1.0 INTRODUCTION
LAN (Local Area Network) is a connection that connected computer in certain area like school, laboratory, or office building.
LANs usually connect workstations and personal computers. Each computer or called ‘node’ could access data anywhere on the LAN. For example, we could share network printer in the LAN computer network. LAN also used as a communication tool for user to communicate each other in the range of the network.
2.0 PROBLEM STATEMENT
In a small LAN which consist of several nodes for example home network that has a several computer, router which connect to internet. The point is, how could we know who is the person that access to the internet via the router even though it has password. Andif the user who access the internet is a stranger, could we identify the events that happening in the router. What can be done to prevent the unauthorized user from accessing the internet.
3.0 OBJECTIVES
3.1 Scanning the network devices in Local Area Network
3.2 Viewing event that happening along the connection to the internet and router
3.3.1 Prevent any unwanted event from happening, like suspend user from connecting the network
4.0 METHODS
4.1 Data collection
4.1.1 Internet research
Since Internet is world wide communication and knowledge centre,
It is very useful to be used as a method for an analysis. Searching the data that could be needed by using ‘Search Engine’ like Yahoo and Google. Although, the resources that have been found could be used for this project, it is still needed to be alter and to be put as reference.
4.1.2 Book / Article / E-book
Book, article, or even an E-Book is a source of knowledge that has credential in it like Author, Publisher, Year and Place of Publish and Edition. Th...
... middle of paper ...
... to more secure networking level.
Beside, by using tools that could be used over the Internet that has been produced by certain develepors has been helpful for certain organization since their contributed brings a lot of benefits for others. We could gain an information and knowledge by this software as well as enhance the performance of our network for future plans.
7.0 REFERENCE
S.K Software. (2013). MyLanViewer Software. Available: http://www.mylanviewer.com/network-ip-scanner.html. Last accessed 20th Nov 2013.
Md Jahangir Alam. (2013). Survey of Network Performance Monitoring Tools. Available: http://www.cse.wustl.edu/~jain/cse567-06/net_perf_monitors2.htm. Last accessed 20th Nov 2013.
Ciprian Andrian Rusen (2010). Network Your Computer - Step By Step. California: Microsoft.
Chris Fry & Martyn Nystrom (2009). Security Monitoring. United State: O'Reilly.
... access to what and in which sequence. The router connects the LAN to other networks, which could be the Internet or another corporate network so that the LAN can exchange information with networks external to it. The most common LAN operating systems are Windows, Linux, and Novell. Each of these network operating systems supports TCP/IP as their default networking protocol. Ethernet is the dominant LAN standard at the physical network level, specifying the physical medium to carry signals between computers, access control rules, and a standardized set of bits used to carry data over the system. Originally, Ethernet supported a data transfer rate of 10 megabits per second (Mbps). Newer versions, such as Fast Ethernet and Gigabit Ethernet, support data transfer rates of 100 Mbps and 1 gigabits per second (Gbps), respectively, and are used in network backbones.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
In conclusion, a local area network is made up of computers and a myriad of devices, such as routers, servers, switches, and firewalls. In order for it to connect to the Internet, a router must be installed. Servers provide special functions such as printing, file sharing, etc. Switches connect the computers together from different parts of the network. Firewalls prevent unauthorized access. There are a host of other devices that may be used as well. These devices are hubs, gateways, repeaters, wireless access points,
When desktop computers and Local Area Networks (LAN) appeared in the 1980’s, they were small scale and being somewhat complex they required hands on technical skills, so were acquired in limited quantities. The low cash costs also meant they were often purchased without the approval of senior management.
Kozierok, C. (2005). The TCP/IP Guide - TCP/IP Overview and History. Retrieved November 2013, from http://www.tcpipguide.com/free/t_TCPIPOverviewandHistory.htm
In Local Area Network(LAN), Ethernet is a physical and data link layer technology. used to connect more than one computer systems to form LAN that comes with protocols that can control the passing information and to avoid two or more systems transmit simultaneous. Ethernet cable made up of several coaxial wire. The function of Ethernet is to deliver data between computers on the Internet.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
Networks, including the internet, are one of the most essential things to businesses. Without computer networks, companies would be lost and would not have a way to communicate without these systems and this would cause businesses to operate slower (Network 1). Patch works of older networking systems are easier to find these days (Network 1). Starting relationships between many businesses, networks in many ways become synonymous with the groups and businesses they bring together (Network 1). Business employees, customers, and business partners would have available access to their information stored in network systems, could get to their network systems and share them easily among themselves (“Network” 1). Computer networks give their owners speed, ability to connect, and ultimately value to their users. They give possible solutions for business difficulties and issues that would not be possible to other businesses (Network 1). Computer networking systems are required for electronic communications. (Network 1) As time moves on, businesses’ spend a ton of money on computer systems that are used to manage various functions such as accounting, human resources...
Network Design is very important when it comes to implementing a connection between a computer and a server. According to Network world Websites, Network is defined as a “connected collection or devices and end systems, such as computers and servers, that can communicate with each other”(McQuerry). Network carry data in many types of environment, such as homes, small businesses, and large enterprises. Network Locations Is one of the major factors. There are different types and locations of network exist, including network in a home or home office to communicate through the Internet, to locate information, to place orders for merchandise, and to send message to friends. Whatever the reasons are, all these networks share common components. According to Network World, the most common network components are Personal Computer’s, interconnections, such as NICs, Networks media, and Connectors. Switches and Routers are also part of network components. When designing a network, couples of items are a must to have such fundamental goals, a drawing or diagram, The Hierarchical Network Design, IP addresses, routing protocols, Servers, and switches.
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
However, iIn spite of the current pre-eminence of e-books, it may be argued that they are not likely to replace print books anytime soon or possibly at all. Both formats have their advantages and drawbacks, which makes for one of them difficult to replace the other. Moreover, they serve differents needs and purposes. E-books are famous for their portability. Hundreds of e-books can be stored on a single device. Thus e-books don’t take shelving space and are convenient to take on travel, while even a few paper books are bulky and quite heavy to carry around. Numerous e-books are in open access, while paper books are not routinely available free of charge. E-books may be acquired and accessed immediately online, a feature I enjoy especially and treasure most: many a time I was able to buy and read an e-book at home within minutes of learning of its existence. Needless to say, e-books are considerably easier to cite and quote than print books, since the copy-paste feature spares us the trouble of retyping the quoted text. Another important advantage of digital books is their specialized software, which makes reading much easier: search and reference tools, changeable font size and day/night mode, dictionaries. Last but not least, e-books conserv...
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.
Network seems to be a very mystery thing, people just to use the Internet in their daily lives, but no one would be to explore what is a network, what is the meaning of the network. The Internet, namely wide area network, local area network and single machine according to a certain communication protocol make up the international computer network. The Internet is the result of two or two more computers' terminals, the client and the server through the computer information technology means to connect with each other, people can send mail to thousands of miles away friends. completing a task and play games together.
It is a network of limited devices connected with each other. It is a private network, in which computers communicate with each other which are within the same network. No outside device can communicate with devices connected in intranet.