided by Comcast Business Class internet service.
b. California?
The circuit from the Central office to the California location is a T1 dedicated connection provided by Comcast Business Class internet service. d. Central Office?
The circuit from the gateway to the Central office is a T3 dedicated connection provided by Comcast Business Class internet services e. Internet?
The circuit from the internet to the gateway of the network is a T3 dedicated connection provided by Comcast Business Class internet services.
2. WAN Topology?
The WAN topology of the network including the central office, the New Mexico location, and the California location is Star topology. Each location is connected to the next with a dedicated T1 connection. 4. Circuit failure/outage plan?
The use of ring topology in the network will provide each node another avenue of communication if there should be a failure. 5. Firewall/IDS implementation?
The firewall and Intrusion Detection system will be scheduled through and maintained by the Norton 360 version 6.0 security suites.
5. DMZ services:
a. ….one implementation for a DMZ zone in the network is the use of a mail server. This will allow communication between the inside network and the outside network.
b. …. A second implementation for a DMZ zone is the use of a web server. This will allow the customers to access the information and services provided by the company.
c. … A third implementation for a DMZ zone is a fall over firewall that will allow communication from the outside network to the inside network with predetermined restrictions.
6. Remote Access services?
Remote access services will be provided with the use of the Symantec pcAnywhere 12.5 software which will allow remote access of computers efficiently, manage help desk issues quickly, and connections to remote devices simple and secure. 7. WAN Monitoring/Management tools?

WAN monitoring and management will be controlled by the System and Network Monitor (SNM) application, which is a tool that monitors, graphs and alerts on computing devices and services.

LAN Infrastructure: 1. Router(s)? The routers used in the network are Cisco ISR G2 modules which contain media service engines to deliver rich media capabilities and enhanced EtherSwitches that offer industry leading layer 2 and layer3 switching. 2. Switches?
The switches used in the network are Cisco Nexus 3000 series that offer low latency in high frequency areas and increased application performance through wire rate layer 3 switching. 3. Patch Panel?
The patch panel is a Cisco Catalyst Inline Patch Panel. This device enables inline power for Cisco multiservice enabled catalyst switches. 4. Labs; Model Office, Development, Training?
Training will be provided for all employees on a regular monthly schedule to introduce and provide instruction on new components in the network infrastructure. 5. Building Cabling?
The cables to supply internet to the network is shielded twisted twisted-pair coaxial cable. The cables that connect the components of the network are category 5 stranded cables with RJ-45 round wire connections. 6. LAN Infrastructure Monitoring/Management tools?
The monitoring and management tools for the LAN Infrastructure will be the installed Network and System Monitor application. This application will monitor, graph, and provide alerts on computing devices and services within the LAN.
Systems Architecture: 1. Email Services?
The email service of the company Widget’s World will be provided by Google Business e-mail through an independent e-mail server on the network site which will also act a DMZ location. 2. Internet/Intranet/Extranet Services?
The internet service is supplied by Comcast business class internet services, the intranet is supplied and controlled by an intranet data center located within the network. The extranet service is provided by using a secure link (tunnel) across the internet and used in a (VPN). 3. OS Platform Server/Client?
The Operating System platform is Microsoft and the client service datacenter for this company is Microsoft Server 2008 R2. 4. User Security/Access management platform?
The security in this company is controlled by the use of a user- level security platform. This security platform ensures the security of the company data by only allowing pre-designated users with the appropriate passwords into specify information. 5. Naming Resolution services?
The naming resolution services in the Widget’s World network is the process of caching URL’s that had previously been performed lookups for DNS. 6. Client Application delivery model?
The model used for client application delivery is Citirx XenApp. This application is a thin client product that is used to allow users to connect to the companies applications. 7. Specialized company applications?
Specialized applications of this company would include specialized design and personalization concepts and tools that focus on the development of widgets.
HelpDesk services: 1. Trouble Ticket management system/process?
The trouble ticket management system will consist of a database that records all data that consists of trouble in the network. These data are managed by the business logic layer of an application. 2. Employee training processes?
The employee training processes will consist of regular employee training schedule to keep the employees up-to-date on changing processes, procedures, software, and hardware that is implemented into the business. 3. Employee technology usage policies?
The company will have written policies describing the ways the technology available in the network will be used by the employees.

References:

http://www.cisco.com/en/US/products/sw/netmgtsw/index.html Retrieved from http://www.cisco.com

http://www.symantec.com/products/allproducts.jsp Retrieved from http://www.symantec.com

http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html#nmp Retrieved from www.slac.stanford.edu

http://www.ehow.com/info_8478654_comparison-between-internet-intranet- extranet.html Retrieved from http://www.ehow.com…...

Similar Documents

Premium Essay

It Consultation

...IT Consultation for MR. Green Mr. Green wants to upgrade Windows 7 Home Premium to Windows 7 Ultimate. I have researched this upgrade and will be describing concerns and options so Mr. Green’s business will be more efficient and capable of expanding in time. From the information you gave me Mr. Green, it appears that your stand-alone machines are capable of running Windows 7 Ultimate. It requires 1GHz processor, 2GB RAM (for 64 bit) and 20GB available disk space. My concern for the future would be to look into getting more RAM as you install different programs and have many applications running at the same time. Attached are graphs that will take you step by step in preparing to upgrade as well as the steps for using Windows Anytime Upgrade. Running the upgrade advisor will ensure that your systems are capable and compatible of running Windows 7 Ultimate. It will check your hardware, search for updates, check your applications, disk space, ensures computer functionality, also performs a full system backup and allows you to purchase Windows 7. The next graph walks you through Windows Anytime Upgrade which I believe will work for you since your systems already have windows 7 on them. The graph has you click start, control panel, system and security tab, and Windows Anytime Upgrade. When you get to that window, just click on go online to choose the windows 7 edition you would like and then click the buy button. It will then walk you through the install process. You may......

Words: 860 - Pages: 4

Free Essay

Lan Topologies

...LAN Topologies IT240 10/14/12 1. Case Project 2-1 With a network of 50 computers I will use the Ring Topology to upgrade this network. With this type of topology all the devices are connecting in a loop form and the information travels in one direction, thus avoiding collisions. Here the cabling doesn’t terminate, it continually goes from one device to another till it gets back to the original device. It is also easier to manage the network since all the information is passed around the ring in the same direction. 2. Case project 2-2 With that many computer and four servers, I will use an Extended Star Topology. As pointed out in the case project that there are a few switches available here, I will use a central switch and connect the rest of the available switches to it and connect the 200 PC’s to those switches. Switches are good for determining each individual packet’s destination and ensuring that they are delivered to the right device. Note Even though they might have two different uses in some cases, the hubs in my diagram represent the switches. 3. Case project 2-3 * Physical versus logical topology: A physical topology defines how the devices on a particular network are physically connected; logical on the contrast tells us how the systems on the...

Words: 415 - Pages: 2

Premium Essay

Lans and Wans

...hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to......

Words: 1327 - Pages: 6

Premium Essay

Network Design Consultation

...Network Design Consultation Matthew P Bartman Strayer University Daniel Doe CIS 175– Intro to Networking Sept 1st ,2013 Network Design Consultation After speaking with my neighbor and getting an understanding of what his exact needs are as well as his budget I would recommend using an all wireless design. One reason that I would recommend this kind of design is because of mobility. Mobility is what allows information to be accessed from anywhere which will enhance productivity and service. Another reason that I would recommend this kind of design is because Installation is very simple and you don’t have to go through the trouble of running cable everywhere. Another this type of design is good is because that the cost of maintenance is reduced significantly especially in terms of if and when you decide to expand your network as well. Scalability is also another very important factor because Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area. Now in terms of the network architecture I would recommend using a Client server Architecture the reason being this type of architecture will allow clients to share data as well as storage space. Not only that but this type of architecture allows for......

Words: 2247 - Pages: 9

Free Essay

Lan Switching

...roduct Description LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco® Networking Academy® CCNA® Exploration curriculum. Each chapter contains a Study Guide section and a Labs and Activities section. Study Guide The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you Review vocabulary Strengthen troubleshooting skills Boost configuration skills Reinforce concepts Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco. Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep......

Words: 339 - Pages: 2

Premium Essay

It Consultation Proposal

...|IT Consultation Team Proposal | | | |Rural Community Hospital | | | | | | | | | |IT Consultation Team Proposal | | | | | | ...

