Detailed Report on the Design and Implementation of a Network
VerifiedAdded on 2023/03/24
|45
|12570
|35
Report
AI Summary
This report provides a detailed overview of network design and implementation, starting with the basics of networking, advantages, and different types of networks such as peer-to-peer and client/server models. It covers essential networking components like cables, network interface cards (NICs), hubs, switches, and structured cabling, including 10BaseT and thin coax. The report also discusses wireless networks, highlighting the advantages and disadvantages of WLANs, and delves into designing efficient networked techniques, diagnosing and implementing network systems, and ensuring network security. It further explores various networking products, features, and roles associated with networks, offering a comprehensive understanding of network infrastructure and best practices.

Design & Implementation of a Network
Date: October 27th 2017
CONTENTS
1
Date: October 27th 2017
CONTENTS
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Contents
1.0 INTRODUCTION....................................................................................................................3
1.1 Basic of Networking.................................................................................................................4
1.2 Advantages of Networking .....................................................................................................4
2.0 Role associated with networks.................................................................................................5
3.0 Networking products and features:...........................................................................................7
4.0 Design efficient networked techniques -...................................................................................9
5.0 Diagnose and implement network systems Devices...............................................................16
6.0 Design efficient networked techniques...................................................................................20
7.0 Conclusion:.............................................................................................................................43
8.0 Reference................................................................................................................................44
1.0 Introduction
2
1.0 INTRODUCTION....................................................................................................................3
1.1 Basic of Networking.................................................................................................................4
1.2 Advantages of Networking .....................................................................................................4
2.0 Role associated with networks.................................................................................................5
3.0 Networking products and features:...........................................................................................7
4.0 Design efficient networked techniques -...................................................................................9
5.0 Diagnose and implement network systems Devices...............................................................16
6.0 Design efficient networked techniques...................................................................................20
7.0 Conclusion:.............................................................................................................................43
8.0 Reference................................................................................................................................44
1.0 Introduction
2

This Introduction to Networking document should be read in the
context of other information provided on the networking section of the
NCTE website, and in association with the NCTE Advice and Planning
Pack issued to in 2002. This introduction document is not meant to be
a comprehensive guide to all aspects of networking but rather is
focused on providing with a basic understanding of the issues related
to Networking in.
The purpose of the networking guidelines are as follows:
to assist in understanding the benefits of networking
To help place in context their current stage of networking
development in their school.
To assist in planning the next stage of network development in
their school.
to provide standard networking ‘models’ and best practice to
that will assist in their network planning.
This document includes information under the following main
headings:
Introduction to Networking
Advantages of Networking
Types of Networks
Models of networking appropriate to
NCTE rrecommendation to
Some relevant terms.
1.1. Basic of Networking
A computer network consists of a collection of computers, printers and
other equipment that is connected together so that they can
communicate with each other (see Advice Sheet 17 on the ICT Planning
for pack). Fig 1 gives an example of a network in a school comprising
of a local area network or LAN connecting computers with each other,
the internet, and various servers.
3
context of other information provided on the networking section of the
NCTE website, and in association with the NCTE Advice and Planning
Pack issued to in 2002. This introduction document is not meant to be
a comprehensive guide to all aspects of networking but rather is
focused on providing with a basic understanding of the issues related
to Networking in.
The purpose of the networking guidelines are as follows:
to assist in understanding the benefits of networking
To help place in context their current stage of networking
development in their school.
To assist in planning the next stage of network development in
their school.
to provide standard networking ‘models’ and best practice to
that will assist in their network planning.
This document includes information under the following main
headings:
Introduction to Networking
Advantages of Networking
Types of Networks
Models of networking appropriate to
NCTE rrecommendation to
Some relevant terms.
1.1. Basic of Networking
A computer network consists of a collection of computers, printers and
other equipment that is connected together so that they can
communicate with each other (see Advice Sheet 17 on the ICT Planning
for pack). Fig 1 gives an example of a network in a school comprising
of a local area network or LAN connecting computers with each other,
the internet, and various servers.
3

Fig 1: Representation of Network in a school.
Broadly speaking, there are two types of network configuration, peer-
to-peer networks and client/server networks.
Peer-to-peer networks are more commonly implemented where less
then ten computers are involved and where strict security is not
necessary. All computers have the same status, hence the term 'peer',
and they communicate with each other on an equal footing. Files, such
as word processing or spreadsheet documents, can be shared across
the network and all the computers on the network can share devices,
such as printers or scanners, which are connected to any one
computer.
Fig 2: Peer to Peer Networking
Client/server networks are more suitable for larger networks. A
central computer, or 'server', acts as the storage location for files and
applications shared on the network. Usually the server is a higher than
average performance computer. The server also controls the network
access of the other computers which are referred to as the 'client'
School ‘Local Area
Network’ (LAN)
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
Cache, Proxy,
Filtering, Firewall
Server
Users
Computers
Other users,
Computers
File and Print Server
CD or Multimedia
Servers
Printers, Scanners etc.
Peer to Peer
Network
4
Broadly speaking, there are two types of network configuration, peer-
to-peer networks and client/server networks.
Peer-to-peer networks are more commonly implemented where less
then ten computers are involved and where strict security is not
necessary. All computers have the same status, hence the term 'peer',
and they communicate with each other on an equal footing. Files, such
as word processing or spreadsheet documents, can be shared across
the network and all the computers on the network can share devices,
such as printers or scanners, which are connected to any one
computer.
Fig 2: Peer to Peer Networking
Client/server networks are more suitable for larger networks. A
central computer, or 'server', acts as the storage location for files and
applications shared on the network. Usually the server is a higher than
average performance computer. The server also controls the network
access of the other computers which are referred to as the 'client'
School ‘Local Area
Network’ (LAN)
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
Cache, Proxy,
Filtering, Firewall
Server
Users
Computers
Other users,
Computers
File and Print Server
CD or Multimedia
Servers
Printers, Scanners etc.
Peer to Peer
Network
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

computers. Typically, teachers and students in a school will use the
client computers for their work and only the network administrator
(usually a designated staff member) will have access rights to the
server.
Fig 3: Client - Server Networking
Table 1 provides a summary comparison between Peer-to-Peer and
Client/Server Networks.
Peer-to-Peer Networks vs. Client/Server Networks
Peer-to-Peer Networks Client/Server Networks
· Easy to set up · More difficult to set up
· Less expensive to install · More expensive to install
· Can be implemented on a
wide range of operating
systems
· A variety of operating systems
can be supported on the client
computers, but the server needs to
run an operating system that
supports networking
· More time consuming to
maintain the software being
used (as computers must be
managed individually)
· Less time consuming to maintain
the software being used (as most
of the maintenance is managed
from the server)
· Very low levels of security
supported or none at all. These
can be very cumbersome to set
up, depending on the operating
· High levels of security are
supported, all of which are
controlled from the server. Such
measures prevent the deletion of
File Server
Other
equipment
5
client computers for their work and only the network administrator
(usually a designated staff member) will have access rights to the
server.
Fig 3: Client - Server Networking
Table 1 provides a summary comparison between Peer-to-Peer and
Client/Server Networks.
Peer-to-Peer Networks vs. Client/Server Networks
Peer-to-Peer Networks Client/Server Networks
· Easy to set up · More difficult to set up
· Less expensive to install · More expensive to install
· Can be implemented on a
wide range of operating
systems
· A variety of operating systems
can be supported on the client
computers, but the server needs to
run an operating system that
supports networking
· More time consuming to
maintain the software being
used (as computers must be
managed individually)
· Less time consuming to maintain
the software being used (as most
of the maintenance is managed
from the server)
· Very low levels of security
supported or none at all. These
can be very cumbersome to set
up, depending on the operating
· High levels of security are
supported, all of which are
controlled from the server. Such
measures prevent the deletion of
File Server
Other
equipment
5

system being used essential system files or the
changing of settings
· Ideal for networks with less
than 10 computers
· No limit to the number of
computers that can be supported
by the network
· Does not require a server · Requires a server running a
server operating system
· Demands a moderate level of
skill to administer the network
· Demands that the network
administrator has a high level of IT
skills with a good working
knowledge of a server operating
system
Table 1: Peer-to-Peer Networks vs. Client/Server Networks
Components of a Network
A computer network comprises the following components:
A minimum of at least 2 computers
Cables that connect the computers to each other, although
wireless communication is becoming more common (see Advice
Sheet 20 for more information)
A network interface device on each computer (this is called a
network interface card or NIC)
A ‘Switch’ used to switch the data from one point to another.
Hubs are outdated and are little used for new installations.
Network operating system software
Structured Cabling
The two most popular types of structured network cabling are
twisted-pair (also known as 10BaseT) and thin coax (also known as
10Base2). 10BaseT cabling looks like ordinary telephone wire, except
that it has 8 wires inside instead of 4. Thin coax looks like the copper
coaxial cabling that's often used to connect a Video Recorder to a TV.
10BaseT Cabling
When 10BaseT cabling is used, a strand of cabling is inserted between
each computer and a hub. If you have 5 computers, you'll need 5
cables. Each cable cannot exceed 325 feet in length. Because the
cables from all of the PCs converge at a common point, a 10BaseT
network forms a star configuration.
Fig 4a shows a Cat5e cable, with a standard connector, known as an
RJ-45 connector.
Fig 4b shows a standard Cat5e Wall Outlet socket which the cables are
connected to.
6
changing of settings
· Ideal for networks with less
than 10 computers
· No limit to the number of
computers that can be supported
by the network
· Does not require a server · Requires a server running a
server operating system
· Demands a moderate level of
skill to administer the network
· Demands that the network
administrator has a high level of IT
skills with a good working
knowledge of a server operating
system
Table 1: Peer-to-Peer Networks vs. Client/Server Networks
Components of a Network
A computer network comprises the following components:
A minimum of at least 2 computers
Cables that connect the computers to each other, although
wireless communication is becoming more common (see Advice
Sheet 20 for more information)
A network interface device on each computer (this is called a
network interface card or NIC)
A ‘Switch’ used to switch the data from one point to another.
Hubs are outdated and are little used for new installations.
Network operating system software
Structured Cabling
The two most popular types of structured network cabling are
twisted-pair (also known as 10BaseT) and thin coax (also known as
10Base2). 10BaseT cabling looks like ordinary telephone wire, except
that it has 8 wires inside instead of 4. Thin coax looks like the copper
coaxial cabling that's often used to connect a Video Recorder to a TV.
10BaseT Cabling
When 10BaseT cabling is used, a strand of cabling is inserted between
each computer and a hub. If you have 5 computers, you'll need 5
cables. Each cable cannot exceed 325 feet in length. Because the
cables from all of the PCs converge at a common point, a 10BaseT
network forms a star configuration.
Fig 4a shows a Cat5e cable, with a standard connector, known as an
RJ-45 connector.
Fig 4b shows a standard Cat5e Wall Outlet socket which the cables are
connected to.
6

Fig 4c shows a standard Cat5e Patch Panel Wall Outlet socket which is
used to terminate the cables from various points in the school bank to
a central point.
Fig 4d shows a wall mounted cabinet used to house and protect patch
panel cables and connectors.
Fig 4a: Cat5e Cable and a close up of RJ-45 connector
Fig 4b: Cat5e Wall Outlets
Fig 4c: Cat5e Patch Panel
Fig4d: Wall Mounted Cabinet
10BaseT cabling is available in different grades or categories. Some
grades, or "cats", are required for Fast Ethernet networks, while others
are perfectly acceptable for standard 10Mbps networks--and less
7
used to terminate the cables from various points in the school bank to
a central point.
Fig 4d shows a wall mounted cabinet used to house and protect patch
panel cables and connectors.
Fig 4a: Cat5e Cable and a close up of RJ-45 connector
Fig 4b: Cat5e Wall Outlets
Fig 4c: Cat5e Patch Panel
Fig4d: Wall Mounted Cabinet
10BaseT cabling is available in different grades or categories. Some
grades, or "cats", are required for Fast Ethernet networks, while others
are perfectly acceptable for standard 10Mbps networks--and less
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

expensive, too. All new networks use a minimum of standard
unshielded twisted-pair (UTP) Category 5e 10BaseT cabling
because it offers a performance advantage over lower grades.
Network Interface Card (NIC)
A NIC (pronounced 'nick') is also known as a network card. It connects
the computer to the cabling, which in turn links all of the computers on
the network together. Each computer on a network must have a
network card. Most modern network cards are 10/100 NICs and can
operate at either 10Mbps or 100Mbps.
Only NICs supporting a minimum of 100Mbps should be used in new
installations.
Computers with a wireless connection to a network also use a network
card (see Advice Sheet 20 for more information on wireless
networking).
Fig 5: Network Interface Cards (NICs)
Hub and Switch
A hub is a device used to connect a PC to the network. The function of
a hub is to direct information around the network, facilitating
communication between all connected devices. However in new
installations switches should be used instead of hubs as they are more
effective and provide better performance. A switch, which is often
termed a 'smart hub'.
Switches and hubs are technologies or ‘boxes’ to which computers,
printers, and other networking devices are connected. Switches are the
more recent technology and the accepted way of building today's
networks. With switching, each connection gets "dedicated bandwidth"
and can operate at full speed. In contrast, a hub shares bandwidth
across multiple connections such that activity from one PC or server
can slow down the effective speed of other connections on the hub.
Now more affordable than ever, Dual-speed 10/100 autosensing
switches are recommended for all school networks. May want to
consider upgrading any hub based networks with switches to improve
network performance – i.e. speed of data on the network.
8
unshielded twisted-pair (UTP) Category 5e 10BaseT cabling
because it offers a performance advantage over lower grades.
Network Interface Card (NIC)
A NIC (pronounced 'nick') is also known as a network card. It connects
the computer to the cabling, which in turn links all of the computers on
the network together. Each computer on a network must have a
network card. Most modern network cards are 10/100 NICs and can
operate at either 10Mbps or 100Mbps.
Only NICs supporting a minimum of 100Mbps should be used in new
installations.
Computers with a wireless connection to a network also use a network
card (see Advice Sheet 20 for more information on wireless
networking).
Fig 5: Network Interface Cards (NICs)
Hub and Switch
A hub is a device used to connect a PC to the network. The function of
a hub is to direct information around the network, facilitating
communication between all connected devices. However in new
installations switches should be used instead of hubs as they are more
effective and provide better performance. A switch, which is often
termed a 'smart hub'.
Switches and hubs are technologies or ‘boxes’ to which computers,
printers, and other networking devices are connected. Switches are the
more recent technology and the accepted way of building today's
networks. With switching, each connection gets "dedicated bandwidth"
and can operate at full speed. In contrast, a hub shares bandwidth
across multiple connections such that activity from one PC or server
can slow down the effective speed of other connections on the hub.
Now more affordable than ever, Dual-speed 10/100 autosensing
switches are recommended for all school networks. May want to
consider upgrading any hub based networks with switches to improve
network performance – i.e. speed of data on the network.
8

