Question

In: Computer Science

Which areas of the network would a college IT staff most likely NOT have to redesign...

Which areas of the network would a college IT staff most likely NOT have to redesign as a direct result of many students bringing their own tablets to school to access school resources? And explain the function of each design (choose 4) (1pt each correct ans. + 3 pts. for each explanation)?

Extranet:

Intranet:

Wired LAN:

Wireless LAN:

Wireless WAN:

Solutions

Expert Solution

Wireless LAN is the answer to the first question.

Extranet:

An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers.

Intranet:

An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.

Wired LAN:

Wired networks, also called Ethernet networks, are the most common type of local area network (LAN) technology. A w ired network is simply a collection of two or more computers, printers, and other devices linked by Ethernet cables. Ethernet is the fastest wired network protocol, with connection speeds of 10 megabits per second (Mbps) to 100 Mbps or higher. Wired networks can also be used as part of other wired and wireless networks. To connect a computer to a network with an Ethernet cable, the computer must have an Ethernet adapter (sometimes called a network interface card, or NIC). Ethernet adapters can be internal (installed in a computer) or external (housed in a separate case). Some computers include a built-in Ethernet adapter port, which eliminates the need for a separate adapter (Microsoft).

Wireless LAN:

A wireless network, which uses high-frequency radio waves rather than wires to communicate between nodes, is another option for home or business networking. Individuals and organizations can use this option to expand their existing wired network or to go completely wireless. Wireless allows for devices to be shared without networking cable which increases mobility but decreases range. There are two main types of wireless networking; peer to peer or ad-hoc and infrastructure.

Wireless WAN:

A wireless wide area network (WWAN), is a form of wireless network. The larger size of a wide area network compared to a local area network requires differences in technology. Wireless networks of all sizes deliver data in the form of telephone calls, web pages, and streaming video.

A WWAN often differs from wireless local area network (WLAN) by using mobile telecommunication cellular network technologies such as LTE, WiMAX (often called a wireless metropolitan area network or WMAN), UMTS, CDMA2000, GSM, cellular digital packet data (CDPD) and Mobitex to transfer data. It can also use Local Multipoint Distribution Service (LMDS) or Wi-Fi to provide Internet access. These technologies are offered regionally, nationwide, or even globally and are provided by a wireless service provider. WWAN connectivity allows a user with a laptop and a WWAN card to surf the web, check email, or connect to a virtual private network (VPN) from anywhere within the regional boundaries of cellular service. Various computers can have integrated WWAN capabilities.


Related Solutions

which of the following products are most likely to have significant network externalities? Briefly explain. a....
which of the following products are most likely to have significant network externalities? Briefly explain. a. Smartphones b. Dog food c. Board games d. LCD televisions e. 3D televisions
Which ONE of the following loans would most likely have the lowest initial interest rate?
Which ONE of the following loans would most likely have the lowest initial interest rate?a traditional adjustable-rate loan which allows the lender to change the interest rate at the end of every year,a 30-year fixed rate loana 3/27 hybrid adjustable-rate loan that locks the interest rate for the first 3 years and then allows the lender to change the interest rate at the end of every year for the next 27 years.a 10/20 hybrid adjustable-rate loan that locks the interest...
Compare and contrast theories of crime causation. Speculate as to which theory would have most likely...
Compare and contrast theories of crime causation. Speculate as to which theory would have most likely detected fraud at Enron. Assess the six situational categories that cause non-sharable problems. Determine which of these six categories, in your opinion, were prevalent at Enron.  
Physiology of Exercise 11. An elite powerlifter would most likely have a higher percentage of which...
Physiology of Exercise 11. An elite powerlifter would most likely have a higher percentage of which fiber type? 12. Explain blood glucose homeostasis during exercise. Talk about the hormone involved and the actions they take to control our blood glucose. 13. How do athlete's differ from the general population in hormone and receptor number. 14. What are some of the common fare markers (fats & triglycerides) that are seen in a blood test and what do they mean and how...
Which cyber security measure would have been most likely to have prevented the 2016 successful attack...
Which cyber security measure would have been most likely to have prevented the 2016 successful attack on the Democratic National Committee (DNC): A. Stronger passwords used by DNC employees B. 2-factor authentication that uses a password and a security question for the user C. Hardware 2-factor authentication D. 2-factor authentication that uses a password and a text to the user's phone E. Software 2-factor authentication
1. Which of the following goods would be the most likely to be subject to a...
1. Which of the following goods would be the most likely to be subject to a government-imposed tax? A Cereal B Bottles of alcohol, such as whiskey and gin C Shoes 2. Which of the following is likely to have the largest elasticity of supply? A The producer of vanilla ice cream B The producer of yachts C A dentist 3. Assume that as your income increases, your consumption of burgers decreases. We can assume that your income elasticity of...
which of the following is most likely to have an income elastcity of demand that is...
which of the following is most likely to have an income elastcity of demand that is less than 1 ? A-movies B- restaurant meals C- airline travel D-foreign travel E- food
Which of these risks would most likely be a diversifiable risk for investors? A. The US...
Which of these risks would most likely be a diversifiable risk for investors? A. The US dollar strengthens, making exports more expensive for non-US customers B. Congress passes legislation that raises the corporate tax rate. C. A hurricane damages factories near the Gulf Coast. D. The Federal Reserve increases the interest rate.
Which of the following would be most likely to increase the supply of loanable funds and...
Which of the following would be most likely to increase the supply of loanable funds and lead to low interest rates? a. Expansionary monetary policy that resulted in high rates of inflation. b. Constant policy shifts that generate uncertainty and reduce investment. c. Demographic shifts that increase the number of people in age categories with high saving rates relative to the number in age categories with a strong demand for loanable funds. d. Large budget deficits that push the government...
Which of the following would the board of directors of an organisation most likely need to...
Which of the following would the board of directors of an organisation most likely need to know as part of their organisation’s cyber security risk reporting framework: Select all that apply. 1. Cyber security budgets 2. Feedback on cyber security events 3. Leadership roles for cyber security 4. Links between cyber security objectives and organisational objectives 5. Officers responsible for making cyber security decisions 6. Vendor due diligence
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT