Computer Networking Report: Designing a Network for FPH Company
VerifiedAdded on 2023/04/22
|10
|1722
|456
Report
AI Summary
This report analyzes the computer networking requirements for FPH Company, a publishing firm, focusing on network design, implementation, and management. It explores different network topologies, including ring, star, and bus, and recommends the star topology for its scalability and ease of troubleshooting, considering FPH's growth and staff size. The report emphasizes the use of the TCP/IP protocol for its security and reliability. It also details the importance of a Network Operating System (NOS) and recommends Linux for its intrusion detection capabilities and remote user management features. The report covers essential networking devices like routers, switches, and servers, highlighting the need for high-speed servers to handle large file transfers. The conclusion emphasizes the benefits of computer networking, such as file and resource sharing, and improved communication, leading to increased efficiency and reduced costs for FPH Company. The report also includes a list of references used in the analysis.

Computer Networking 1
Computer Networking
Professors Name
Affiliate Institution
Date
Computer Networking
Professors Name
Affiliate Institution
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Computer Networking 2
Q2
The volume of data that can be traded over a system framework at a given time is called its
information transmission. An exorbitant, high transmission limit compose can trade data
significantly quicker than a low information exchange limit one. The transmission limit is
influenced by the sorts of framework cards and modems used and furthermore the whole and sort
of connection used.
In like manner, the way by which PCs are related together to outline a framework bigger
influences its speed and efficiency. There are different unmistakable ways to deal with interface
PCs in a framework - yet these are the most broadly perceived. (Lamy, and Zourou, 2013)
Ring Topology
In this design, the PCs are associated together to frame a ring shape with the goal that none of the
PCs could really compare to any of the others.
In this chart, the printers is joined to one of the PCs in the system. This PC is known as the print
server and it handles all the printing occupations on the system.
The fundamental drawback of the ring topology is that the entire system will be influenced if
there is a break any place in the system cabling.
Star Topology
The star topology has one incredible PC (or an exceptional intersection box called a center point)
that controls the entire system. On the off chance that the center comes up short, the entire
system falls flat. Another detriment of the star topology is that it utilizes a ton of link. This make
Q2
The volume of data that can be traded over a system framework at a given time is called its
information transmission. An exorbitant, high transmission limit compose can trade data
significantly quicker than a low information exchange limit one. The transmission limit is
influenced by the sorts of framework cards and modems used and furthermore the whole and sort
of connection used.
In like manner, the way by which PCs are related together to outline a framework bigger
influences its speed and efficiency. There are different unmistakable ways to deal with interface
PCs in a framework - yet these are the most broadly perceived. (Lamy, and Zourou, 2013)
Ring Topology
In this design, the PCs are associated together to frame a ring shape with the goal that none of the
PCs could really compare to any of the others.
In this chart, the printers is joined to one of the PCs in the system. This PC is known as the print
server and it handles all the printing occupations on the system.
The fundamental drawback of the ring topology is that the entire system will be influenced if
there is a break any place in the system cabling.
Star Topology
The star topology has one incredible PC (or an exceptional intersection box called a center point)
that controls the entire system. On the off chance that the center comes up short, the entire
system falls flat. Another detriment of the star topology is that it utilizes a ton of link. This make

Computer Networking 3
it a costly system to set up (in addition to the fact that you have to purchase costly system links
you need to introduce all the more trunking to keep the links out of damages way).
Notwithstanding, the huge favorable position of the star arrange is that it is quick. This is on the
grounds that every work station is appended straightforwardly to the focal PC.
Bus Topology
In this topology orchestrate messages are sent to each terminal on the framework - so if one of
the terminals breaks, the others are not affected. In case you have to convey something explicit
from PC A to PC B then all of the PCs will get the message, in any case in light of the way that
you have included PC B's area, just PC B will lift it up and demonstrate it. ( DeCusatis, 2013)
Like the ring topology, there is no exceptional PC on this system. It is prevalent on the grounds
that it is a straightforward and a generally shabby and dependable topology.
it a costly system to set up (in addition to the fact that you have to purchase costly system links
you need to introduce all the more trunking to keep the links out of damages way).
Notwithstanding, the huge favorable position of the star arrange is that it is quick. This is on the
grounds that every work station is appended straightforwardly to the focal PC.
Bus Topology
In this topology orchestrate messages are sent to each terminal on the framework - so if one of
the terminals breaks, the others are not affected. In case you have to convey something explicit
from PC A to PC B then all of the PCs will get the message, in any case in light of the way that
you have included PC B's area, just PC B will lift it up and demonstrate it. ( DeCusatis, 2013)
Like the ring topology, there is no exceptional PC on this system. It is prevalent on the grounds
that it is a straightforward and a generally shabby and dependable topology.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Computer Networking 4
Q3
There are only three main networking principles which include:
1. FPH must understand what the user need; so the business must be able to understand
what the network will be used for. Therefore, since FPH company is a publishing
company an FTP system will have to be implemented for file sharing files amongst the
network users. Also, the company should be able to understand what network services
they will rely on the access the network. This is because different networks depends
comprise of different characteristics.