Fig 6a: An 8 port Hub
Fig 6b: 2 Examples of 24 port Switches
Wireless Networks
The term 'wireless network' refers to two or more computers
communicating using standard network rules or protocols, but without
the use of cabling to connect the computers together. Instead, the
computers use wireless radio signals to send information from one to
the other. A wireless local area network (WLAN) consists of two key
components: an access point (also called a base station) and a wireless
card. Information can be transmitted between these two components
as long as they are fairly close together (up to 100 meters indoors or
350 meters outdoors).
Fig 7a: Wireless Access point or Wireless Base station
Suppliers would need to visit the and conduct a site survey. This will
determine the number of base stations you need and the best place(s)
to locate them. A site survey will also enable each supplier to provide
you with a detailed quote. It is important to contact a number of
different suppliers as prices, equipment and opinions may vary. When
the term 'wireless network' is used today, it usually refers to a wireless
local area network or WLAN. A WLAN can be installed as the sole
network in a school or building. However, it can also be used to extend
9
Fig 6b: 2 Examples of 24 port Switches
Wireless Networks
The term 'wireless network' refers to two or more computers
communicating using standard network rules or protocols, but without
the use of cabling to connect the computers together. Instead, the
computers use wireless radio signals to send information from one to
the other. A wireless local area network (WLAN) consists of two key
components: an access point (also called a base station) and a wireless
card. Information can be transmitted between these two components
as long as they are fairly close together (up to 100 meters indoors or
350 meters outdoors).
Fig 7a: Wireless Access point or Wireless Base station
Suppliers would need to visit the and conduct a site survey. This will
determine the number of base stations you need and the best place(s)
to locate them. A site survey will also enable each supplier to provide
you with a detailed quote. It is important to contact a number of
different suppliers as prices, equipment and opinions may vary. When
the term 'wireless network' is used today, it usually refers to a wireless
local area network or WLAN. A WLAN can be installed as the sole
network in a school or building. However, it can also be used to extend
9

an existing wired network to areas where wiring would be too difficult
or too expensive to implement, or to areas located away from the main
network or main building. Wireless networks can be configured to
provide the same network functionality as wired networks, ranging
from simple peer-to-peer configurations to large-scale networks
accommodating hundreds of users.
Fig 7b: Desktop PC Wireless LAN card Fig 7c: Laptop PC
Wireless LAN card
What are the advantages and disadvantages of a Wireless
LAN?
Wireless LANs have advantages and disadvantages when compared
with wired LANs. A wireless LAN will make it simple to add or move
workstations, and to install access points to provide connectivity in
areas where it is difficult to lay cable. Temporary or semi-permanent
buildings that are in range of an access point can be wirelessly
connected to a LAN to give these buildings connectivity. Where
computer labs are used in, the computers (laptops) could be put on a
mobile cart and wheeled from classroom to classroom, providing they
are in range of access points. Wired network points would be needed
for each of the access points.
A WLAN has some specific advantages:
It is easier to add or move workstations
It is easier to provide connectivity in areas where it is difficult to
lay cable
Installation can be fast and easy and can eliminate the need to
pull cable through walls and ceilings
Access to the network can be from anywhere in the school within
range of an access point
Portable or semi-permanent buildings can be connected using a
wireless LAN
Where laptops are used, the ‘computer suite’ can be moved from
classroom to classroom on mobile carts
While the initial investment required for wireless LAN hardware
can be similar to the cost of wired LAN hardware, installation
expenses can be significantly lower
10
or too expensive to implement, or to areas located away from the main
network or main building. Wireless networks can be configured to
provide the same network functionality as wired networks, ranging
from simple peer-to-peer configurations to large-scale networks
accommodating hundreds of users.
Fig 7b: Desktop PC Wireless LAN card Fig 7c: Laptop PC
Wireless LAN card
What are the advantages and disadvantages of a Wireless
LAN?
Wireless LANs have advantages and disadvantages when compared
with wired LANs. A wireless LAN will make it simple to add or move
workstations, and to install access points to provide connectivity in
areas where it is difficult to lay cable. Temporary or semi-permanent
buildings that are in range of an access point can be wirelessly
connected to a LAN to give these buildings connectivity. Where
computer labs are used in, the computers (laptops) could be put on a
mobile cart and wheeled from classroom to classroom, providing they
are in range of access points. Wired network points would be needed
for each of the access points.
A WLAN has some specific advantages:
It is easier to add or move workstations
It is easier to provide connectivity in areas where it is difficult to
lay cable
Installation can be fast and easy and can eliminate the need to
pull cable through walls and ceilings
Access to the network can be from anywhere in the school within
range of an access point
Portable or semi-permanent buildings can be connected using a
wireless LAN
Where laptops are used, the ‘computer suite’ can be moved from
classroom to classroom on mobile carts
While the initial investment required for wireless LAN hardware
can be similar to the cost of wired LAN hardware, installation
expenses can be significantly lower
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Where a school is located on more than one site (such as on two
sides of a road), it is possible with directional antennae, to avoid
digging trenches under roads to connect the sites
In historic buildings where traditional cabling would compromise
the façade, a wireless LAN can avoid drilling holes in walls
Long-term cost benefits can be found in dynamic environments
requiring frequent moves and changes
They allows the possibility of individual pupil allocation of
wireless devices that move around the school with the pupil.
WLANs also have some disadvantages:
As the number of computers using the network increases, the
data transfer rate to each computer will decrease accordingly
As standards change, it may be necessary to replace wireless
cards and/or access points
Lower wireless bandwidth means some applications such as
video streaming will be more effective on a wired LAN
Security is more difficult to guarantee, and requires configuration
Devices will only operate at a limited distance from an access
point, with the distance determined by the standard used and
buildings and other obstacles between the access point and the
user
A wired LAN is most likely to be required to provide a backbone
to the wireless LAN; a wireless LAN should be a supplement to a
wired LAN and not a complete solution
Long-term cost benefits are harder to achieve in static
environments that require few moves and changes
It is easier to make a wired network ‘future proof’ for high data
transfer.
Wireless Network Components
There are certain parallels between the equipment used to build a
WLAN and that used in a traditional wired LAN. Both networks require
network interface cards or network adapter cards. A wireless LAN PC
card, which contains an in-built antenna, is used to connect notebook
computers to a wireless network. Usually, this is inserted into the
relevant slot in the side of the notebook, but some may be internal to
the notebook. Desktop computers can also connect to a wireless
network if a wireless network card is inserted into one of its internal
PCI slots.
In a wireless network, an 'access point' has a similar function to the
hub in wired networks. It broadcasts and receives signals to and from
the surrounding computers via their adapter card. It is also the point
11
sides of a road), it is possible with directional antennae, to avoid
digging trenches under roads to connect the sites
In historic buildings where traditional cabling would compromise
the façade, a wireless LAN can avoid drilling holes in walls
Long-term cost benefits can be found in dynamic environments
requiring frequent moves and changes
They allows the possibility of individual pupil allocation of
wireless devices that move around the school with the pupil.
WLANs also have some disadvantages:
As the number of computers using the network increases, the
data transfer rate to each computer will decrease accordingly
As standards change, it may be necessary to replace wireless
cards and/or access points
Lower wireless bandwidth means some applications such as
video streaming will be more effective on a wired LAN
Security is more difficult to guarantee, and requires configuration
Devices will only operate at a limited distance from an access
point, with the distance determined by the standard used and
buildings and other obstacles between the access point and the
user
A wired LAN is most likely to be required to provide a backbone
to the wireless LAN; a wireless LAN should be a supplement to a
wired LAN and not a complete solution
Long-term cost benefits are harder to achieve in static
environments that require few moves and changes
It is easier to make a wired network ‘future proof’ for high data
transfer.
Wireless Network Components
There are certain parallels between the equipment used to build a
WLAN and that used in a traditional wired LAN. Both networks require
network interface cards or network adapter cards. A wireless LAN PC
card, which contains an in-built antenna, is used to connect notebook
computers to a wireless network. Usually, this is inserted into the
relevant slot in the side of the notebook, but some may be internal to
the notebook. Desktop computers can also connect to a wireless
network if a wireless network card is inserted into one of its internal
PCI slots.
In a wireless network, an 'access point' has a similar function to the
hub in wired networks. It broadcasts and receives signals to and from
the surrounding computers via their adapter card. It is also the point
11

where a wireless network can be connected into an existing wired
network.
The most obvious difference between wireless and wired networks,
however, is that the latter uses some form of cable to connect
computers together. A wireless network does not need cable to form a
physical connection between computers.
Wireless Network Configurations
Wireless networks can be configured in an ad hoc/peer-to-peer
arrangement or as a local area network.
Ad Hoc/Peer-to-Peer Configuration
this is the most basic wireless network configuration. It relies on the
wireless network adapters installed in the computers that are
communicating with each other. A computer within range of the
transmitting computer can connect to it. However, if a number of
computers are networked in this way, they must remain within range
of each other. Even though this configuration has no real
administration overhead, it should only be a consideration for very
small installations.
Benefits and Educational Uses
The installation of cables is time consuming and expensive. The
advantages of not doing so are apparent:
o the amount of work required and the time taken to complete it
are significantly reduced
o the network is accessible in places where wiring would have
been difficult or impossible
o with no cables linking computers together, cable-related faults
and network downtime are minimized
Where a wireless network is in place, teachers or students can have
continuous access to the network, even as they move with their
equipment from class to class.
The space over which a wireless network operates is not planar but
spherical. Therefore, in a multi-level site, network access is available in
rooms above or below the access point, without the need for additional
infrastructure.
In a location within a school where network access is required
occasionally, desktop computers fitted with wireless network cards can
be placed on trolleys and moved from location to location. They can
also be located in areas where group work is taking place. As they are
connected to the network, documents and files can be shared, and
access to the Internet is available, enhancing group project work.
As the range of the wireless network extends outside the building,
students and teachers can use wireless devices to gather and record
12
network.
The most obvious difference between wireless and wired networks,
however, is that the latter uses some form of cable to connect
computers together. A wireless network does not need cable to form a
physical connection between computers.
Wireless Network Configurations
Wireless networks can be configured in an ad hoc/peer-to-peer
arrangement or as a local area network.
Ad Hoc/Peer-to-Peer Configuration
this is the most basic wireless network configuration. It relies on the
wireless network adapters installed in the computers that are
communicating with each other. A computer within range of the
transmitting computer can connect to it. However, if a number of
computers are networked in this way, they must remain within range
of each other. Even though this configuration has no real
administration overhead, it should only be a consideration for very
small installations.
Benefits and Educational Uses
The installation of cables is time consuming and expensive. The
advantages of not doing so are apparent:
o the amount of work required and the time taken to complete it
are significantly reduced
o the network is accessible in places where wiring would have
been difficult or impossible
o with no cables linking computers together, cable-related faults
and network downtime are minimized
Where a wireless network is in place, teachers or students can have
continuous access to the network, even as they move with their
equipment from class to class.
The space over which a wireless network operates is not planar but
spherical. Therefore, in a multi-level site, network access is available in
rooms above or below the access point, without the need for additional
infrastructure.
In a location within a school where network access is required
occasionally, desktop computers fitted with wireless network cards can
be placed on trolleys and moved from location to location. They can
also be located in areas where group work is taking place. As they are
connected to the network, documents and files can be shared, and
access to the Internet is available, enhancing group project work.
As the range of the wireless network extends outside the building,
students and teachers can use wireless devices to gather and record
12

data outside, e.g., as part of a science experiment or individual
performance data as part of a PE class.
Technical and Purchasing Considerations
Network interface cards for wireless networks are more expensive than
their wired counterparts. The cost of the access points has also to be
considered.
Wireless networks work at up top 54Mbps, whereas wired networks
normally work at 100Mbps (Fast Ethernet). This data transmission rate
is dependant on the number of users, the distance from the access
point and the fabric of the building (metal structures in walls may have
an impact). A wireless network will be noticeably slow when a group of
users are transferring large files. This should be considered if
multimedia applications are to be delivered over the network to a
significant number of users.
As the range of the network may extend beyond the walls of the
building, it can be accessed from outside. Consideration should be
given to what security features the equipment provides to ensure that
only valid users have access to the network and that data is protected.
1.2. Advantages of Networking
Speed.
Networks provide a very rapid method for sharing and transferring files.
Without a network, files are shared by copying them to floppy disks, then
carrying or sending the disks from one computer to another. This method
of transferring files in this manner is very time-consuming.
Cost.
The network version of most software programs are available at
considerable savings when compared to buying individually licensed
copies. Besides monetary savings, sharing a program on a network allows
for easier upgrading of the program. The changes have to be done only
once, on the file server, instead of on all the individual workstations.
Centralized Software Management.
One of the greatest benefits of installing a network at a school is the fact
that all of the software can be loaded on one computer (the file server).
This eliminates that need to spend time and energy installing updates and
tracking files on independent computers throughout the building.
Resource Sharing.
Sharing resources is another area in which a network exceeds stand-alone
computers. Most cannot afford enough laser printers, fax machines,
modems, scanners, and CD-ROM players for each computer. However, if
13
performance data as part of a PE class.
Technical and Purchasing Considerations
Network interface cards for wireless networks are more expensive than
their wired counterparts. The cost of the access points has also to be
considered.
Wireless networks work at up top 54Mbps, whereas wired networks
normally work at 100Mbps (Fast Ethernet). This data transmission rate
is dependant on the number of users, the distance from the access
point and the fabric of the building (metal structures in walls may have
an impact). A wireless network will be noticeably slow when a group of
users are transferring large files. This should be considered if
multimedia applications are to be delivered over the network to a
significant number of users.
As the range of the network may extend beyond the walls of the
building, it can be accessed from outside. Consideration should be
given to what security features the equipment provides to ensure that
only valid users have access to the network and that data is protected.
1.2. Advantages of Networking
Speed.
Networks provide a very rapid method for sharing and transferring files.
Without a network, files are shared by copying them to floppy disks, then
carrying or sending the disks from one computer to another. This method
of transferring files in this manner is very time-consuming.
Cost.
The network version of most software programs are available at
considerable savings when compared to buying individually licensed
copies. Besides monetary savings, sharing a program on a network allows
for easier upgrading of the program. The changes have to be done only
once, on the file server, instead of on all the individual workstations.
Centralized Software Management.
One of the greatest benefits of installing a network at a school is the fact
that all of the software can be loaded on one computer (the file server).
This eliminates that need to spend time and energy installing updates and
tracking files on independent computers throughout the building.
Resource Sharing.
Sharing resources is another area in which a network exceeds stand-alone
computers. Most cannot afford enough laser printers, fax machines,
modems, scanners, and CD-ROM players for each computer. However, if
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

these or similar peripherals are added to a network, they can be shared
by many users.
Flexible Access.
School networks allow students to access their files from computers
throughout the school. Students can begin an assignment in their
classroom, save part of it on a public access area of the network, then go
to the media center after school to finish their work. Students can also
work cooperatively through the network.
Security.
Files and programs on a network can be designated as "copy inhibit," so
that you do not have to worry about illegal copying of programs. Also,
passwords can be established for specific directories to restrict access to
authorized users.
Main challenges of installing a School Network
Costs
Although a network will generally save money over time, the initial costs
can be substantial, and the installation may require the services of a
technician.
Requires Administrative Time.
Proper maintenance of a network requires considerable time and
expertise. Many have installed a network, only to find that they did not
budget for the necessary administrative support.
File Server May Fail.
Although a file server is no more susceptible to failure than any other
computer, when the files server "goes down," the entire network may
come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
14
by many users.
Flexible Access.
School networks allow students to access their files from computers
throughout the school. Students can begin an assignment in their
classroom, save part of it on a public access area of the network, then go
to the media center after school to finish their work. Students can also
work cooperatively through the network.
Security.
Files and programs on a network can be designated as "copy inhibit," so
that you do not have to worry about illegal copying of programs. Also,
passwords can be established for specific directories to restrict access to
authorized users.
Main challenges of installing a School Network
Costs
Although a network will generally save money over time, the initial costs
can be substantial, and the installation may require the services of a
technician.
Requires Administrative Time.
Proper maintenance of a network requires considerable time and
expertise. Many have installed a network, only to find that they did not
budget for the necessary administrative support.
File Server May Fail.
Although a file server is no more susceptible to failure than any other
computer, when the files server "goes down," the entire network may
come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
14

1.3. Networking Models: Towards a Networked School
This model shows a diagram of a networked school indicating the
various types of networking models used. These include computer
rooms, networked classrooms, and networked specialist rooms for
specific subjects. Mobile solutions are shown in the Resource room, the
General Purpose room and Building # 2. Note: To improve readability
only network points are shown, rather than cabling itself. Refer to Fig
8.
Main School Building
15
This model shows a diagram of a networked school indicating the
various types of networking models used. These include computer
rooms, networked classrooms, and networked specialist rooms for
specific subjects. Mobile solutions are shown in the Resource room, the
General Purpose room and Building # 2. Note: To improve readability
only network points are shown, rather than cabling itself. Refer to Fig
8.
Main School Building
15

Fig 8: Representation of a Whole School Network Model
Technology
Room
Post
Primary
Science
Labs
Post
Primary
Principals
Office
School
Admin
Office
Standard
Classrooms
Computer room
With 15-30
computers
General Purpose Room
ICT
Server &
Equipment
Room
Store
Room
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Specialist
Room
Post
Primary
Building 2
Temporary Pre-Fab
- Wireless Network
Building 3
Staff Room
Wireless link to
Building 2
Specialist
Room
Post
Primary
Resource
Room
16
Technology
Room
Post
Primary
Science
Labs
Post
Primary
Principals
Office
School
Admin
Office
Standard
Classrooms
Computer room
With 15-30
computers
General Purpose Room
ICT
Server &
Equipment
Room
Store
Room
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Standard
Classroom
Specialist
Room
Post
Primary
Building 2
Temporary Pre-Fab
- Wireless Network
Building 3
Staff Room
Wireless link to
Building 2
Specialist
Room
Post
Primary
Resource
Room
16
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Fig 9: Typical Network Model for a Primary or Special school.
Figure 9 shows a model for a Primary or Special school. This includes
connectivity to all classrooms back to a central network. The network
connects to a File and Print Server. Internet access is handled via a
modem or router, while internet Filtering, Proxy and Web Caching are
all handled via a dedicated server.
Fig 10: Typical Network Model for a Post Primary school.
Figure 10 shows a model for a Post Primary school. This includes
connectivity to all classrooms back to a central network. The network
connects to a File and Print Server. Internet access is handled via a
1st Class
# of computers
Senior Infants
# of computers
Junior Infants
# of computers 2nd Class
# of computers
6th Class
# of computers
5th Class
# of computers
4th Class
# of computers
3rd Class
# of computers
Resource room
# of computers
School ‘Local Area
Network’ (LAN)
Principal/Office
Staffroom
# Of computers
File & Print Server
Cache, Proxy,
Filtering, Firewall
Server
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
Principal/Office
# of computers
Staff room
# of computers
computer room
# of computers
specialist room
# of computers
standard classroom
# of computers
resource room
# of computers
technology lab
# of computers
science lab
# of computers
Library
# of computers
School ‘Local Area
Network’ (LAN)
File & Print Server
Cache/Proxy,
Filtering/Firewall
Server
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
17
Figure 9 shows a model for a Primary or Special school. This includes
connectivity to all classrooms back to a central network. The network
connects to a File and Print Server. Internet access is handled via a
modem or router, while internet Filtering, Proxy and Web Caching are
all handled via a dedicated server.
Fig 10: Typical Network Model for a Post Primary school.
Figure 10 shows a model for a Post Primary school. This includes
connectivity to all classrooms back to a central network. The network
connects to a File and Print Server. Internet access is handled via a
1st Class
# of computers
Senior Infants
# of computers
Junior Infants
# of computers 2nd Class
# of computers
6th Class
# of computers
5th Class
# of computers
4th Class
# of computers
3rd Class
# of computers
Resource room
# of computers
School ‘Local Area
Network’ (LAN)
Principal/Office
Staffroom
# Of computers
File & Print Server
Cache, Proxy,
Filtering, Firewall
Server
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
Principal/Office
# of computers
Staff room
# of computers
computer room
# of computers
specialist room
# of computers
standard classroom
# of computers
resource room
# of computers
technology lab
# of computers
science lab
# of computers
Library
# of computers
School ‘Local Area
Network’ (LAN)
File & Print Server
Cache/Proxy,
Filtering/Firewall
Server
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
17

modem or router, while internet Filtering, Proxy and Web Caching are
all handled via a dedicated server.
Fig 11: Server Functionality Model
Server Functionality
The network connects to a File and Print Server, Fig 11. The File server
stores common files, The Print Server manages the different requests for
printing. A Multimedia or CD server is used to store and distribute
Multimedia - Sound, Video, Text, applications etc. Internet access is
handled via a modem or router, while internet Filtering, Proxy and Web
Caching are all handled via a dedicated server.
Example network configurations:
Models for Networking
First let’s review some simple models where no networking exits and
computers are used in standalone or ad-hoc mode. The following
represent some simple models representing classrooms.
Model 1a: One computer in a classroom with its own private printer. It
is recommended that with computers in this situation would network
the classrooms in question as shown. Networking will more effectively
make use of commonly shared resources such as file servers and
school printers, internet, email etc. When a mobile PC or PC with
projector is require in a room the network points are already present.
File & Print Server
Cache/Proxy,
Filtering/Firewall
Server
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
Multimedia or
CD Server
Printer
Scanner
Network
Main Servers &
Internet Access
18
all handled via a dedicated server.
Fig 11: Server Functionality Model
Server Functionality
The network connects to a File and Print Server, Fig 11. The File server
stores common files, The Print Server manages the different requests for
printing. A Multimedia or CD server is used to store and distribute
Multimedia - Sound, Video, Text, applications etc. Internet access is
handled via a modem or router, while internet Filtering, Proxy and Web
Caching are all handled via a dedicated server.
Example network configurations:
Models for Networking
First let’s review some simple models where no networking exits and
computers are used in standalone or ad-hoc mode. The following
represent some simple models representing classrooms.
Model 1a: One computer in a classroom with its own private printer. It
is recommended that with computers in this situation would network
the classrooms in question as shown. Networking will more effectively
make use of commonly shared resources such as file servers and
school printers, internet, email etc. When a mobile PC or PC with
projector is require in a room the network points are already present.
File & Print Server
Cache/Proxy,
Filtering/Firewall
Server
Modem or Router
Access to:
Internet content &
learning resources,
Scoilnet etc
Email communication
Multimedia or
CD Server
Printer
Scanner
Network
Main Servers &
Internet Access
18

In this scenario, there could be a single LAN-connected point for the
teacher and an additional LAN connection to allow for a portable
switch. Refer to diagram 12a
Model 1a
Fig 12a: From single PC to networked LAN Points
Model 1b: This scenario is similar to Model 1a, but where other
equipment such as printers, scanners are used in ad-hoc and inefficient
configuration. It is recommended that with computers in this situation
would network the classrooms in question. Networking will more
effectively make use of commonly shared resources such as scanners,
printers, internet, email etc. In this scenario there may be a single LAN-
connected point for the teacher and a limited number of LAN
connection points throughout the room to allow students access to the
school LAN. The connection points may be situated as required around
the room depending upon class learning requirements and the
availability of existing power outlets. Refer to diagram 12b
Model 1b:
Fig 12b: Networking other commonly used equipment
Networked Computer Room
Model 1c: A non networked computer room or resource area with an
ad-hoc and inefficient use of printers, scanners etc. Networking
19
teacher and an additional LAN connection to allow for a portable
switch. Refer to diagram 12a
Model 1a
Fig 12a: From single PC to networked LAN Points
Model 1b: This scenario is similar to Model 1a, but where other
equipment such as printers, scanners are used in ad-hoc and inefficient
configuration. It is recommended that with computers in this situation
would network the classrooms in question. Networking will more
effectively make use of commonly shared resources such as scanners,
printers, internet, email etc. In this scenario there may be a single LAN-
connected point for the teacher and a limited number of LAN
connection points throughout the room to allow students access to the
school LAN. The connection points may be situated as required around
the room depending upon class learning requirements and the
availability of existing power outlets. Refer to diagram 12b
Model 1b:
Fig 12b: Networking other commonly used equipment
Networked Computer Room
Model 1c: A non networked computer room or resource area with an
ad-hoc and inefficient use of printers, scanners etc. Networking
19
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

computer rooms is essential so that all PCs can access printers, the
internet, email etc. This scenario represents a school computing room
which can be timetabled for classes, and with each computer
networked to the LAN. There may be a single LAN-connected
presentation point for the teacher and LAN-connected computers
throughout the classroom. Traditionally, ICT in Irish secondary has
been concentrated in dedicated computer rooms. Primary have more
varied deployment. From an administrative point of view, this setup is
attractive. An entire class can be timetabled, avoiding problems of
extra teachers for split classes. Refer to diagram 12c
Model 1c:
Fig 12c: Networked computer lab.
Media Bays (Ref Fig 13a)
Media bays, or data suites are clusters of perhaps four desktop
computers, a scanner and a printer.
Though self-sufficient in terms of peripherals, they would be connected
to the main school network and have Internet access. This is one
reason why they would be best sited in public areas around the school.
These suites would be used by students in small groups or individually
and could accommodate task-oriented activities and self-directed
learning.
Advantages are easy access to staff and students alike, Utilize areas
of school without losing classrooms
Public supervision
Disadvantages are Open access means security issues must be
addressed.
20
internet, email etc. This scenario represents a school computing room
which can be timetabled for classes, and with each computer
networked to the LAN. There may be a single LAN-connected
presentation point for the teacher and LAN-connected computers
throughout the classroom. Traditionally, ICT in Irish secondary has
been concentrated in dedicated computer rooms. Primary have more
varied deployment. From an administrative point of view, this setup is
attractive. An entire class can be timetabled, avoiding problems of
extra teachers for split classes. Refer to diagram 12c
Model 1c:
Fig 12c: Networked computer lab.
Media Bays (Ref Fig 13a)
Media bays, or data suites are clusters of perhaps four desktop
computers, a scanner and a printer.
Though self-sufficient in terms of peripherals, they would be connected
to the main school network and have Internet access. This is one
reason why they would be best sited in public areas around the school.
These suites would be used by students in small groups or individually
and could accommodate task-oriented activities and self-directed
learning.
Advantages are easy access to staff and students alike, Utilize areas
of school without losing classrooms
Public supervision
Disadvantages are Open access means security issues must be
addressed.
20

Fig 13a: Movable or mobile Media Bays
Laptop and data-projector (Ref Fig 13b)
A combination of laptop and data-projector is a highly effective
teaching model where a teacher wants to provide the whole class with
visual or multimedia content. It can be used in conjunction with an
existing LAN point in the room for best effect.
Fig 13b: Movable or mobile Laptop PC with Digital Projector
Wireless LAN (Ref Fig 13c)
This scenario has the capability to connect multiple computers to the
school LAN without providing direct LAN connections. No LAN cabling
is required for the classroom; instead all computers are radio linked to
the LAN. Wireless LAN technology is relatively new and generally more
expensive and more limited than cabled LANs. There is the potential,
however, to save on extensive cabling work with this option.
Wireless connections allow a region to be connected to a network by
radio waves, which link a wireless card in the computer to a wireless
access point. One should remember that the access point itself must
be connected by cable to the main network.
Advantages
Flexibility of machines - usually laptops - linked even if students
break into small workgroups in different parts of room.
Wireless networking means that large common areas such as
canteens or libraries can be easily connected to the network.
21
Laptop and data-projector (Ref Fig 13b)
A combination of laptop and data-projector is a highly effective
teaching model where a teacher wants to provide the whole class with
visual or multimedia content. It can be used in conjunction with an
existing LAN point in the room for best effect.
Fig 13b: Movable or mobile Laptop PC with Digital Projector
Wireless LAN (Ref Fig 13c)
This scenario has the capability to connect multiple computers to the
school LAN without providing direct LAN connections. No LAN cabling
is required for the classroom; instead all computers are radio linked to
the LAN. Wireless LAN technology is relatively new and generally more
expensive and more limited than cabled LANs. There is the potential,
however, to save on extensive cabling work with this option.
Wireless connections allow a region to be connected to a network by
radio waves, which link a wireless card in the computer to a wireless
access point. One should remember that the access point itself must
be connected by cable to the main network.
Advantages
Flexibility of machines - usually laptops - linked even if students
break into small workgroups in different parts of room.
Wireless networking means that large common areas such as
canteens or libraries can be easily connected to the network.
21

Less unplugging of cables into sockets reduces wear and tear
Disadvantages
Wireless networking may prove much more expensive if wiring
large numbers of machines close together.
Wireless hubs data rates (typically 11Mbps) are considerably less
at present than their cable equivalent. Thus is unsuitable for high
data volumes such as multimedia access by large numbers of
machines.
Manufacturers stated ranges of 100 - 300 meters is wildly
optimistic. Ranges of less than 18 meters are not uncommon,
Data rates drop off as distance increases.
While it is unlikely that wireless will replace data cables in the near
future they do provide a flexibility that can be harnessed creatively.
Fig 13c: Wireless LAN (WLAN)
LO1 Examine networking principles plus their
protocols
Role associated with networks:
A computer network contains two or even more computers that are
connected in order to reveal the elements of your system (its
resources) and the details you store there. The standard computer
network (which includes just two connected computers) can expand
and become a lot more usable when additional computer systems join
and add their own resources to those being discussed. The first
computer, yours, is known as your local personal computer commonly.
More advanced to be used as a location to do work, the particular
workstation, compared to as the particular storage or even controlling
location, a machine. As more and more computers are linked to a
22
Disadvantages
Wireless networking may prove much more expensive if wiring
large numbers of machines close together.
Wireless hubs data rates (typically 11Mbps) are considerably less
at present than their cable equivalent. Thus is unsuitable for high
data volumes such as multimedia access by large numbers of
machines.
Manufacturers stated ranges of 100 - 300 meters is wildly
optimistic. Ranges of less than 18 meters are not uncommon,
Data rates drop off as distance increases.
While it is unlikely that wireless will replace data cables in the near
future they do provide a flexibility that can be harnessed creatively.
Fig 13c: Wireless LAN (WLAN)
LO1 Examine networking principles plus their
protocols
Role associated with networks:
A computer network contains two or even more computers that are
connected in order to reveal the elements of your system (its
resources) and the details you store there. The standard computer
network (which includes just two connected computers) can expand
and become a lot more usable when additional computer systems join
and add their own resources to those being discussed. The first
computer, yours, is known as your local personal computer commonly.
More advanced to be used as a location to do work, the particular
workstation, compared to as the particular storage or even controlling
location, a machine. As more and more computers are linked to a
22
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

network and share their particular assets, the network turns into the
more powerful tool, since employees using a network with increased
information and more capability are usually able to accomplish more
via those added computers or even additional resources. The real
strength of networking computer systems will become apparent if you
envision your own personal network growing and then hooking up it
with other distinctive systems, enabling resource and conversation
sharing across every system. That is, one network could be connected
to another network and turn into a more powerful tool due to the
greater resources.
System types:
Peer-to-Peer Marketing Overview
Peer-to-peer networking could be the utilization of the relatively
effective computers (personal computers) which exist at the edge of
the Internet for more than simply client-based computing tasks. The
present day personal computer (PC) has an extremely fast processor
chip, vast memory, plus the particular large hard disk, none of which
are being fully used when performing common processing tasks such
as Web plus e-mail browsing. The modern PC can easily act as both a
customer and server (a peer) for many types of programs.
Client/server
Client/server describes the relationship between 2 computer programs
in which 1 program, the client, makes a constant service request from
an extra program, the server, which usually fulfills the request.
However the client/server idea can be used simply by programs within
a single pc, it is a more important idea within the particular network.
The client/server model has become one of the main ideas of network
processing. Most corporation applications getting written today use the
client/server model. So does the particular Internet's main program,
TCP/IP <tcpip.htm>. In advertising, the term has been used to
differentiate distributed computing by smaller sized dispersed personal
computers from the "monolithic" centralized computing of
<mainfram.htm> computers. Yet this distinction has generally
washed out as mainframes plus their applications have also considered
the client/server model and turn into part of network computing.
Cloud Storage space
Cloud Storage is usually the service where information is maintained
remotely, handled, and backed up. The services are available to clients
23
more powerful tool, since employees using a network with increased
information and more capability are usually able to accomplish more
via those added computers or even additional resources. The real
strength of networking computer systems will become apparent if you
envision your own personal network growing and then hooking up it
with other distinctive systems, enabling resource and conversation
sharing across every system. That is, one network could be connected
to another network and turn into a more powerful tool due to the
greater resources.
System types:
Peer-to-Peer Marketing Overview
Peer-to-peer networking could be the utilization of the relatively
effective computers (personal computers) which exist at the edge of
the Internet for more than simply client-based computing tasks. The
present day personal computer (PC) has an extremely fast processor
chip, vast memory, plus the particular large hard disk, none of which
are being fully used when performing common processing tasks such
as Web plus e-mail browsing. The modern PC can easily act as both a
customer and server (a peer) for many types of programs.
Client/server
Client/server describes the relationship between 2 computer programs
in which 1 program, the client, makes a constant service request from
an extra program, the server, which usually fulfills the request.
However the client/server idea can be used simply by programs within
a single pc, it is a more important idea within the particular network.
The client/server model has become one of the main ideas of network
processing. Most corporation applications getting written today use the
client/server model. So does the particular Internet's main program,
TCP/IP <tcpip.htm>. In advertising, the term has been used to
differentiate distributed computing by smaller sized dispersed personal
computers from the "monolithic" centralized computing of
<mainfram.htm> computers. Yet this distinction has generally
washed out as mainframes plus their applications have also considered
the client/server model and turn into part of network computing.
Cloud Storage space
Cloud Storage is usually the service where information is maintained
remotely, handled, and backed up. The services are available to clients
23

over the network, which is usually the particular web. It allows the
particular consumer to store documents on the internet so that the
consumer may access them from any kind of location via the internet.
The company makes them available to the consumer online merely by
keeping the particular uploaded files on an exterior machine. This
gives companies making use of cloud storage services relieve and
convenience, but could possibly be costly. Clients should also become
mindful that backing up their own data is still required when utilizing
cloud space for storage services, mainly because recovering
information from fog up storage is much slower compared to local
backup.
A cluster (as it pertains to computers) describes the group of servers
as well as other resources that are connected by means of hardware,
networks and software program to act as if these people have been a
single system. There are numerous reasons this is an attractive issue
to do, for smaller corporations even. These reasons consist of: high
load balancing, availability, parallel processing, scalability and systems
management. We'll speak more about each of these applications later
on in this course. However the most important thing to understand
right now about clustering is that the goal would be to make a group of
personal computers show up (to the outside world and to inner user
departments) as if these were one, completely integrated program that
is always available plus generally working fast!
The centralized database (sometimes shortened CDB) is a database
that is situated, stored, and maintained in one area. This location is
definitely most a central personal computer or even database system
frequently, for example a desktop as well as server CPU, or a
mainframe pc. In most cases, a central data source would be used
merely by an organization (e. they would. a company) or even an
organization Customers access the centralized data source through a
personal computer network which is able to provide them with access
to the central PROCESSOR, which in turn maintains to the data source
itself.
Virtualization
Virtualization can be explained as the abstraction of bodily resources
into affordable devices, such that the single bodily resource can
appear as much reasonable units and several real resources can show
24
particular consumer to store documents on the internet so that the
consumer may access them from any kind of location via the internet.
The company makes them available to the consumer online merely by
keeping the particular uploaded files on an exterior machine. This
gives companies making use of cloud storage services relieve and
convenience, but could possibly be costly. Clients should also become
mindful that backing up their own data is still required when utilizing
cloud space for storage services, mainly because recovering
information from fog up storage is much slower compared to local
backup.
A cluster (as it pertains to computers) describes the group of servers
as well as other resources that are connected by means of hardware,
networks and software program to act as if these people have been a
single system. There are numerous reasons this is an attractive issue
to do, for smaller corporations even. These reasons consist of: high
load balancing, availability, parallel processing, scalability and systems
management. We'll speak more about each of these applications later
on in this course. However the most important thing to understand
right now about clustering is that the goal would be to make a group of
personal computers show up (to the outside world and to inner user
departments) as if these were one, completely integrated program that
is always available plus generally working fast!
The centralized database (sometimes shortened CDB) is a database
that is situated, stored, and maintained in one area. This location is
definitely most a central personal computer or even database system
frequently, for example a desktop as well as server CPU, or a
mainframe pc. In most cases, a central data source would be used
merely by an organization (e. they would. a company) or even an
organization Customers access the centralized data source through a
personal computer network which is able to provide them with access
to the central PROCESSOR, which in turn maintains to the data source
itself.
Virtualization
Virtualization can be explained as the abstraction of bodily resources
into affordable devices, such that the single bodily resource can
appear as much reasonable units and several real resources can show
24

up as a single logical gadget. The primary motivation behind
virtualization is to hide the actual physical characteristics and
irrelevant information on these resources from their owners. Thus,
each consumer has got the illusion of being the single consumer of
that physical supply (one-to-many virtualization). Or several physical
resources appear as being a single virtual resource towards the user
(many-to-one virtualization).
Network standards:
OSI Model
The particular OSI Model is a theoretical, seven-layered model of how
systems work. The Open Techniques Interconnect Model (the OSI
Model) is a theoretical type of networking that organizes system
functions into seven levels (physical layer, data link layer, network
layer, application layer, transport layer, session layer and presentation
layer) and identifies the conversation interfaces involving the OSI
Model's layers plus between network endpoints making use of a good
OSI Model-based process choice.
The OSI Model's Seven Layers
o OSI Design - Physical Layer
o OSI Model - Data link Level
o OSI Model - System Layer
o OSI Model -- Transport Layer
o OSI Design - Session Layer
o OSI Model - Presentation Coating
o OSI Model - Program Layer
TCP/IP Reference Design
TCP/IP means Transmission Manage Internet and Protocol. This really is
the network model utilized in the current Internet architecture too.
Protocols are set of guidelines which govern every probable
communication over the system. These protocols clarify the particular
movement of information involving the destination and source or
maybe the web. These protocols provide simple naming and handling
schemes.
TCP/IP that is Transmitting Control Protocol and Web Protocol was
developed by simply Division of Defense’s Project Analysis Agency
(ARPA, later DARPA) as a part of a research project associated with
network interconnection to connect remote control machines.
25
virtualization is to hide the actual physical characteristics and
irrelevant information on these resources from their owners. Thus,
each consumer has got the illusion of being the single consumer of
that physical supply (one-to-many virtualization). Or several physical
resources appear as being a single virtual resource towards the user
(many-to-one virtualization).
Network standards:
OSI Model
The particular OSI Model is a theoretical, seven-layered model of how
systems work. The Open Techniques Interconnect Model (the OSI
Model) is a theoretical type of networking that organizes system
functions into seven levels (physical layer, data link layer, network
layer, application layer, transport layer, session layer and presentation
layer) and identifies the conversation interfaces involving the OSI
Model's layers plus between network endpoints making use of a good
OSI Model-based process choice.
The OSI Model's Seven Layers
o OSI Design - Physical Layer
o OSI Model - Data link Level
o OSI Model - System Layer
o OSI Model -- Transport Layer
o OSI Design - Session Layer
o OSI Model - Presentation Coating
o OSI Model - Program Layer
TCP/IP Reference Design
TCP/IP means Transmission Manage Internet and Protocol. This really is
the network model utilized in the current Internet architecture too.
Protocols are set of guidelines which govern every probable
communication over the system. These protocols clarify the particular
movement of information involving the destination and source or
maybe the web. These protocols provide simple naming and handling
schemes.
TCP/IP that is Transmitting Control Protocol and Web Protocol was
developed by simply Division of Defense’s Project Analysis Agency
(ARPA, later DARPA) as a part of a research project associated with
network interconnection to connect remote control machines.
25
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The system was robust, and cable connections always been intact the
source plus destination machines were working until.
Layer 1: Host-to-network Layer
o Lowest layer from the all.
o Protocol is used for connecting to the host, so that the bouts can
be sent over it.
o Varies from host to sponsor and network to system.
Layer 2: Internet level
o Selection of a box changing network which is based on the
connectionless internetwork layer is usually referred to as an
internet coating.
o It really is the layer which usually together holds the whole
structures.
o It helps the packet to go to the destination independently.
o Purchase in which packets are obtained is different from the real
method they are sent.
o IP (Internet Protocol) is used in this level.
Layer 3: Transport Level
o It chooses if information transmission should be on suite and
suite path or single route.
o Functions such as multiplexing, segmenting or splitting on the
information is done merely by transport coating.
o The applications can read plus create to the transport level.
o Transport layer adds header information to the information.
o Transportation layer breaks the information (data) into small
products so that they are handled a lot more effectively by the
network level.
o Transport layer arrange the particular packets to be sent
furthermore, in sequence.
Layer 4: Software Layer
o The TCP/IP specs described the particular complete wide range of
applications that were at the top of the particular process stack.
Some of them had been TELNET, FTP, SMTP, DNS etc.
o TELNET is a dual end communication process which allows
linking to a remote machine plus run applications on this
particular.
o FTP (File Transfer Protocol) is really a protocol that allows
Document transfer amongst pc customers connected over the
particular system. It is simple, efficient and reliable.
26
source plus destination machines were working until.
Layer 1: Host-to-network Layer
o Lowest layer from the all.
o Protocol is used for connecting to the host, so that the bouts can
be sent over it.
o Varies from host to sponsor and network to system.
Layer 2: Internet level
o Selection of a box changing network which is based on the
connectionless internetwork layer is usually referred to as an
internet coating.
o It really is the layer which usually together holds the whole
structures.
o It helps the packet to go to the destination independently.
o Purchase in which packets are obtained is different from the real
method they are sent.
o IP (Internet Protocol) is used in this level.
Layer 3: Transport Level
o It chooses if information transmission should be on suite and
suite path or single route.
o Functions such as multiplexing, segmenting or splitting on the
information is done merely by transport coating.
o The applications can read plus create to the transport level.
o Transport layer adds header information to the information.
o Transportation layer breaks the information (data) into small
products so that they are handled a lot more effectively by the
network level.
o Transport layer arrange the particular packets to be sent
furthermore, in sequence.
Layer 4: Software Layer
o The TCP/IP specs described the particular complete wide range of
applications that were at the top of the particular process stack.
Some of them had been TELNET, FTP, SMTP, DNS etc.
o TELNET is a dual end communication process which allows
linking to a remote machine plus run applications on this
particular.
o FTP (File Transfer Protocol) is really a protocol that allows
Document transfer amongst pc customers connected over the
particular system. It is simple, efficient and reliable.
26

o SMTP (Simple Postal mail Transport Protocol) is a process, which
is used to transport electronic mail in between the particular
source and location, directed via a route.
o DNS (Domain Name Server) resolves an excellent IP address into
the particular textual address for Website hosts connected over a
network.
Topology:
Network Topologies
Two networks have the exact same topology if the connection settings
are the same, although the systems may differ in real
interconnections, distances between nodes, transmitting rates, and/or
signal forms.
Vertical Topology
o Hierarchical
o Fine mesh
Horizontal Topology
o Star
o Coach
o Tree
o Ring
Strategies:
Within modern protocol design, methods are “layered” according to
the OSI 7 layer model or even the particular similar layered design.
Layering is a design guideline which divides the process design into a
number of smaller sized parts, each right component accomplishing
the particular sub-task, and communicating with the other areas of the
protocol only in a number of well-defined ways. Layering allows the
parts of the protocol to be designed plus tested without a
combinatorial exploding market of cases, keeping every design simple
relatively. Layering permits familiar protocols to become adapted to
unusual circumstances also.
IPv4 Addresses plus Subnet Masks This section represents how to use
IPv4 addresses within the security appliance. An IPv4 address is a 32-
bit quantity written in dotted-decimal mention: four 8-bit fields (octets)
converted from binary in order to decimal numbers, separated simply
by dots. The first part of a good IP address identifies the particular
network on which the web host resides, while the second component
27
is used to transport electronic mail in between the particular
source and location, directed via a route.
o DNS (Domain Name Server) resolves an excellent IP address into
the particular textual address for Website hosts connected over a
network.
Topology:
Network Topologies
Two networks have the exact same topology if the connection settings
are the same, although the systems may differ in real
interconnections, distances between nodes, transmitting rates, and/or
signal forms.
Vertical Topology
o Hierarchical
o Fine mesh
Horizontal Topology
o Star
o Coach
o Tree
o Ring
Strategies:
Within modern protocol design, methods are “layered” according to
the OSI 7 layer model or even the particular similar layered design.
Layering is a design guideline which divides the process design into a
number of smaller sized parts, each right component accomplishing
the particular sub-task, and communicating with the other areas of the
protocol only in a number of well-defined ways. Layering allows the
parts of the protocol to be designed plus tested without a
combinatorial exploding market of cases, keeping every design simple
relatively. Layering permits familiar protocols to become adapted to
unusual circumstances also.
IPv4 Addresses plus Subnet Masks This section represents how to use
IPv4 addresses within the security appliance. An IPv4 address is a 32-
bit quantity written in dotted-decimal mention: four 8-bit fields (octets)
converted from binary in order to decimal numbers, separated simply
by dots. The first part of a good IP address identifies the particular
network on which the web host resides, while the second component
27

identifies the particular host around the given network. The system
number field is called the particular network prefix. All website hosts
on a given network discuss the same network prefix yet must have a
unique host quantity. In glassful IP, the particular class of the address
decides the boundary between the particular network prefix and the
web host number.
If you need large numbers of tackles on your network, and they need
not be routed on the Web, you can use private IP tackles that the
Internet Assigned Quantities Professional (IANA) recommends (see RFC
1918). The following tackle ranges are designated because private
networks that really should not be advertised:
• 10. 0. 0. 0 through 10. 255. 255. 255
• 172. 16. 0. 0 through 172. 31. 255. 255
• 192. 168. 0. 0 through 192. 168. 255. 255
IPv6 Addresses IPv6 is the following era of the Internet Process after
IPv4. It provides an expanded address room, a simplified header
structure, improved support for options and extensions, flow tagging
capability, and authentication plus privacy capabilities. IPv6 is
definitely described in RFC 2460. The IPv6 addressing buildings are
described in RFC 3513.
IPv6 Address Format
IPv6 addresses are represented as being a series of eight 16-bit
hexadecimal fields separated by colons (: ) in the particular format: x:
x: by: x: x: x: by: x. the following are samples of IPv6 addresses:
• 2001: 0DB8: 0000: 0000: 0008: 0800: 200C: 417A
TCP, session, UDP and without the presentation levels in between
TCP/IP Protocol Collection:
Application Layer
o BOOTP: Bootstrap Protocol
o DCAP: Data Hyperlink Switching Client Access Procedure
o DHCP: Dynamic Host Construction Protocol
o DNS: Domain Name Techniques
o FTP: File Transfer Process
Finger: User Information Process
28
number field is called the particular network prefix. All website hosts
on a given network discuss the same network prefix yet must have a
unique host quantity. In glassful IP, the particular class of the address
decides the boundary between the particular network prefix and the
web host number.
If you need large numbers of tackles on your network, and they need
not be routed on the Web, you can use private IP tackles that the
Internet Assigned Quantities Professional (IANA) recommends (see RFC
1918). The following tackle ranges are designated because private
networks that really should not be advertised:
• 10. 0. 0. 0 through 10. 255. 255. 255
• 172. 16. 0. 0 through 172. 31. 255. 255
• 192. 168. 0. 0 through 192. 168. 255. 255
IPv6 Addresses IPv6 is the following era of the Internet Process after
IPv4. It provides an expanded address room, a simplified header
structure, improved support for options and extensions, flow tagging
capability, and authentication plus privacy capabilities. IPv6 is
definitely described in RFC 2460. The IPv6 addressing buildings are
described in RFC 3513.
IPv6 Address Format
IPv6 addresses are represented as being a series of eight 16-bit
hexadecimal fields separated by colons (: ) in the particular format: x:
x: by: x: x: x: by: x. the following are samples of IPv6 addresses:
• 2001: 0DB8: 0000: 0000: 0008: 0800: 200C: 417A
TCP, session, UDP and without the presentation levels in between
TCP/IP Protocol Collection:
Application Layer
o BOOTP: Bootstrap Protocol
o DCAP: Data Hyperlink Switching Client Access Procedure
o DHCP: Dynamic Host Construction Protocol
o DNS: Domain Name Techniques
o FTP: File Transfer Process
Finger: User Information Process
28
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

o HTTP: Hypertext Transfer Process
o S-HTTP: Secure Hypertext Move Protocol (S-HTTP)
o IMAP and IMAP4: Internet Message Entry Protocol
o IPDC: IP Gadget Control
o IRCP (IRC): Web Relay Chat Process
o LDAP: Light weighted Directory Access Process
o MIME (S-MIME): Multi-purpose Web Mail Extensions (Secure
o MIME)
o NAT: Network Address Interpretation
o NNTP: Network News Move Protocol
o NTP: Network Period Protocol
o POP & POP3: Post Office Process (version 3)
o RLOGIN: Remote Login within Unix
o RMON: Remote Overseeing MIBs in SNMP
o SLP: Service Region Protocol
o SMTP: Simple Mail Transfer Process
o SNMP: Simple Network Administration Protocol
o SNTP: Simple System Time Procedure
o TELNET: TCP/IP Terminal Emulation Protocol
o TFTP: Trivial File Transfer Process
o URL: Uniform Resource Locator
X-Window: X Window or even X Process or By System Screen Layer
o LPP: Lightweight Display Protocol
o Program Layer
o RPC: Remote Process Call process
o Transport Level
o ITOT: ISO Transport More than TCP/IP
o RDP: Reliable Information Protocol
o RUDP: Reliable UDP
o TALI: Transport Adapter Coating Interface
o TCP: Transmission Manage Protocol
o UDP: User Datagram Protocol
LO2Explain networking products and features
Networking products:
Hubs
29
o S-HTTP: Secure Hypertext Move Protocol (S-HTTP)
o IMAP and IMAP4: Internet Message Entry Protocol
o IPDC: IP Gadget Control
o IRCP (IRC): Web Relay Chat Process
o LDAP: Light weighted Directory Access Process
o MIME (S-MIME): Multi-purpose Web Mail Extensions (Secure
o MIME)
o NAT: Network Address Interpretation
o NNTP: Network News Move Protocol
o NTP: Network Period Protocol
o POP & POP3: Post Office Process (version 3)
o RLOGIN: Remote Login within Unix
o RMON: Remote Overseeing MIBs in SNMP
o SLP: Service Region Protocol
o SMTP: Simple Mail Transfer Process
o SNMP: Simple Network Administration Protocol
o SNTP: Simple System Time Procedure
o TELNET: TCP/IP Terminal Emulation Protocol
o TFTP: Trivial File Transfer Process
o URL: Uniform Resource Locator
X-Window: X Window or even X Process or By System Screen Layer
o LPP: Lightweight Display Protocol
o Program Layer
o RPC: Remote Process Call process
o Transport Level
o ITOT: ISO Transport More than TCP/IP
o RDP: Reliable Information Protocol
o RUDP: Reliable UDP
o TALI: Transport Adapter Coating Interface
o TCP: Transmission Manage Protocol
o UDP: User Datagram Protocol
LO2Explain networking products and features
Networking products:
Hubs
29

Hubs are simple system gadgets, and their simplexes are reflected in
their affordable. Small hubs with 4 or 5 ports (often referred to as
workgroup hubs) cost less than 50 dollars; with the requisite cables,
these people offer everything needed to create a small network. Hubs
with additional ports are available for networks that need greater
capacity.
Switches
At first glance, a switch looks similar to a hub. Regardless of their own
similar appearance, switches are much more efficient than hubs and
are far more desirable regarding today’s network environments.
Bridges
Bridges are usually networking gadgets that link networks. Sometimes
it is necessary to separate networks into subnets to lessen the amount
of traffic on every larger subnet or regarding security reasons. Once
split, the bridge connects the 2 subnets and handles the particular
traffic flow amongst all of them. Today, network switches possess
replaced bridges.
Routers
Routers are an a growing number of common view in any network
environment, through the particular small home office that will uses
one to hyperlink for an Internet service provider (ISP) to the corporate
IT environment exactly where racks of routers manage data
communication with disparate remote sites. Routers create
internetworking possible, and in sea of this, they warrant
comprehensive attention.
Gateways
The term entrance is applied to any device, system, or software that
can perform translating information from format to another. The key
function of a gateway is that it changes the format of the information,
not the data itself.
CSUs/DSUs
A Channel Service Unit/Data Service Unit (CSU/DSU) provides a
translator between the LAN info format and the WAN information
format. Such the particular transformation is necessary because the
technologies utilized on WAN links are various from those used on
LANs.
Modems
30
their affordable. Small hubs with 4 or 5 ports (often referred to as
workgroup hubs) cost less than 50 dollars; with the requisite cables,
these people offer everything needed to create a small network. Hubs
with additional ports are available for networks that need greater
capacity.
Switches
At first glance, a switch looks similar to a hub. Regardless of their own
similar appearance, switches are much more efficient than hubs and
are far more desirable regarding today’s network environments.
Bridges
Bridges are usually networking gadgets that link networks. Sometimes
it is necessary to separate networks into subnets to lessen the amount
of traffic on every larger subnet or regarding security reasons. Once
split, the bridge connects the 2 subnets and handles the particular
traffic flow amongst all of them. Today, network switches possess
replaced bridges.
Routers
Routers are an a growing number of common view in any network
environment, through the particular small home office that will uses
one to hyperlink for an Internet service provider (ISP) to the corporate
IT environment exactly where racks of routers manage data
communication with disparate remote sites. Routers create
internetworking possible, and in sea of this, they warrant
comprehensive attention.
Gateways
The term entrance is applied to any device, system, or software that
can perform translating information from format to another. The key
function of a gateway is that it changes the format of the information,
not the data itself.
CSUs/DSUs
A Channel Service Unit/Data Service Unit (CSU/DSU) provides a
translator between the LAN info format and the WAN information
format. Such the particular transformation is necessary because the
technologies utilized on WAN links are various from those used on
LANs.
Modems
30

