Essay, Pages 12 (2806 words)
With a web there are a batch of computing machines connected with each other. The web aggregation allow the computing machines to portion informations, transportation informations and portion resources and information
Based on their measure webs can be classified as Local Area Network ( LAN ) , Wide Area Network ( WAN )
In this study I am traveling to look at different types of web engineerings and take a suited web engineering for my client ( MRB technology carbon monoxide ) I am traveling to speak about the advantages and disadvantages of different types of web engineering and the chosen web engineering for my client ( MRB technology carbon monoxide ) .
Local Area Network
A local country web is a computing machine web which is covering a little country of computing machines like place, offices and such as schools and besides airports uses a local country web.
A local country web is a web which is used by the schools because where of all time you are in the school edifice you could entree your information from any computing machine with a web connexion.
A local country web is besides used for linking pressmans and scanners to computing machines. If there was no web used for the computing machines a pressman would be required for all the single computing machines and which does be a batch of money so a web connexion merely requires one pressman and scanner which is linked with all the computing machines in a edifice and allows persons to publish or scan
Wide Area Network
A broad country web is a web which covers a broad country for illustration around the universes which allows person to entree informations from any where in the universe.
The cyberspace is a Wide country web which allows people from around the universe to entree any information where of all time they are.
A broad country web is a web used to link local country web together so that all the computing machines could pass on with each other telephone companies frequently use a broad country web to pass on with one state to another state one metropolis to another metropolis.
Computer webs may be classified harmonizing to the functional relationships which exist among the elements of the web, e.g. Client-server and Peer-to-peer.
A client waiter is a web which allows persons to entree information signifier a waiter. A waiter is used to hive away all the information and information of people for illustration a waiter is used in schools which allows pupils and instructors to entree they information from any computing machine because the information is stored on to the waiter.
All the information is stored on the waiters, which is safe and secured
Merely the peculiar individual can entree the informations and no other individual can entree the information without the permission of the decision maker.
If a computing machine is damaged the saved informations wont get lost of damaged because all of your work will be stored on the waiter.
If you wonted to put in an package on to the web you merely would hold to put in it on to the waiter one time which would be accessible from any computing machine within the administration.
If you wanted to back-up any work you would n’t hold to travel to the single computing machines to back-up the day of the month you merely would hold to endorse up the waiter because it contains all the work.
If the waiter is down or non working you wo n’t be able to entree any of your work which may blow your clip.
If the waiter is down you might non be able to log in to the computing machine systems.
If the waiter is used a batch it will get down to run slower than normal which may be clip blowing until it starts to work as normal.
A Peer-to-peer networking eliminates the demand for cardinal waiters leting all computing machines to pass on and portion resources as equal such as sharing Music file, instant messaging and other popular web applications.
This type of networking has been popular with smaller concerns and place users for several old ages.
A Peer-to-peer networking is a manner to link several computing machines so that they can pass on with each other without utilizing a chief waiter.
The cost of a peer-to-peer web costs less and is a perfect simpleness
Experts used to urge peer-to-peer if you had 10 computing machines or less. That standard is non as meaningful today since newer engineering has expanded the figure of computing machines that can be connected utilizing this constellation.
The system is non centralised doing hard for disposal
With the web there is Lack of security and no computing machine in the web are dependable.
Wireless is a web which is designed to link wirelessly with a web devise for illustration a radio web is used in an airdrome which allows the workers to entree basic informations from their PDA. This web allows different types of hardware to link without a usage of a wire.
No wires required to link to the internet/network
Connection could be slow
Hackers could chop in to your files utilizing the radio connexion, security required.
After looking at all the web types I am traveling to take a client waiter web because this web requires a waiter and it will let the staff at ( MRB technology carbon monoxide ) to portion resources and informations. Besides this type of web will hive away all the informations on a waiter which will be safe. By utilizing this web there is an advantage if one of the computing machines is damaged it will non impact any other computing machine which is of import for my client ( MRB technology carbon monoxide ) . If you wanted to back-up any work you would n’t hold to travel to the single computing machines to back-up the information you merely would hold to endorse up the waiter because it contains all the work.
There are some dis advantages about this web which I have to consider-in-mind. The chief disadvantage is if the waiter is down or non working you wo n’t be able to entree any of your work which may blow your clip. To get the better of this job I would urge my client a backup waiter which will besides endorse up all the informations on the waiter and besides work as a backup waiter if the chief waiter is down or non working.
I am now traveling to speak about the tropology ‘s used in a web and I will besides take a suited tropology for my client.
The type of web topology in which each of the nodes of the web is connected to two other nodes in the web and with the first and last nodes being connected to each other, organizing a pealing – all informations that is transmitted between nodes in the web travels from one node to the following node in a round mode and the informations by and large flows in a individual way merely.
A web is connected to two other nodes in the web
All the files and informations is transmitted between nodes in the web
The web travels from one node to another in order
Expansion of the system has a little impact on public presentation
All the Stationss give a equal entree for users
If one computing machine is broken down all the other computing machines wo n’t work
A coach topology is a web signal which travels from one terminal of the web to the other like a coach.
Signals are broadcasted to all work Stationss
Merely one computing machine can link to the web at a clip
Easy to implement and widen
If one computing machine is broken it wo n’t impact the other computing machines
Data flows back and Forth
Difficult to control/ troubleshoot
Service charge may be high in the long term
A mesh web is a local country web ( LAN ) that employs one of two connexion agreements, full mesh topology or partial mesh topology. In the full mesh topology, each node ( workstation or other device ) is connected straight to each of the others. In the partial mesh topology, some nodes are connected to all the others, but some of the nodes are connected merely to those other nodes with which they exchange the most informations.
A star web is a local country web ( LAN ) in which all nodes are straight connected to a common cardinal computing machine. Every workstation is indirectly connected to every other through the cardinal computing machine. In some star webs, the cardinal computing machine can besides run as a workstation.
If one computing machine brakes down or has a mistake it wo n’t impact any other computing machine in the administration.
You could back-up all of the information from the waiter.
If the waiter is non working the full computing machines linked to the web will halt working.
If the waiter has no infinite left to salvage any work you would hold to purchase another one which does be a batch of money
All the computing machines are connected to a hub
All the informations must go through the hub
Data travels back and Forth
After looking at the topologies I am traveling to take a star web tropology for my client this web topologies will be suited for my client because this web is a like a star which all the computing machines are connected to a waiter. If one of the computing machines is amendss it will non impact any other computing machines besides all the staff at the company will be able to portion informations between them.
Hardware required for the web
For the web you require some hardware ‘s which will let the web to work decently.
There are some physical constituents which the web will necessitate to work right
These are the security measures that would be carried to guarantee that the web would be secure.
Looking at my clients demands I think they need to hold a good security tool to forestall any unauthorized individual to entree the web. They will necessitate security to forestall hackers to entree the web system. Besides for the web the company would necessitate a backup waiter to backup all files which are stored on the chief waiter this will be good if the chief waiter is damaged or corrupted I would urge my client to back-up all the files on the chief waiter every hebdomad this will forestall informations loss. Each staff working at the company will necessitate a user name and a watchword which will let them to entree the web. Besides on the web I would hold a firewall system set up which will protect the web for any unauthorized information to entree the web. The firewall will besides forestall any harmful informations to come in the system.
Make sure that all the equipment, constituents and devices are right connected
Not leting users to install/uninstall plans and application on the computing machine and web
Install Virtual hard thrust to the web for all users
Attach Security Devices to the computing machines systems. If person did seek to steal the equipment they can non. You can utilize computing machine coops
No other devices can be used and installed on the web without the web director being informed such as pen thrusts, cadmium, and floppy
Users have at that place ain log in and watchword. The user be able to entree at that place ain informations. Network decision maker can reset the watchword if the user has forgotten
Make sure that the anti virus is ever enabled and ne’er disabled. Most significantly updated whenever there is an update available
Set entree and privileges degrees depending on the user.
Cable and constituents
Cat 5 RJ45 web cable- this overseas telegram is require associating up all the web points which will let the user to entree information from the waiter. The RJ46 overseas telegrams will be installed all around the edifice where of all time there is a web point.