2. The second principle is that user services to protect the data must be understood
correctly; the company should not rely much on the network because users can cause it to
malfunction or can illegally steal some important information from it. Therefore networks
are not 100% secure but it only make our work easier by sharing the company files stored
in a single big database.
3. Thirdly is the design for the flexibility of the network for it scalability; while designing
the network, the company like FPH should think of the future growth of the company.
When the company grow, the network needs to be expand so that it can support all the
users working within FPH Company limited. Therefore, this has to be taken into
consideration so that the subnets can be reserved for future use.
The network topology which suits the FPH Company is the star topology. This is because star
topology is easier to expand than any other kind of network. FPH is a fast growing company with
a good number of staff, in total, they are 46. Therefore star topology is also easy to configure and
troubleshoot where the problem is.
Q3
There are only three main networking principles which include:
1. FPH must understand what the user need; so the business must be able to understand
what the network will be used for. Therefore, since FPH company is a publishing
company an FTP system will have to be implemented for file sharing files amongst the
network users. Also, the company should be able to understand what network services
they will rely on the access the network. This is because different networks depends
comprise of different characteristics.
2. The second principle is that user services to protect the data must be understood
correctly; the company should not rely much on the network because users can cause it to
malfunction or can illegally steal some important information from it. Therefore networks
are not 100% secure but it only make our work easier by sharing the company files stored
in a single big database.
3. Thirdly is the design for the flexibility of the network for it scalability; while designing
the network, the company like FPH should think of the future growth of the company.
When the company grow, the network needs to be expand so that it can support all the
users working within FPH Company limited. Therefore, this has to be taken into
consideration so that the subnets can be reserved for future use.
The network topology which suits the FPH Company is the star topology. This is because star
topology is easier to expand than any other kind of network. FPH is a fast growing company with
a good number of staff, in total, they are 46. Therefore star topology is also easy to configure and
troubleshoot where the problem is.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Computer Networking 5
The protocol that needs to be used in the implementation of this network is the TCP/IP protocol.
This is because TCP/IP is a network protocol which is trusted and is more secure than other
network protocols. (Rennie, and Morrison, 2013)
The protocol that needs to be used in the implementation of this network is the TCP/IP protocol.
This is because TCP/IP is a network protocol which is trusted and is more secure than other
network protocols. (Rennie, and Morrison, 2013)

Computer Networking 6
Section 2
Q1
Different networks defines what type of device to use and what kind of an operating system to be
used. For administrators to manage the FPH network with ease, it requires a network operating
system (NOS). NOS is very crucial in controlling and managing all the processes taking place
within the network environment. (Theoleyre, and Pang, 2013) For better management of the
connected computers, Linux operating system has to be used. This is because Linux OS detects
intrusion of attackers and can block them from causing problems to the system.
There are a number of networking devices which include; computer, router, transmission media,
hubs and switches, repeaters, network interface card and so many other devices like servers.
Servers are the computers which stores all the information of the FPH Company and allow client
computers to access the requested information stored within the server.
Section 2
Q1
Different networks defines what type of device to use and what kind of an operating system to be
used. For administrators to manage the FPH network with ease, it requires a network operating
system (NOS). NOS is very crucial in controlling and managing all the processes taking place
within the network environment. (Theoleyre, and Pang, 2013) For better management of the
connected computers, Linux operating system has to be used. This is because Linux OS detects
intrusion of attackers and can block them from causing problems to the system.
There are a number of networking devices which include; computer, router, transmission media,
hubs and switches, repeaters, network interface card and so many other devices like servers.
Servers are the computers which stores all the information of the FPH Company and allow client
computers to access the requested information stored within the server.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Computer Networking 7
Q2
The operating system which will be the best for managing the whole network is the Linux
operating system. This is because the network comprises of quite a larger number of users. When
the users are very many it is advisable for the company to use a Linux operating system. Also,
Linux operating system provides an environment where the administrator can add and remove
users remotely. (Horst, and Miller, 2013)
To combat with this kind of operating system, high end devices must be use to host the software.
High speed servers needs to be purchased and the Linux servers installed on them because they
require a very fast speed for it to run smoothly.
FPH must purchase high end devices which are very fast in speed to allow smooth running of the
company. This is because the company deals with uploading and downloading of large formats
files which are very heavy to the system. This kind of servers relies on high speed internet,
therefore, a huge bandwidth is needed.
These servers are very expensive to purchase but only one server is enough because it can use a
distributed system. The server can be shared so that the data are centralized in one location but
different workstation.
Conclusion
Setting up a PC network is a quick and solid method for sharing data and files inside a business
environment. It can enable you to benefit as much as possible from your IT frameworks and
hardware components.
