logo

Redundancy in Cabling: A Must-Have for Any Network

   

Added on  2023-04-04

13 Pages3929 Words146 Views
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: What Is a Storage Area Network?
Snia.org. (2019). What Is a Storage Area Network? | SNIA. [online] Available at:
https://www.snia.org/education/storage_networking_primer/san/what_san [Accessed
25 May 2019].
<Provide the Title of the resource and full Harvard reference here. This should
include the URL of the resource>
Summary:
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
Storage Area Networks avails high speed, block-level, specialized network
that allows accessibility to storage drives. SAN’s are normally made up of storage
elements, interconnected storage devices, switches, and hosts. Varying protocols and
technologies are normally employed in achieving connectivity while also covering a
number of sites that may be of interest. SAN configuration makes storage devices
appear as though they have been attached locally to the host.
Virtualization is used to enable the simplified storage connectivity to the host.
SAN technology serves the following purpose: It ensures that Business Continuity

Management can be sustained in an enterprise, it ensures that storage is fully and
efficiently utilized while upholding the important aspects of security and protection of
data, it boosts performance of applications, and also ensures that availability of
applications is improved. Fiber Channel (FC) Technology is primarily used in SAN
technology and the Fiber Channel Protocol (FCP) for mainframes and open systems is
utilized in this case. More importantly, the Fiber Channel over Ethernet (FCoE)
allows FC traffic to be moved over the already set up ethernet infrastructure that
supports high speed connectivity, while converging IP Protocols and Storage within a
single cable. Technologies such as Small Computing Interface (SCSI) are normally
utilized in SME’s since this offers a cheaper option unlike InfiniBand, and FC, which
are usually used to establish environments that offer highspeed capability.
Week 2
Operating systems use file managers to interact with mass storage devices. However,
the way in which data is stored and retrieved is dictated by the file system. There are
many types of file systems used by modern operating systems. Find and summarise
ONE resource that describes ONE such file system that is NOT FAT, FAT32 or
ExFAT. The resource, and your summary, must focus on A SINGLE file system.
Title and Reference: NTFS
Network File System (NFS)
Web.mit.edu. (2019). Chapter 18. Network File System (NFS). [online] Available at:
https://web.mit.edu/rhel-doc/5/RHEL-5-manual/Deployment_Guide-en-US/ch-
nfs.html [Accessed 25 May 2019].
<Provide the Title of the resource and full Harvard reference here. This should
include the URL of the resource>
Summary:
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
A network file system makes it possible for mounting of file systems via a
network by remote hosts. Also, NFS allows the remote hosts to interact with the
mounted file systems as if they have been locally mounted. The primary importance
of this is that it allows IT technician to put together resources on servers that are
centralized quite efficiently. At the moment, three versions of NFS are available for
use. They include, NFSv2, which happens to be very common and greatly supported
by many systems. NFSv3 have a huge number of features such as Safe Async Writes,
advanced Error handling capabilities, and 64bit file handling capability.
There is also NFSv4 which is able to work efficiently on the internet and
through firewalls. This version doesn’t need ACLs, portmapper, and makes use on the

most important operations. All the versions of the NFS can employ Transmission
Control Protocol (TCP) that runs via an Internet Protocol Network. This is a critical
component of NFSv4. On the other hand, NFSv3 and NFSv2 can optionally employ
User Datagram Protocol (UDP) that uses the IP network as its main platform in order
to avail a network connection that is stateless between the server and client.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across
Australia and there is a mix of technologies that are being used to deliver Internet
services (for example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find
and summarise ONE resource that describes ONE of these delivery technologies.
The resource, and your summary, must focus on A SINGLE technology.
Title and Reference: How does the nbn™ work?
Mate. (2019). How does the nbn™ work?. [online] Available at:
https://www.letsbemates.com.au/how-does-the-nbn-work/ [Accessed 25 May 2019].
<Provide the Title of the resource and full Harvard reference here. This should
include the URL of the resource>
Summary:
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
The National Broadband Network is considered to be Australia’s digital
future. The NBN is a project established by Australis national Data Network and it
allows users to gain access to high-speed broadband connectivity both at work and
home. The nbnTM is primarily owned by the government and operates as a wholesale
availability system that allows service producers to gain connectivity, and in turn they
are able to offer connectivity to the small clients. The nbnTM seeks to overrule the
former internet, phone, and data networks, and its advantage is that it enables users to
gain extremely high-speed connectivity to entire populations.
The NBN incorporate four primary technologies, which are; satellite, Optica
Fiber, Fixed Wireless, and Pay TV cable. Using this technology, NBN is able to
support the following types of connectivity: Fiber to the Node (FTTN), Fiber to the
Premises (FTTP), and Fiber to the Building. Fiber to the Premises is the most
common, and it’s basically a fiber optic that goes through homes then ends at the
Network Termination Device (NTD). Using the NTD, homes are able to subscribe to
services to more than four data providers while having two phone services. FTTP can
be availed through laying new cables or with connecting new fiber cables to the
already established telephone network.
Week 4

The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or hide
online their online activities. Find and summarise ONE resource that describes what
Tor is and how it works. The resource, and your summary, must focus purely on Tor.
Title and Reference: What is the Tor Browser? How it works and how it can help
you protect your identity online
Porup, J. (2019). What is the Tor Browser? How it works and how protects your
identity. [online] CSO Online. Available at:
https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works-
and-how-it-can-help-you-protect-your-identity-online.html [Accessed 25 May 2019].
<Provide the Title of the resource and full Harvard reference here. This should
include the URL of the resource>
Summary:
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
The Tor technology enables users to disguise their identity while on the
network, thereby, allowing a person to move traffic anonymously across multiple
servers. The tor network encrypts the traffic that is being transferred so that the
destination cannot be tracked. Trying to analyse the destination only shows network
nodes rather than the exact computer that has made a request. Tor was developed to
allows people to remain anonymous while on the internet, and this was undertaken by
the US navy when they undertook to establish a ring of network servers all over the
globe. However, the network is currently used for non profit purposes and provides a
platform for researching how online privacy tools can be developed.
In order to surf the tor network, one has to use the tor browser as it uses the
technology in the network to anonymize traffic. The downside of using the tor
network to surf is the fact that is tend to be a little bit slower than the clear internet, at
the same time, various web service providers block Tor users. Tor network is made up
of a three-layer proxy, and this is what allows network traffic to be anonymized. In
the Tor network, Connections are made randomly to an entry node that is publicly
listed. The node will then bounce all traffic that goes through it to a middle relay that
is also randomly selected. Finally, the traffic is spit out of the network using a
randomly selected exit node.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT 20246 Assignment Submission
|12
|3946
|103

Examples of Traditional Mass Storage and NAS or SAN Storage Technologies
|16
|4045
|292

Crypto Jacking: Stealing CPU Resources for Mining
|15
|3543
|261

IT Write Up - Desklib
|15
|4228
|150

Desklib - Online Library for Study Material
|12
|3639
|164

COIT 20246 Assignment Submission
|9
|4000
|134