SlideShare une entreprise Scribd logo
1  sur  11
Network at MCOE



    By Karrie Y. Cox
      EdTech 541
The Information Technology office is responsible for the management of the technology infrastructure for MCOE and
The Modoc County Office of Education houses the CENIC connection for the county, which provides the backbone o
star topology.
Cisco Aironet 1100 Series Access Point | Cisco Security Firewalls |
SecureITStore.com . (n.d.). Cisco, Cisco Switches, Cisco Firewalls, Cisco Storage |
SecureITStore.com. Retrieved February 6, 2012, from
http://www.secureitstore.com/Aironet-1100AP.asp

Craig, L. (2012, February 1). Interview with Lawrence Craig, IT technician of
Modoc County Office of Education.

Florida Center for Instructional Technology (2011). “Star Topology.” Image.
Retrieved February 6, 2012, from http://fcit.usf.edu/network/chap5/chap5.htm

Luna, W. (2012, February 1). Interview with Wendy Luna, IT technician of Modoc
County Office of Education.

Contenu connexe

Similaire à Network at mcoe

Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...acijjournal
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptxSuprithC2
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similaire à Network at mcoe (20)

CV_Sheraz
CV_SherazCV_Sheraz
CV_Sheraz
 
Chrisotoresumejuly16
Chrisotoresumejuly16Chrisotoresumejuly16
Chrisotoresumejuly16
 
Sohail cv (updated) (1)
Sohail cv (updated) (1)Sohail cv (updated) (1)
Sohail cv (updated) (1)
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
February 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsFebruary 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Dernier (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Network at mcoe

  • 1. Network at MCOE By Karrie Y. Cox EdTech 541
  • 2.
  • 3. The Information Technology office is responsible for the management of the technology infrastructure for MCOE and The Modoc County Office of Education houses the CENIC connection for the county, which provides the backbone o
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11. Cisco Aironet 1100 Series Access Point | Cisco Security Firewalls | SecureITStore.com . (n.d.). Cisco, Cisco Switches, Cisco Firewalls, Cisco Storage | SecureITStore.com. Retrieved February 6, 2012, from http://www.secureitstore.com/Aironet-1100AP.asp Craig, L. (2012, February 1). Interview with Lawrence Craig, IT technician of Modoc County Office of Education. Florida Center for Instructional Technology (2011). “Star Topology.” Image. Retrieved February 6, 2012, from http://fcit.usf.edu/network/chap5/chap5.htm Luna, W. (2012, February 1). Interview with Wendy Luna, IT technician of Modoc County Office of Education.

Notes de l'éditeur

  1. I chose to complete a virtual tool about computer networking at my place of employment.
  2. Modoc County Office of Education’s network is referred to as a “Node”. The Modoc County Office of Education houses the CENIC connection for the county, which provides the backbone of a high bandwidth, Wide Area Network for our schools. CENIC stands for Corporation for Education Network Initiatives in California. TheCENIC network designs, implements, and operates, a high-bandwidth, high-capacity Internet network specially designed to meet the unique requirements of MCOE’s educational institution connections.The Information Technology office is responsible for the management of the technology infrastructure for MCOE and its remote sites, including phone services, network services, and all related equipment.
  3. I had the chance to interview both Wendy and Lawrence so I could get a better understanding of how Modoc County Office of Education’s network is laid out. The Information Technology personnel operate and maintain a mix of computer systems and software, which support the educational programs and administrative services for the Modoc County Office of Education and the school districts of the county. Our network and server support is contracted out to Shasta County and when the network has problems then we have to contact them. For instance I told them that I needed a drive set up for maintaining video hosting; so they along with the local IT put it all together for me.
  4. The MCOE backbone consists of roughly 150 miles of CENIC-owned and managed fiber. Additional network components include: routers, switches, optical components and telco circuits. Though I never was able to get a schematic of each sites layout, there are fifteen sites that have their individual LANs that the MCOE node hosts. The primary server room at MCOE was upgraded in September of 2009 and houses the following hardware:Cisco ASA 5510 Firewall, Catalyst 3750, Cisco 3660, Catalyst 2950, Catalyst 2960G, Four 802.11AG LWAPP, AP Integrated Antennas, Wireless Lan Controller 2106, Dell Power Edge T610 Raid 5 running VMWare, vSphere 4 Essentials, Windows Server 2008-DOMAIN CONTROLLER/DNS/File/Print/Backup.There are three back-up servers for redundancy. This was good as one time some items were moved in the server room and some fiber optic wires were damaged and dropped the whole network. Luckily a temporary fiber cable was ran and they were able to restore life in the computer room as we know it. Total down time was one hour.It cracks me up to see an old monitor in there.
  5. The file server has plenty of storage devices which hold the files of all client computers that are stored in their user folder and they can be shared. Each client is given 15 gigabytes of storage and so far I am the only one to exceed the limits which I don’t know if it was good or bad; but it did give the computer technicians their first chance to increase a clients file size on the network.
  6. All Modoc County Office of Education teachers have computers with high-speed internet connections to support their professional responsibilities.Students have access to computers throughout the school day and during after school programs. The tables below indicate the numbers ofcomputers per classroom. In the Tulelake schools, students have the opportunity checkout and take home laptops on school days and over theweekends.
  7. The Local Area Network within the county office building is connected through a star topology. Each office has an Rj-45 Jack. The fiber optic cables gets all the data back and forth for all other LAN’s in MCOE’s network. For instance, the office I work at is across the street and has it’s own LAN and uses the star topology to connect the five computers and two printers. But to get to the county office it is a fiber optic cable. I asked how fast the data travels and the response was that the fiber cable sends the data at the rate of 44.6 Mbps (Million bites per second).
  8. The wireless connection is maintained by Cisco Aironet 1140 series wireless routers. This also makes the building a wireless access point.
  9. The Windows Server 2008 server operating system enables a network server to handle a diverse set of roles — such as print server, domain controller, web server, and file server — is the platform for other server applications for the Exchange Server and SQL Server. The program that I use for my office uses the SQL server for the database information.Everyone has Microsoft Office on their computer and Norton Internet security installed.
  10. Each person at one time was responsible for maintaining their own files located on their personal machines and that was a catastrophe for some. Now all work computers have each persons’ files saved on the default file server location. This allows for others to share common files but it is an individual choice. More commonly employee’s use the Google site that the county office has set up and use Google Docs for sharing files as it is easier to work with. Each persons’ file management is up to them which let’s a person save files to their drive C if they choose to do so; but the default save is to their file server folder.