Focal points of computer networking
Q2
The operating system which will be the best for managing the whole network is the Linux
operating system. This is because the network comprises of quite a larger number of users. When
the users are very many it is advisable for the company to use a Linux operating system. Also,
Linux operating system provides an environment where the administrator can add and remove
users remotely. (Horst, and Miller, 2013)
To combat with this kind of operating system, high end devices must be use to host the software.
High speed servers needs to be purchased and the Linux servers installed on them because they
require a very fast speed for it to run smoothly.
FPH must purchase high end devices which are very fast in speed to allow smooth running of the
company. This is because the company deals with uploading and downloading of large formats
files which are very heavy to the system. This kind of servers relies on high speed internet,
therefore, a huge bandwidth is needed.
These servers are very expensive to purchase but only one server is enough because it can use a
distributed system. The server can be shared so that the data are centralized in one location but
different workstation.
Conclusion
Setting up a PC network is a quick and solid method for sharing data and files inside a business
environment. It can enable you to benefit as much as possible from your IT frameworks and
hardware components.
Focal points of computer networking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Computer Networking 8
Major essential of systems administration are:
File sharing – you can without quite a bit of a stretch offer data between different
customers, or access it remotely if you keep it on other related contraptions.
Resource sharing – using framework related periphery contraptions like printers,
scanners, and copiers, or sharing programming between various customers, sets aside
some money.
Sharing a singular web affiliation – it is cost-beneficial and can help guarantee your
structures if you properly secure the framework.
Increasing amassing limit – you can get to reports and sight and sound, for instance,
pictures and music, which you store remotely on various machines or framework added
limit contraptions.
Associating PCs together enhances correspondence between the staff individuals inside the FPH
work spaces, so that:
Staff, suppliers, and customers can share information and associate even more
successfully
Your business can end up being logically profitable - for example masterminded access
to a run of the mill database can avoid comparative data being keyed on different events,
saving time and turning away mix-ups
Staff can oversee request and pass on an unrivaled standard of organization on account of
sharing customer data
Major essential of systems administration are:
File sharing – you can without quite a bit of a stretch offer data between different
customers, or access it remotely if you keep it on other related contraptions.
Resource sharing – using framework related periphery contraptions like printers,
scanners, and copiers, or sharing programming between various customers, sets aside
some money.
Sharing a singular web affiliation – it is cost-beneficial and can help guarantee your
structures if you properly secure the framework.
Increasing amassing limit – you can get to reports and sight and sound, for instance,
pictures and music, which you store remotely on various machines or framework added
limit contraptions.
Associating PCs together enhances correspondence between the staff individuals inside the FPH
work spaces, so that:
Staff, suppliers, and customers can share information and associate even more
successfully
Your business can end up being logically profitable - for example masterminded access
to a run of the mill database can avoid comparative data being keyed on different events,
saving time and turning away mix-ups
Staff can oversee request and pass on an unrivaled standard of organization on account of
sharing customer data

Computer Networking 9
Putting away information in a solitary enormous limit database will lessen the cost use which
could have been brought about in acquiring a few machines for information stockpiling. For
example:
Staff in FPH can oversee more customers in less time since they have shared access to
customer and thing databases
You can unite framework association, which implies less IT support is required
You can cut expenses through sharing of peripherals and electronic applications
Putting away information in a solitary enormous limit database will lessen the cost use which
could have been brought about in acquiring a few machines for information stockpiling. For
example:
Staff in FPH can oversee more customers in less time since they have shared access to
customer and thing databases
You can unite framework association, which implies less IT support is required
You can cut expenses through sharing of peripherals and electronic applications
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Computer Networking 10
References
Anderson, C.W., 2013. Rebuilding the news: Metropolitan journalism in the digital age. Temple
University.
DeCusatis, C. ed., 2013. Handbook of fiber optic data communication: a practical guide to
optical networking. Academic Press.
Horst, H.A. and Miller, D. eds., 2013. Digital anthropology. A&C Black.
Lamy, M. and Zourou, K. eds., 2013. Social networking for language education. Springer.
Rennie, F. and Morrison, T., 2013. E-learning and social networking handbook: Resources for
higher education. Routledge.
Theoleyre, F. and Pang, A.C. eds., 2013. Internet of Things and M2M Communications. River
Publishers.
References
Anderson, C.W., 2013. Rebuilding the news: Metropolitan journalism in the digital age. Temple
University.
DeCusatis, C. ed., 2013. Handbook of fiber optic data communication: a practical guide to
optical networking. Academic Press.
Horst, H.A. and Miller, D. eds., 2013. Digital anthropology. A&C Black.
Lamy, M. and Zourou, K. eds., 2013. Social networking for language education. Springer.
Rennie, F. and Morrison, T., 2013. E-learning and social networking handbook: Resources for
higher education. Routledge.
Theoleyre, F. and Pang, A.C. eds., 2013. Internet of Things and M2M Communications. River
Publishers.
1 out of 10
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.