Modem is a contraction from the terms demodulator and modulator.
Modems execute a simple functionality: They translate digital
indicators from a computer into analog signals that can travel
throughout conventional phone lines. The particular modem modulates
the transmission at the sending end plus demodulates from the getting
end.
Network Interface Credit cards (NICs)
NICs-sometimes called system cards-are the mechanisms through
which computer systems connect to a system. NICs come in all shapes
and sizes, and they come in prices to match all budgets. Consider the
subsequent when buying a NIC.
ISDN
Terminal Adapters when the velocity provided by the particular modem
simply isn’t enough, you must look for alternatives. One of the faster
possibilities is a great ISDN hyperlink. ISDN is a digital conversation
technique that can be used over a standard phone line, although
particular needs must be met to have an ISDN line to be offered.
Wireless Access Point (WAP)
Wireless access points, known as either WAPs or even wife APs, are the
particular transmission device and receiver (transceiver) gadget used
for wireless LAN (WLAN) radio signals. A WAP is the separate system
device with a built-in antenna generally, transmitter, and adapter.
Transceivers
The phrase transceiver does not necessarily explain a separate
network device but instead an integrated technology embedded within
gadgets such as network credit cards. In a network environment, the
transceiver gets the title from being each the transmitter and the
particular recipient of signals, such as analog or electronic.
Firewalls
Nowadays, firewalls are an essential a part of a network’s design. The
firewall is a networking gadget, possibly hardware or software program
based, that controls entry to your organization’s network. This
particular controlled access is designed to secure data and resources
through outside risk. To do this, firewalls are typically placed in
entry/exit points of the particular system.
Networking software:
Computers need the particular vocabulary that they can speak in
common to each other. In the early days of pc networking software,
31
Modems execute a simple functionality: They translate digital
indicators from a computer into analog signals that can travel
throughout conventional phone lines. The particular modem modulates
the transmission at the sending end plus demodulates from the getting
end.
Network Interface Credit cards (NICs)
NICs-sometimes called system cards-are the mechanisms through
which computer systems connect to a system. NICs come in all shapes
and sizes, and they come in prices to match all budgets. Consider the
subsequent when buying a NIC.
ISDN
Terminal Adapters when the velocity provided by the particular modem
simply isn’t enough, you must look for alternatives. One of the faster
possibilities is a great ISDN hyperlink. ISDN is a digital conversation
technique that can be used over a standard phone line, although
particular needs must be met to have an ISDN line to be offered.
Wireless Access Point (WAP)
Wireless access points, known as either WAPs or even wife APs, are the
particular transmission device and receiver (transceiver) gadget used
for wireless LAN (WLAN) radio signals. A WAP is the separate system
device with a built-in antenna generally, transmitter, and adapter.
Transceivers
The phrase transceiver does not necessarily explain a separate
network device but instead an integrated technology embedded within
gadgets such as network credit cards. In a network environment, the
transceiver gets the title from being each the transmitter and the
particular recipient of signals, such as analog or electronic.
Firewalls
Nowadays, firewalls are an essential a part of a network’s design. The
firewall is a networking gadget, possibly hardware or software program
based, that controls entry to your organization’s network. This
particular controlled access is designed to secure data and resources
through outside risk. To do this, firewalls are typically placed in
entry/exit points of the particular system.
Networking software:
Computers need the particular vocabulary that they can speak in
common to each other. In the early days of pc networking software,
31
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

this was mainly computer network communications strategies.
Methods are network software program that will let computers "talk" to
each other. These types of programs rely upon networking protocols to
allow computer systems to connect in a typical way. The most common
type of process is TCP/IP.
Clients plus servers the most common networking partnership is the
client-server model. The particular model contains three elements: a
client, the particular server, plus a continuous service. A service is the
fact that task that the device can perform (such as providing files over
a network or maybe the ability to execute the particular command). A
server is the device that functions the task (the machine that offers the
service). A client is the machine which is asking for the service. These
types of titles are generally used in the particular context of the
specific service rather than in marking a machine: one machine’s client
may be one more machine’s machine.
Client/server plus P2P strategies are implemented because electronic
networks of nodes and logical links constructed on top of an existing
(aka underlay) network, usually the Internet These types of electronic
networks are called overlay networks The overlay is really a logical
view that might in a roundabout way mirror the physical system
topology
Clients have an energetic role and initiate the communication session
by delivering requests to servers Customers must have knowledge of
the accessible servers and the services these people offer Clients can
get in touch with servers only; they cannot notice each other Internet
servers have an unaggressive functionality and respond to their
particular clients by acting on every request and returning outcomes
One server generally facilitates numerous clients
Software program machine and Kinds of consumer services:
o mail machine
o document server
o terminal machine
o name server
o authentication machine
o entrance server
o administration machine
Characteristics of client-server structures
32
Methods are network software program that will let computers "talk" to
each other. These types of programs rely upon networking protocols to
allow computer systems to connect in a typical way. The most common
type of process is TCP/IP.
Clients plus servers the most common networking partnership is the
client-server model. The particular model contains three elements: a
client, the particular server, plus a continuous service. A service is the
fact that task that the device can perform (such as providing files over
a network or maybe the ability to execute the particular command). A
server is the device that functions the task (the machine that offers the
service). A client is the machine which is asking for the service. These
types of titles are generally used in the particular context of the
specific service rather than in marking a machine: one machine’s client
may be one more machine’s machine.
Client/server plus P2P strategies are implemented because electronic
networks of nodes and logical links constructed on top of an existing
(aka underlay) network, usually the Internet These types of electronic
networks are called overlay networks The overlay is really a logical
view that might in a roundabout way mirror the physical system
topology
Clients have an energetic role and initiate the communication session
by delivering requests to servers Customers must have knowledge of
the accessible servers and the services these people offer Clients can
get in touch with servers only; they cannot notice each other Internet
servers have an unaggressive functionality and respond to their
particular clients by acting on every request and returning outcomes
One server generally facilitates numerous clients
Software program machine and Kinds of consumer services:
o mail machine
o document server
o terminal machine
o name server
o authentication machine
o entrance server
o administration machine
Characteristics of client-server structures
32

o Server and Customer machines need different quantity of
hardware and software resources. Client and machine machines
may belong to various vendors.
o Horizontal scalability (increase of the client machines) and
o vertical scalability (migration to the particular more powerful
machine as well as to a multi server solution)
o A client or even machine application interacts straight using a
transport
o Layer protocol to determine conversation and to send or even
receive information.
o The particular transport protocol uses reduce layer protocols to
send or then receive person messages. Thus, a personal
computer needs a complete stack associated with protocols to
run either a customer or maybe a server.
Machine type:
Traditionally know machines are:
o FTP servers
o proxy devices,
o online game servers
o Internet servers.
Server option:
It has changed how small businesses operate machine, and with falling
costs plus improving efficiency, there has in no way been the better
time for you to start using a server inside your business - yet what type
should you choose?
With a true amount of server sorts to choose from, this can be a
daunting task knowing your choices and then producing the right
choice. Should you have an onsite machine? Will a cloud-based
machine offer the best support for your business? All of the idol brands
such as Dell, HORSEPOWER, IBM and Oracle possess machine
platforms aimed at the little business user. It's important to match up
the needs of your company towards the right machine type. Consider
these five questions:
o Have you been buying a server for peer to peer?
33
hardware and software resources. Client and machine machines
may belong to various vendors.
o Horizontal scalability (increase of the client machines) and
o vertical scalability (migration to the particular more powerful
machine as well as to a multi server solution)
o A client or even machine application interacts straight using a
transport
o Layer protocol to determine conversation and to send or even
receive information.
o The particular transport protocol uses reduce layer protocols to
send or then receive person messages. Thus, a personal
computer needs a complete stack associated with protocols to
run either a customer or maybe a server.
Machine type:
Traditionally know machines are:
o FTP servers
o proxy devices,
o online game servers
o Internet servers.
Server option:
It has changed how small businesses operate machine, and with falling
costs plus improving efficiency, there has in no way been the better
time for you to start using a server inside your business - yet what type
should you choose?
With a true amount of server sorts to choose from, this can be a
daunting task knowing your choices and then producing the right
choice. Should you have an onsite machine? Will a cloud-based
machine offer the best support for your business? All of the idol brands
such as Dell, HORSEPOWER, IBM and Oracle possess machine
platforms aimed at the little business user. It's important to match up
the needs of your company towards the right machine type. Consider
these five questions:
o Have you been buying a server for peer to peer?
33

o Will your server end up being predominantly used for email?
o Did your workforce need to distantly connect with the machine?
o Is your machine going to be used for information backup?
o How much space are you experiencing available to
accommodate the machine?
Workstation:
A workstation (WS) is a pc dedicated to a consumer or group of clients
engaged in business or maybe expert work. It contains a number of
high resolution displays and the particular faster processor than the
particular personal computer (PC). The particular workstation also has
increased multitasking capacity because of additional random entry
storage (RAM), drive plus drives capacity. A workstation may also have
a higher-speed graphics adapters and more linked peripherals.
LO3 Design efficient networked techniques
Band width:
Bandwidth is defined as a number within the particular band
associated with frequencies or maybe wavelengths. Band width is
furthermore defined as the quantity of data that can be transmitted
within the fixed amount of time. To get digital devices, the band width
is usually expressed in parts per second (bps) or bytes per second. For
analog devices, the bandwidth is definitely expressed in cycles for
each second, or even Hertz (Hz).
Clients:
A user account in Home windows is characterized by simply the next
attributes:
Customer name -- the true name you are offering to that account.
Account password: the password associated with the consumer
account (in Windows seven or even older versions you may also use
blank passwords).
Consumer group - particular variety of user accounts that reveal the
same security. A user account should be a known associate associated
with at least one user group.
.
Social networking services and programs:
VPN Site-to-site
Connects two LANs privately
34
o Did your workforce need to distantly connect with the machine?
o Is your machine going to be used for information backup?
o How much space are you experiencing available to
accommodate the machine?
Workstation:
A workstation (WS) is a pc dedicated to a consumer or group of clients
engaged in business or maybe expert work. It contains a number of
high resolution displays and the particular faster processor than the
particular personal computer (PC). The particular workstation also has
increased multitasking capacity because of additional random entry
storage (RAM), drive plus drives capacity. A workstation may also have
a higher-speed graphics adapters and more linked peripherals.
LO3 Design efficient networked techniques
Band width:
Bandwidth is defined as a number within the particular band
associated with frequencies or maybe wavelengths. Band width is
furthermore defined as the quantity of data that can be transmitted
within the fixed amount of time. To get digital devices, the band width
is usually expressed in parts per second (bps) or bytes per second. For
analog devices, the bandwidth is definitely expressed in cycles for
each second, or even Hertz (Hz).
Clients:
A user account in Home windows is characterized by simply the next
attributes:
Customer name -- the true name you are offering to that account.
Account password: the password associated with the consumer
account (in Windows seven or even older versions you may also use
blank passwords).
Consumer group - particular variety of user accounts that reveal the
same security. A user account should be a known associate associated
with at least one user group.
.
Social networking services and programs:
VPN Site-to-site
Connects two LANs privately
34
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

VPN host-to-site
Hyperlink a remote computer in order to private network
VPN host-to-host
Private connection between two computers
IPSec
IP level security that encrypts plus authenticates network
connection.
GRE
Generic router encapsulation
SSL VPN
User can connect to a remote network with no client, his web
browser simply.
PPTP
Similar to PPP yet it controlled a GRE tunnel to send information
safely to communicate with private system.
TACACS
AAA server regarding device admin (routers, switches), so this
allows instructions.
The entire packet is encrypted.
Documentation and anthem are usually handled. Separated
which permit, the moment anthem, authorizes a lot of.
RADIUS
AAA server intended for network access.
Only security password in encrypted
Combines consent and authentication, so you just do it once.
RAS
Remote access service windows system for using encryption
protons on VPNS
Web solutions
...
Unified voice services
Permit you to use multiple devices along with 1 number. One
specific
Network controllers
35
Hyperlink a remote computer in order to private network
VPN host-to-host
Private connection between two computers
IPSec
IP level security that encrypts plus authenticates network
connection.
GRE
Generic router encapsulation
SSL VPN
User can connect to a remote network with no client, his web
browser simply.
PPTP
Similar to PPP yet it controlled a GRE tunnel to send information
safely to communicate with private system.
TACACS
AAA server regarding device admin (routers, switches), so this
allows instructions.
The entire packet is encrypted.
Documentation and anthem are usually handled. Separated
which permit, the moment anthem, authorizes a lot of.
RADIUS
AAA server intended for network access.
Only security password in encrypted
Combines consent and authentication, so you just do it once.
RAS
Remote access service windows system for using encryption
protons on VPNS
Web solutions
...
Unified voice services
Permit you to use multiple devices along with 1 number. One
specific
Network controllers
35