Network point ‘s outlet- these hardware ‘s are the mercantile establishment points which will let the user to link the spot overseas telegram which will be connected to the computing machines and the pressmans. These mercantile establishments will be placed all around the edifice wherever there is a computing machine or a pressman all together the edifice will necessitate 10 web points for the computing machines and pressmans. Each web point will link two devices for illustration a computing machine and a pressman.
Patch cables- spot overseas telegrams are overseas telegrams which are used to link the computing machines and pressmans to the web point mercantile establishment. The sum of the spot overseas telegrams require depends on the sum of computing machines and pressmans required in the company.
The spot overseas telegrams need to be compatible with the RJ45 overseas telegram the connection ‘s demand to be compatible with the RJ45 overseas telegram.
Network interface card- A web interface card is hardware which is required in all of the computing machines in SIC this hardware constituent is used to link the spot overseas telegram to the computing machine. The spot overseas telegram is connected to the web interface card which is connected to the computing machine.
RJ45 Patch panel- this piece of equipment will be needed to link all the web points to the waiter. The RJ45 Patch Panel is used to associate up all the web points which will let the user to entree informations from the waiter.
Switch/Hub-a switch is required for my client to link the Server to the router which will let my client to hold internet entree.
Servers- my client requires a file waiter which will let the member of staff to link to the web. They require one file waiter which will keep all the informations files in the company.
Router- A router is a hardware which is provided by the ISP ( internet service supplier ) which allows the web to entree the cyberspace ( World Wide Web ) a router transportation ‘s informations and receives informations which allows the user to link to the cyberspace. This devise is required for the SIC company because they need to hold entree to the cyberspace.
Ethernet Card- A Ethernet card is used to link the spot cables to the web points. An Ethernet card is a hardware which is installed on each computing machine in the company.
Back-up server- A back-up waiter is a waiter which is used as a information back-up for the file waiter.
Software for web
Network runing system – A web runing system is a package which controls the operation of the full web in in an administration. My client could utilize Microsoft waiter 2008 because this waiter is easy to utilize and keep.
Server runing system- A waiter operating system controls operations and communicating of all the waiters. You could besides utilize Microsoft waiter 2008 for this.
Ethernet Card software-All the computing machines in the company will necessitate an Ethernet Card package to let the computing machine to link to the web. Without the package the Ethernet card on all the computing machines wo n’t work.
Network Drivers- A web Driver package is package which allows the cyberspace cards to work without the web driver the computing machines in the company wo n’t hold entree to the cyberspace.
Back-up software- The back-up package is a package which is designed to backup informations for the intent of holding a 2nd transcript of an original beginning in instance of harm to the file waiter.
The different protocols that will be used within my clients web and the function that each one will execute.
Layer 7 Application Protocols
TCP/IP – Transmission Control Protocol and Internet Protocol. This will make a communicating between my client ‘s computing machine and the web if their privation to necessitate entree any informations from the cyberspace or the web.
HTTP – Hypertext Transfer Protocol. This is the protocol which will let the communicating to the web waiter.
FTP – File Transportation Protocol. This protocol will copy files from another host or a waiter utilizing a TCP/IP web. This protocol is built on client waiter that will let my clients to do a information connexion through clear text mark in protocol for hallmark.
Layer 5 Session Layer
NetWare Core Protocol / NCP- used for directory system
Network File System / NFS- will let my users to entree files over the web
Server Message Block / SMB – will supply my clients to portion resources such as files, pressmans.
Layer 3 Network Layer
The undermentioned protocols will ease my clients for cyberspace networking:
Internet Control Message Protocol / ICMP
Internet Group Management Protocol / IGMP
Interior Gateway Routing Protocol / IGRP
Internet Protocol version 4 / IPv4
Layer 2 Data Link Layer
The undermentioned protocols are used for networking and cyberspace:
Layer 2 Forwarding Protocol / L2F
Layer 2 Tunneling Protocol / L2TP
Link Access Procedures on the D channel / LAPD
Point-to-Point Tunneling Protocol / PPTP
IEEE 802.11 protocol will besides be available for wireless local country web connectivity within the office premises. This is in the informations link layer 2.
Layer 1 Physical Layer
Ethernet – This protocol is used for networking.