Words: 1300 - Pages: 6

Premium Essay

Network Consultation for Designit

...Network Consultation for DesignIT By Salim Usman CIS 175 Professor Mohamad Abedin 6/18/2014 SCOPE OF WORK The work that will be performed will include the design and installation of a fully switched star network. This includes the installation and setup of all the network devices, cabling and interfaces but may be limited to workstations, devices, servers, switches, routers, racks and all related software. NETWORK SCOPE The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room. OBJECTIVES Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use. Scalability: The network design is scalable so that more network cable equipment can be added if needed and as funding becomes available without having to redo the installed network Intended users: The users of the network will be 1 administrator, 2 full time employees and a receptionist. DESIGN FEATURES Server Room The server room shall be a locked room, properly vented and air conditioned where the servers switches, firewalls, and an un-interruptible power supply will be housed along with any other electronic interfaces such as telephone systems, cable tv, internet access point of entry. 1.......

Words: 721 - Pages: 3

Premium Essay

Consultation Report

...ACCOMMODATION ACCOMMODATION Consultation Report Prepared By Consultation Report Prepared By DISCLAIMER This material is based upon work supported by Brenau HR Consultation Professionals. Any opinions, findings, conclusions, or recommendations are those of the authors and do not reflect the views of Brenau HR Consultation Professionals, its employees or its administration. TABLE OF CONTENTS I. Introduction 4 A. BHRCP – Disclaimer 2 B. BHRCP – About US 4 C. Purpose 4 D. Engineer Job Responsibilities 5 II. Circumstantial 5 A. Engineer’s Specific Occupation 5 B. Engineer’s Health Issues 6 III. ABC’s Dilemma 6 IV. Employment Regulations 7 A. Laws to Consider 7 B. American Disabilities Act (ADA) 10 C. Burden of Proof 11 V. Recommendations 12 VII. Conclusion 13 VIII. References & Acknowledgements 14 INTRODUCTION BHRCP - ABOUT US Brenau Human Resource Consultation Professional (BHRCP), is a full service human resources management consulting and professional services firm headquartered in Atlanta, Georgia. Our work is grounded in innovation, thought leadership, and performance excellence as we work in collaboration with clients to recruit, develop...

Words: 3345 - Pages: 14

Premium Essay

Network Consultation for Designit

...along with speeds, for best performance. Section 1: Network Consultation Proposal (Microsoft Word) Create a cost analysis, and develop a proposal for the company. 1.Write an five to seven (5-7) page proposal in which you: a.Recommend one (1) suitable network design. b.Suggest one (1) network architecture. c.Suggest LAN and Wireless LAN (WLAN) wiring considerations. d.Recommend hardware options and costs. e.Suggest security considerations for: i.Firewall ii.Antivirus software f.Recommend software options and costs. g.Outline the labor costs, equipment costs, and service costs for your suggested design in table format. h.Identify the single point of failure, and recommend potential mitigation strategies. i.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Section 1 of your assignment must follow these formatting requirements: ◾Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. ◾Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Section 2: Network Consultation Presentation (Microsoft PowerPoint or equivalent) Use......

Words: 513 - Pages: 3

Premium Essay

Lan Topologies

...transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This network should have a central server that can control incoming and outgoing transmissions. A central server would stop the entire network from being bogged down because of data packets being sent and received. In addition, the hubs should be upgraded to handle 1000 Mbps. Below is an example of what a smaller version would look like. Case Project 2-2 Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive number of broadcast packets throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Ideally it’s preferable to probably split it up into one or more workstation subnets (based on say, departments) and then another subnet (or more for a larger enterprise) for the servers. Traffic between the subnets will be routed. This means the broadcasts from workstations won't hamper the servers and vice versa. Case Project 2-3 In Chapter 3, you learn about network topologies and technologies. As preparation, do Internet research on the following topics: ● Physical versus logical topology ● Bus topology ● Star topology ● Ring......

Words: 749 - Pages: 3

Free Essay

Lan Topologies

...LAN Topologies Jason Smith IT/240 September 7 2014 TAMMY FLEMONS LAN Topologies Case Project 2-1 You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long-overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This system ought to have a central server that can control approaching and cordial transmissions. A central server would prevent the whole system from being hindered due to information parcels being sent and acquired. What's more, the center points ought to be moved up to handle 1000 Mbps. The following is a sample of what a littler variant would look like. I think I would use the physical star topology for this setup. Case Project 2-2 Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive number of broadcast packets Throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Utilizing an expanded star topology would diminish the impacts of the......

Words: 677 - Pages: 3

Premium Essay

Lan Lan Lan Aland

...LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. 1.2. I would install a client/server network on a local area network (LAN). Every computer connected to the network would have a network interface card (NIC) and through the use of Ethernet cables, connect to the company server. Users would be able to store files and share company resources through the server. Implementing a Windows based operating system on the server will allow for the network administrator to assign different security rights and privileges to different users. I think that for this particular situation I would set up an extended star network. I would choose this one because the business is relatively small and plans to grow, this type of network setup is very easy to add users onto and also still provides the access restriction needed for lower level employees and the ease of access for higher level employees without them being able to see what the other is able to access. “As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle...

Words: 583 - Pages: 3

Free Essay

Lan Wan

...Local are networks (LAN) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. Has a High speed (1000 mbps) Tends to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs tend to have fewer problems associated with them, as there are smaller numbers of systems to deal with. Wide area network (WAN) is a computer network that covers a broad area. It does have slower speeds of about 150 mbps. WANs tend to use technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances Differences between (LAN) & (WAN) (LAN) is typically owned and managed by a single company or organization. LAN also experiences fewer data transmission errors and overall fewer problems as a whole as opposed to WAN. WAN has a high cost maintenance and lower bandwidth. In conclusion the major differences are going to be cost, efficiency and coverage Describe common physical topologies and a logical topology : Physical topology refers to how the network is wired it can be either a ring topology where all the hosts are connected together or a bus topology where there is a network medium and each host connects to that medium by wire. A logical topology in the other hand governs how the network is going to work. For example all the hosts in the network are connected through a central connecting point that’s the physical topology however the way the protocols and hardware are designed to......

Words: 273 - Pages: 2

Premium Essay

Racism Consultation

...Racism Consultation: Basics which all Social Workers need when dealing with racism in children Racism is an issue in which many people shy away from when it arises. Most people feel they are not racist, however in later discussion many racist ways of thinking may be divulged. Racism needs to be addressed, not avoided. Children need to learn how detrimental racism can be to themselves and others. The home and school environments are the best places to begin to address the issue of racism. It is the school's responsibility as well as the parent's to see to it that differences are accepted and not devalued. Antiracist education is also a very helpful approach in reducing racism in schools. This essay will go into detail about how racism is taught to children, characteristics of a racist child or a victim of racism, as well as techniques to prevent or reduce racism in children. Ms. Carlson, the middle school counselor, was approached with an issue that involves two of her students. It appears that Billy has been making racial comments to Tommy, an African American boy. Ms. Carlson is aware of different schools participating in antiracist and multicultural education, however their school does not incorporate this type of teaching. The school is located in a conservative town and Ms. Carlson feels that this type of education will not be welcomed in the school district. She has asked me to speak with Billy and Tommy to see what factors play into a child who has...

Words: 3137 - Pages: 13

Free Essay

Lan Topologies

...LAN Topologies Lord Bones IT240 Jan 01, University of Phoenix - AXIA College LAN Topologies With this assignment I will discuss some topologies of a LAN as requested by questions 11, 12, and 13, chapter three from the textbook Local Area Networks. A “LAN (Local Area Network) topology is the appearance or layout of a network” (Regan, 2006). There are two forms of topologies of a network, namely, the physical- and logical topology with each its own types of topologies. The physical topology is what someone can see with his or her own eyes, i.e. a workstation, servers, cables, etc. while the logical topology is the dataflow of the network, how the data is moving from one point to another (Regan, 2006). In the following I will describe two physical topology types and one logical topology type, following the scenarios in the question’s mentioned above. In the first scenario there are four servers in the network with no hub present. The first (A) server is connected to the second (B), third (C), and the fourth (D). The second is connected to the third and fourth, while the third is connected to the fourth. (See figure 1.) This type of physical topology is called a Mesh Topology. A Mesh Topology is a topology where “every computer is linked to every other computer” (Regan, 2006). With this type of topology there is no hub or a similar device present. Also this type is difficult to install and certainly when it has to be reconfigured when a new computer is added to the......

Words: 817 - Pages: 4

IMDb: 6 HD Winters Dream | Subwoofers | Riki Takeuchi