Device with regard to implementing managing & environment
network devices
PPP (point to point connection)
Links 2 hosts remotes, THESE odes to AAA, yet not encryption.
L2TP
PPTP+cisco technology that authenticates 1) the user, and 2) the
pc being used. Authenticating the computer prevent man in the
middle attacks.
IPSec Authentication header (AH)
Component of IPSec that authenticates the particular information
being moved plus checks integrity
IPSec Encapsulation basic safety payload
Encrypts the particular IPSec data transmission
Marketing communications:
Details Communication is the swap of data (in the shape of Os and 1s)
between two products through some form of transmission medium
(such as a wire cable). Details Communication is considered
o Local -- if the communicating device same building.
o Remote -- if the device is further apart.
The effectiveness of the data conversation system depends upon three
characteristics.
1. Shipping: The system must deliver information to the correct
location.
2. Accuracy: The program should deliver data precisely.
3. Timeliness: The program should deliver data in a timely
manner.
Conversation
1. Message - the particular message is the details to become
communicated.
2. Sender -- the sender is the gadget that sends the data
information.
3. Receiver - the particular receiver is the device that will receive
the message.
4. Moderate - the transmission moderate is the physical path
through which a message travels from TV-sender to receiver.
36
network devices
PPP (point to point connection)
Links 2 hosts remotes, THESE odes to AAA, yet not encryption.
L2TP
PPTP+cisco technology that authenticates 1) the user, and 2) the
pc being used. Authenticating the computer prevent man in the
middle attacks.
IPSec Authentication header (AH)
Component of IPSec that authenticates the particular information
being moved plus checks integrity
IPSec Encapsulation basic safety payload
Encrypts the particular IPSec data transmission
Marketing communications:
Details Communication is the swap of data (in the shape of Os and 1s)
between two products through some form of transmission medium
(such as a wire cable). Details Communication is considered
o Local -- if the communicating device same building.
o Remote -- if the device is further apart.
The effectiveness of the data conversation system depends upon three
characteristics.
1. Shipping: The system must deliver information to the correct
location.
2. Accuracy: The program should deliver data precisely.
3. Timeliness: The program should deliver data in a timely
manner.
Conversation
1. Message - the particular message is the details to become
communicated.
2. Sender -- the sender is the gadget that sends the data
information.
3. Receiver - the particular receiver is the device that will receive
the message.
4. Moderate - the transmission moderate is the physical path
through which a message travels from TV-sender to receiver.
36

Scalable:
The current data centers may include tens of thousands of computers
with significant aggregate bandwidth requirements. The particular
network architecture typically is made up of a tree of course-plotting
and switching elements along with progressively more specialized plus
expensive equipment moving up the particular network construction.
Unfortunately, whenever deploying the highest-end IP switches/routers
even, resulting topologies may only support 50 percent of the
aggregate bandwidth obtainable on the edge of the system, while still
incurring incredible cost. Non-uniform band width amongst data center
nodes complicates application design and limitations overall system
features.
Collection of components:
Tools Requirements
From your data source system aside, there may be up to four types of
equipment required for use of the Enterprise program:
o Web Machine
o ob Machine
o Business Objects Server (optional)
o Management Tools Workstation/Server
Most constructions will require four separate real machines for
production treatment: a single dedicated Web Machine, a single
dedicated Job Machine, a single dedicated Business Objects Machine,
and a single databases machine.
o Client
o DSL/ISDN/Cable Web Link
o Monitor that can support an answer of 1024 x 768
o 2GB RAM
Web Machine
o Intel® Xeon® processor (Dual 2 . 93 GHz)
o four GIGABITE or more of RAM MEMORY
o 40 GB system generate + 20GB drive
Work Server
o Intel Xeon processor chip (Dual 2 . 93 GHz)
o 8 GB or more associated with RAM
o 40 GIGABITE program drive + 20GB generate
37
The current data centers may include tens of thousands of computers
with significant aggregate bandwidth requirements. The particular
network architecture typically is made up of a tree of course-plotting
and switching elements along with progressively more specialized plus
expensive equipment moving up the particular network construction.
Unfortunately, whenever deploying the highest-end IP switches/routers
even, resulting topologies may only support 50 percent of the
aggregate bandwidth obtainable on the edge of the system, while still
incurring incredible cost. Non-uniform band width amongst data center
nodes complicates application design and limitations overall system
features.
Collection of components:
Tools Requirements
From your data source system aside, there may be up to four types of
equipment required for use of the Enterprise program:
o Web Machine
o ob Machine
o Business Objects Server (optional)
o Management Tools Workstation/Server
Most constructions will require four separate real machines for
production treatment: a single dedicated Web Machine, a single
dedicated Job Machine, a single dedicated Business Objects Machine,
and a single databases machine.
o Client
o DSL/ISDN/Cable Web Link
o Monitor that can support an answer of 1024 x 768
o 2GB RAM
Web Machine
o Intel® Xeon® processor (Dual 2 . 93 GHz)
o four GIGABITE or more of RAM MEMORY
o 40 GB system generate + 20GB drive
Work Server
o Intel Xeon processor chip (Dual 2 . 93 GHz)
o 8 GB or more associated with RAM
o 40 GIGABITE program drive + 20GB generate
37
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Diagnose and implement network systems
Devices:
Choose the particular Network Adapter for Conversation By default, the
primary adapter utilized by simply Windows is the system adapter
used for conversation along with devices on the network.
To choose the particular different adapter:
1. From the Tools menu, choose Options. The Options home
windows starts, displaying the list of offered adapters.
2. Select the adapter by simply clicking its checkbox, and click
Apply. M3 or more. To exit, click OKAY.
Add the particular Device towards the List
As an alternative to using the Research tool to add devices towards the
device list, add person devices manually to the checklist.
To add a device to the checklist manually:
1. From the Gadget menu, select Add Gadget. The Add Device screen
displays.
2. Enter the IP address for the click plus device OK. Device Installer
looks for the device.
Upon connection to the particular device, Device Installer adds this to
the device list. The message displays if Device Installer does not find
the device.
Verify Device Diagnostics
To determine regardless of whether the device is on the web and the
network is practical, use the Device Installer Ping choice. This option
guarantees the device can be operating and determines the velocity of
a response from the gadget. To ping a device:
o Select the device.
o In the Tools menu, select Ping. The Ping Device screen displays.
o In the IP Address box, enter the IP address of the device.
o Click Ping. After different moments, the Status area displays the
ping outcomes.
o To ping an extra device, select Clear Standing to clear the
Standing region before entering an extra IP address.
o To quit, click Close.
38
Devices:
Choose the particular Network Adapter for Conversation By default, the
primary adapter utilized by simply Windows is the system adapter
used for conversation along with devices on the network.
To choose the particular different adapter:
1. From the Tools menu, choose Options. The Options home
windows starts, displaying the list of offered adapters.
2. Select the adapter by simply clicking its checkbox, and click
Apply. M3 or more. To exit, click OKAY.
Add the particular Device towards the List
As an alternative to using the Research tool to add devices towards the
device list, add person devices manually to the checklist.
To add a device to the checklist manually:
1. From the Gadget menu, select Add Gadget. The Add Device screen
displays.
2. Enter the IP address for the click plus device OK. Device Installer
looks for the device.
Upon connection to the particular device, Device Installer adds this to
the device list. The message displays if Device Installer does not find
the device.
Verify Device Diagnostics
To determine regardless of whether the device is on the web and the
network is practical, use the Device Installer Ping choice. This option
guarantees the device can be operating and determines the velocity of
a response from the gadget. To ping a device:
o Select the device.
o In the Tools menu, select Ping. The Ping Device screen displays.
o In the IP Address box, enter the IP address of the device.
o Click Ping. After different moments, the Status area displays the
ping outcomes.
o To ping an extra device, select Clear Standing to clear the
Standing region before entering an extra IP address.
o To quit, click Close.
38

Verification associated with configuration and connection:
Gain access to the Web User interface
To access the internet interface to configure the device that has the
web site:
1. From the list of gadgets, select the device you want to set up.
2. Click the Web Design tab. The Web Configurations web page
displays. The device's IP address is with the very best.
3. You have two choices:
o To use the Device Installer browser, click the Go key. The
device's home page shows.
o To use a good exterior browser (Internet Explorer), click on
the Use External Browser.
o The particular device's home page displays within Internet
Explorer.
Entry Telnet to Telnet towards the device's configuration menu:
o From the list of devices, pick the device you want to set up.
o Click the Telnet Configuration tabs. The Telnet configuration
display displays.
o Verify the IP Telnet and tackle port display at the top.
o Click the Hyperlink button. The particular Telnet consumer
interface shows.
o Inside 15 seconds, get into your user ID plus security
password for the device plus press Enter.
o Talk to the device's User Manual for configuration instructions.
TCP/IP Overview
This guide is designed to provide the user along with enough
information to resolve the nagging problem being knowledgeable
about Device Installer. For more detailed home elevators the TCP/IP
protocol, make sure you go to www.google.com and look for RFC791,
RFC950, or perhaps TCP/IP.
Subnets
If Device Installer documented a subnet issue with your own PERSONAL
COMPUTER, it is because the PC’s IP address and the IP address you
39
Gain access to the Web User interface
To access the internet interface to configure the device that has the
web site:
1. From the list of gadgets, select the device you want to set up.
2. Click the Web Design tab. The Web Configurations web page
displays. The device's IP address is with the very best.
3. You have two choices:
o To use the Device Installer browser, click the Go key. The
device's home page shows.
o To use a good exterior browser (Internet Explorer), click on
the Use External Browser.
o The particular device's home page displays within Internet
Explorer.
Entry Telnet to Telnet towards the device's configuration menu:
o From the list of devices, pick the device you want to set up.
o Click the Telnet Configuration tabs. The Telnet configuration
display displays.
o Verify the IP Telnet and tackle port display at the top.
o Click the Hyperlink button. The particular Telnet consumer
interface shows.
o Inside 15 seconds, get into your user ID plus security
password for the device plus press Enter.
o Talk to the device's User Manual for configuration instructions.
TCP/IP Overview
This guide is designed to provide the user along with enough
information to resolve the nagging problem being knowledgeable
about Device Installer. For more detailed home elevators the TCP/IP
protocol, make sure you go to www.google.com and look for RFC791,
RFC950, or perhaps TCP/IP.
Subnets
If Device Installer documented a subnet issue with your own PERSONAL
COMPUTER, it is because the PC’s IP address and the IP address you
39

are trying to specify to your Lent remix device are upon different
subnets. The IP addresses of the device as well as the PC running
Device Installer should be on the same Local Area Subnet plus
network.
For Device Installer in order to assign an IP tackle to your Lantronix
device effectively:
o Your PC’s IP address and the address you need to assign to
your Lantronix gadget must be on the same subnet.
o No gateways or even routers can exist between PC and your
Lantronix gadget.
Secure Shell offers three main skills, which usually open the hinged
doorway for many innovative secure options.
Secure command-shell
Port forwarding
Secure Order Shell
Command shells for example those available in Linux, Unix, Windows,
or the familiar 2 prompt provide the ability to perform programs and
other commands, along with usually character output. The particular
secure command-shell or remote control logon allows you to edit
documents, view the contents associated with directories and access
customized database applications. Systems plus network
administrators can start set jobs remotely, start, watch or perhaps stop
services plus processes, create user balances, change permissions to
web directories and files and more. Something that
Can be accomplished at a machine’s command prompt can now be
carried out securely from the road or even home.
Program monitoring:
System analysis is the process of recording network traffic and looking
at it closely to determine what is happening on the network. Two
Overseeing Techniques are discussed in the subsequent sections:
Router Based plus Non-Router Based. Monitoring benefits that are
built-into the routers themselves and do not require extra installation
of hardware as well as software program are referred to as Router
Centered methods. Non-Router based strategies require additional
hardware plus software program to be installed and supply greater
flexibility. Each method are further talked about in this posting
RMON [RMON] utilizes 9 different monitoring organizations to obtain
information about the system.
40
subnets. The IP addresses of the device as well as the PC running
Device Installer should be on the same Local Area Subnet plus
network.
For Device Installer in order to assign an IP tackle to your Lantronix
device effectively:
o Your PC’s IP address and the address you need to assign to
your Lantronix gadget must be on the same subnet.
o No gateways or even routers can exist between PC and your
Lantronix gadget.
Secure Shell offers three main skills, which usually open the hinged
doorway for many innovative secure options.
Secure command-shell
Port forwarding
Secure Order Shell
Command shells for example those available in Linux, Unix, Windows,
or the familiar 2 prompt provide the ability to perform programs and
other commands, along with usually character output. The particular
secure command-shell or remote control logon allows you to edit
documents, view the contents associated with directories and access
customized database applications. Systems plus network
administrators can start set jobs remotely, start, watch or perhaps stop
services plus processes, create user balances, change permissions to
web directories and files and more. Something that
Can be accomplished at a machine’s command prompt can now be
carried out securely from the road or even home.
Program monitoring:
System analysis is the process of recording network traffic and looking
at it closely to determine what is happening on the network. Two
Overseeing Techniques are discussed in the subsequent sections:
Router Based plus Non-Router Based. Monitoring benefits that are
built-into the routers themselves and do not require extra installation
of hardware as well as software program are referred to as Router
Centered methods. Non-Router based strategies require additional
hardware plus software program to be installed and supply greater
flexibility. Each method are further talked about in this posting
RMON [RMON] utilizes 9 different monitoring organizations to obtain
information about the system.
40
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

o Statistics - stats tested by the probe for each supervised
interface on this device
o Background - records normal record samples from the particular
shop and network for collection
o Alarm - frequently requires statistic samples and analyzes them
with the particular set of thresholds for event generation
o Web host - contains statistics related to each host discovered
within the network
o Huston - works on tables that describe best hosts
o Filters - allow packets to be matched with a filter equation for
recording actions
o Packet capture -- captures packets after they circulation through
the channel
Servicing routine:
Information Security Treatments are the particular cornerstone of
information security efficiency. The Security Policy is intended in order
to define what is expected through a company with respect to safety of
Information Systems. The overall goal is to control or guideline human
behavior in an attempt to slow up the risk to information property by
simply accidental or planned actions.
Backup
Backup ought to be maintained regularly on the room provided on
central machine of the area or within the space for storage media as
per area policy.
Keep paper duplicate of server configuration document.
Keep the DATs as well as additional removable media in a protected
location away from the computer.
Back-up the data before leaving the particular workstation always.
For essential and sensitive details offsite backup should be used.
Diagnose plus resolve layer 1 troubles:
The show running-config command word would be the best way to
confirm your construction, and show startup-config would be the best
way to confirm the settings that’ll be applied the next time the router
is definitely reloaded. Once you take a look from the running-config, if
almost all appears well, you can confirm your configuration with
41
interface on this device
o Background - records normal record samples from the particular
shop and network for collection
o Alarm - frequently requires statistic samples and analyzes them
with the particular set of thresholds for event generation
o Web host - contains statistics related to each host discovered
within the network
o Huston - works on tables that describe best hosts
o Filters - allow packets to be matched with a filter equation for
recording actions
o Packet capture -- captures packets after they circulation through
the channel
Servicing routine:
Information Security Treatments are the particular cornerstone of
information security efficiency. The Security Policy is intended in order
to define what is expected through a company with respect to safety of
Information Systems. The overall goal is to control or guideline human
behavior in an attempt to slow up the risk to information property by
simply accidental or planned actions.
Backup
Backup ought to be maintained regularly on the room provided on
central machine of the area or within the space for storage media as
per area policy.
Keep paper duplicate of server configuration document.
Keep the DATs as well as additional removable media in a protected
location away from the computer.
Back-up the data before leaving the particular workstation always.
For essential and sensitive details offsite backup should be used.
Diagnose plus resolve layer 1 troubles:
The show running-config command word would be the best way to
confirm your construction, and show startup-config would be the best
way to confirm the settings that’ll be applied the next time the router
is definitely reloaded. Once you take a look from the running-config, if
almost all appears well, you can confirm your configuration with
41

resources like Telnet and Ping. Ping is the particular planned program
that uses ICMP echo requests and response. Ping sends the box to a
remote host, and when that host responds, you understand that it’s
alive. Simply because you can ping a Microsoft company server does
not mean you can sign in! Ping is an awesome kick off point for
troubleshooting an internetwork.
You can ping with different methods? Test this by inputting ping? In
either the particular router user-mode or privileged-mode prompt:
o Todd ping?
o WORD Ping destination hostname or tackle
o clans CLNS echo
o imp IP echo
o ipv6 echo
o tag exemplified IP echo
Plan evaluation:
o Policies for General Customers
o Using Floppies/ CD/ Adobe flash Drives
o Floppy should be utilized in appointment with system
administrator/in charge pc center and should end up being
scanned before use.
o Informal Floppies Flash or compact disks Drives should not be
used on workplace techniques.
o Floppy should be write-protected if data is to be moved from
floppy to program.
Password
o Keep the operational program screen saver enabled along with
security password protection.
o Donít talk about or even disclose your security password.
o Customer should not have effortlessly detectable passwords for
System access, screen saver and so forth
A strong password must be provided that possible, include mixed-case
words, include digits and punctuation marks, not be based on any kind
of personal details, not be depending on any dictionary word, in a
language.
42
that uses ICMP echo requests and response. Ping sends the box to a
remote host, and when that host responds, you understand that it’s
alive. Simply because you can ping a Microsoft company server does
not mean you can sign in! Ping is an awesome kick off point for
troubleshooting an internetwork.
You can ping with different methods? Test this by inputting ping? In
either the particular router user-mode or privileged-mode prompt:
o Todd ping?
o WORD Ping destination hostname or tackle
o clans CLNS echo
o imp IP echo
o ipv6 echo
o tag exemplified IP echo
Plan evaluation:
o Policies for General Customers
o Using Floppies/ CD/ Adobe flash Drives
o Floppy should be utilized in appointment with system
administrator/in charge pc center and should end up being
scanned before use.
o Informal Floppies Flash or compact disks Drives should not be
used on workplace techniques.
o Floppy should be write-protected if data is to be moved from
floppy to program.
Password
o Keep the operational program screen saver enabled along with
security password protection.
o Donít talk about or even disclose your security password.
o Customer should not have effortlessly detectable passwords for
System access, screen saver and so forth
A strong password must be provided that possible, include mixed-case
words, include digits and punctuation marks, not be based on any kind
of personal details, not be depending on any dictionary word, in a
language.
42

o Never use the exact same password twice.
o Change security password at regular intervals.
Conclusion
Networking personal computers first and tracking the particular
connections later can quickly become confusing and uncontrollable as
you try to find which personal computer convey with and gives property
with which other personal computers. In your human network, would you
share everything with your buddies? In your family network, can you
want your parents or even guardians to know your each thought? You
have your information-sharing plan in your head, and it is crucial to keep
track of this so you do not make a mistake and share something exactly
where it was not intended. Comparable concerns must be considered
whilst designing a computer network. Before you decide to even
together connect your best computer systems, you should have the
particular program. A network plan, consequently, is an officially created
item that shows all the network’s components and the planned internet
connections between them. Such the program is used to manage the
various varieties of information also. Your strategy should show what
types of info are stored where, plus who also else is allowed to use each
kind.
43
o Change security password at regular intervals.
Conclusion
Networking personal computers first and tracking the particular
connections later can quickly become confusing and uncontrollable as
you try to find which personal computer convey with and gives property
with which other personal computers. In your human network, would you
share everything with your buddies? In your family network, can you
want your parents or even guardians to know your each thought? You
have your information-sharing plan in your head, and it is crucial to keep
track of this so you do not make a mistake and share something exactly
where it was not intended. Comparable concerns must be considered
whilst designing a computer network. Before you decide to even
together connect your best computer systems, you should have the
particular program. A network plan, consequently, is an officially created
item that shows all the network’s components and the planned internet
connections between them. Such the program is used to manage the
various varieties of information also. Your strategy should show what
types of info are stored where, plus who also else is allowed to use each
kind.
43
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2.1. Some Relevant Terms
MDF Main Distribution Frame
IDF Intermediate Distribution Frame
Broadband Refers to a higher speed always on internet connection
Narrowband Refers to speeds of up to 128kbps
Dial up Refers to having to dial up the internet every time
one goes online.
Always On Refers to the nature of broadband, being ‘always on’
means a dial up is not required.
Download speed the speed at which data is delivered to a school
modem from the internet
Upload speed the speed at which data is sent to the internet from a
school modem.
ISP Internet Service Provider
ISDN Integrated Services Digital Network (64kbps single channel
or 128kbps dual channel)
PSTN Public Switched Telephone Network (refers to an ordinary
telephone line)
ADSL Asymmetric Digital Subscriber Loop
Mbps Megabits per second (1,000,000 bits per second)
Kbps Kilobits per second (1,000 bits per second)
Ethernet Ethernet is a standard for transferring data over
networks.
USB Universal Serial Bus
Modem A simple device used to access the internet
Router A more technically advanced device used to access
the internet
Reference
[1] Myers, J. and Rose, M., Post Office Protocol - Version 3, RFC 1939,
May 1996
44
MDF Main Distribution Frame
IDF Intermediate Distribution Frame
Broadband Refers to a higher speed always on internet connection
Narrowband Refers to speeds of up to 128kbps
Dial up Refers to having to dial up the internet every time
one goes online.
Always On Refers to the nature of broadband, being ‘always on’
means a dial up is not required.
Download speed the speed at which data is delivered to a school
modem from the internet
Upload speed the speed at which data is sent to the internet from a
school modem.
ISP Internet Service Provider
ISDN Integrated Services Digital Network (64kbps single channel
or 128kbps dual channel)
PSTN Public Switched Telephone Network (refers to an ordinary
telephone line)
ADSL Asymmetric Digital Subscriber Loop
Mbps Megabits per second (1,000,000 bits per second)
Kbps Kilobits per second (1,000 bits per second)
Ethernet Ethernet is a standard for transferring data over
networks.
USB Universal Serial Bus
Modem A simple device used to access the internet
Router A more technically advanced device used to access
the internet
Reference
[1] Myers, J. and Rose, M., Post Office Protocol - Version 3, RFC 1939,
May 1996
44

[2] Berners-Lee, T., Fielding, R. and Frystyk, H., Hypertext Transfer
Protocol – HTTP/1.0, RFC 1945, May 1996
[3] Bellovin, S., Defending Against Sequence Number Attacks, RFC
1948, May 1996
[4] Deutsch, P., DEFLATE Compressed Data Format Specification
version 1.3, RFC 1951, May 1996
[5] McCann, J., Deering, S. and Mogul, J., Path MTU Discovery for IP
version 6, RFC 1981, Aug. 1996
[6] Perkins, C., IP Encapsulation within IP, RFC 2003, Oct. 1996
[7] Mathis, M., Mahdavi, J., Floyd, S. and Romanow, A., TCP Selective
Acknowledgment Options, RFC 2018, Oct. 1996
[8] Freed, N. and Borenstein, N., Multipurpose Internet Mail Extensions
(MIME) Part One: Format of Internet Message Bodies, RFC 2045, Nov.
1996
[9] Freed, N. and Borenstein, N., Multipurpose Internet Mail Extensions
(MIME) Part Two: Media Types, RFC 2046, Nov. 1996
[10] Hubbard, K. and Kosters, M. and Conrad, D. and Karrenberg, D.
and Postel, J., Internet Registry IP Allocation Guidelines, RFC 2050, Nov.
1996
[11] Malkin, G. and Minnear, R., RIPng for IPv6, RFC 2080, Jan. 1997
[12] Baker, F. and Atkinson, R., RIP-2 MD5 Authentication, RFC 2082,
Jan. 1997
[13] Droms, R., Dynamic Host Configuration Protocol, RFC 2131, March
1997
[14] Touch, J., TCP Control Block Interdependence, RFC 2140, April
1997
[15] Laubach, M., Halpern, J., Classical IP and ARP over ATM, RFC 2225,
April 1998
[16] Moy, J., OSPF Version 2, RFC 2328, April 1998
[17] Luciani, J. and Katz, D. and Piscitello, D. and Cole, B. and
Doraswamy, N., NBMA Next Hop Resolution Protocol (NHRP), RFC 2332,
April 1998
[18] Gross, G. and Kaycee, M. and Li, A. and Malis, A. and Stephens, J.,
PPP Over AAL5, RFC 2364, July 1998
[19] Hoffman, P. and Masinter, L. and Zawinski, J., The mailto URL
scheme, RFC 2368, July 1998
[20] Malkin, G., RIP Version 2, RFC 2453, Nov. 1998
[21] Deering S., Hinden, R., Internet Protocol, Version 6 (IPv6)
Specification, RFC 2460, Dec. 1998
45
Protocol – HTTP/1.0, RFC 1945, May 1996
[3] Bellovin, S., Defending Against Sequence Number Attacks, RFC
1948, May 1996
[4] Deutsch, P., DEFLATE Compressed Data Format Specification
version 1.3, RFC 1951, May 1996
[5] McCann, J., Deering, S. and Mogul, J., Path MTU Discovery for IP
version 6, RFC 1981, Aug. 1996
[6] Perkins, C., IP Encapsulation within IP, RFC 2003, Oct. 1996
[7] Mathis, M., Mahdavi, J., Floyd, S. and Romanow, A., TCP Selective
Acknowledgment Options, RFC 2018, Oct. 1996
[8] Freed, N. and Borenstein, N., Multipurpose Internet Mail Extensions
(MIME) Part One: Format of Internet Message Bodies, RFC 2045, Nov.
1996
[9] Freed, N. and Borenstein, N., Multipurpose Internet Mail Extensions
(MIME) Part Two: Media Types, RFC 2046, Nov. 1996
[10] Hubbard, K. and Kosters, M. and Conrad, D. and Karrenberg, D.
and Postel, J., Internet Registry IP Allocation Guidelines, RFC 2050, Nov.
1996
[11] Malkin, G. and Minnear, R., RIPng for IPv6, RFC 2080, Jan. 1997
[12] Baker, F. and Atkinson, R., RIP-2 MD5 Authentication, RFC 2082,
Jan. 1997
[13] Droms, R., Dynamic Host Configuration Protocol, RFC 2131, March
1997
[14] Touch, J., TCP Control Block Interdependence, RFC 2140, April
1997
[15] Laubach, M., Halpern, J., Classical IP and ARP over ATM, RFC 2225,
April 1998
[16] Moy, J., OSPF Version 2, RFC 2328, April 1998
[17] Luciani, J. and Katz, D. and Piscitello, D. and Cole, B. and
Doraswamy, N., NBMA Next Hop Resolution Protocol (NHRP), RFC 2332,
April 1998
[18] Gross, G. and Kaycee, M. and Li, A. and Malis, A. and Stephens, J.,
PPP Over AAL5, RFC 2364, July 1998
[19] Hoffman, P. and Masinter, L. and Zawinski, J., The mailto URL
scheme, RFC 2368, July 1998
[20] Malkin, G., RIP Version 2, RFC 2453, Nov. 1998
[21] Deering S., Hinden, R., Internet Protocol, Version 6 (IPv6)
Specification, RFC 2460, Dec. 1998
45
1 out of 45
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.