Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
This document provides an overview of computer networks and their components. It defines public and private networks, and describes the differences between them. Key hardware components of networks like hubs, switches, routers and network interface cards are explained. Different types of networks such as local area networks, wide area networks, and the Internet are also outlined. The document aims to introduce readers to basic network fundamentals and terminology.
This lesson discusses electronic communication methods like email, texting, and teleconferencing. It describes advantages of electronic communication such as speed, low cost, and accessibility from multiple devices. Common problems covered include lost internet connections, email software issues, and delivery failures. The lesson also addresses best practices for secure communication, including using antivirus software, following netiquette guidelines, and being wary of frauds and hoaxes.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of communication services and email functionality. It describes the basic components of electronic communication, identifies popular internet communication services like email and instant messaging, and explains how to manage email accounts and messages using Microsoft Outlook. Specific topics covered include using usernames and passwords, organizing email folders, composing and sending messages, receiving and opening messages, and attaching files.
This document provides an introduction to common ports and protocols. It discusses how ports specify the protocol or service being accessed and can be thought of as extensions, while protocols are the languages that applications use to communicate. It then lists and describes several common protocols and their assigned ports, including FTP (20-21), SMTP (25), HTTP (80), DNS (53), and SSH (22).
This document provides an overview of computer networks and their components. It defines public and private networks, and describes the differences between them. Key hardware components of networks like hubs, switches, routers and network interface cards are explained. Different types of networks such as local area networks, wide area networks, and the Internet are also outlined. The document aims to introduce readers to basic network fundamentals and terminology.
This lesson discusses electronic communication methods like email, texting, and teleconferencing. It describes advantages of electronic communication such as speed, low cost, and accessibility from multiple devices. Common problems covered include lost internet connections, email software issues, and delivery failures. The lesson also addresses best practices for secure communication, including using antivirus software, following netiquette guidelines, and being wary of frauds and hoaxes.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of communication services and email functionality. It describes the basic components of electronic communication, identifies popular internet communication services like email and instant messaging, and explains how to manage email accounts and messages using Microsoft Outlook. Specific topics covered include using usernames and passwords, organizing email folders, composing and sending messages, receiving and opening messages, and attaching files.
This document provides an introduction to common ports and protocols. It discusses how ports specify the protocol or service being accessed and can be thought of as extensions, while protocols are the languages that applications use to communicate. It then lists and describes several common protocols and their assigned ports, including FTP (20-21), SMTP (25), HTTP (80), DNS (53), and SSH (22).
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This lesson discusses electronic communication and managing email with Microsoft Outlook. It defines different types of electronic communication, identifies users, and examines the components. It describes how to categorize, send, and receive email, as well as manage email messages by filing, searching, and archiving them. It also covers sending attachments, formatting messages, and configuration options.
The document contains 57 multiple choice questions about topics relating to e-commerce infrastructure and the internet. The questions cover topics such as packet switching, IP addressing, internet protocols, cloud computing, wireless technologies, and internet governance organizations. Sample questions assess understanding of topics like how TCP/IP operates, advantages of client/server computing, and limitations of the current internet architecture.
This document provides an overview of communication methods and collaboration tools. It discusses objectives such as identifying appropriate uses of communication methods and advantages/disadvantages of electronic communications. Specific communication methods covered include email, instant messaging, teleconferencing, blogs/RSS. The document also addresses solving common electronic communication problems through tools like network diagnostics and help/support.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document outlines a unit on the internet, including objectives, tools, and plans. It discusses how to import text and images from web pages using copy and paste functions. It explains how to perform searches on the internet using search engines or web addresses. It defines key terms like the web, internet, website, and search engine. It also describes what is needed to set up an internet connection, including a computer, modem, internet service provider, and telephone line. Finally, it discusses different types of computer networks like LAN, MAN, and WAN.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of using the internet and the world wide web. It defines key terms like the internet, web browser, homepage and defines the differences between the internet and the web. It discusses how to connect to the internet via various methods, set up an internet connection, and manage data usage. It also covers how to navigate web pages using a browser, customize browser settings, and manage bookmarks and browsing history. Finally, it addresses some common web issues and how to ensure security while browsing.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of networks and telecommunications for an information systems course. It discusses the key components of telecommunications networks, including terminals, processors, channels, computers and software. It describes different network topologies like star, ring and bus configurations. The document also covers telecommunications protocols like OSI and TCP/IP, trends in telecommunications, and popular business uses of the internet like email, e-commerce and overcoming barriers.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document is a thesis submitted by three students analyzing 5G network technologies. It includes a title page, declaration, approval, acknowledgements, abstract, table of contents, and six chapters. The thesis analyzes the evolution of mobile networks leading to 5G, key 5G technologies like massive MIMO and device-to-device communication, a proposed 5G network architecture called NANOCORE, and a comparison of 4G and 5G networks. The students conclude with a discussion of future work and achievements from completing the thesis.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
IRJET-Accessing Information about Programs and Services through a Voice Site ...IRJET Journal
This document describes a proposed voice-based system to provide access to educational programs and services for underprivileged students in Sri Lanka. The system would create a "voice site" parallel to existing websites that could be accessed over the phone. It aims to address the lack of internet access for many students due to high costs and infrastructure issues. The system would use voice prompts and speech recognition to allow students to navigate program information and generate customized voice pages from templates. This could help institutions reduce costs while improving access for students without internet or computer skills.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of Abdi Kissi's internship at Ethio Telecom hosted by the Fixed Access Network department. It discusses:
1. Ethio Telecom's vision, mission, values, objectives, customers, products/services, and organizational structure.
2. Abdi's overall internship experience including objectives, how he joined the company, and an overview of the Fixed Access Network, Copper Access Network, Fiber Access Network, and Transmission divisions.
3. The benefits Abdi gained from the internship including practical experience with technologies like MSAGs, fiber splicing, troubleshooting faults, and network maintenance activities.
This document describes potential thesis topics in networking that a professor at UNSW is willing to supervise. It provides details on several proposed undergraduate thesis projects related to the supervisor's research interests in areas like video communication, network dependability, and wireless networking. Students are instructed to email their resume and academic record to the professor if interested in any of the topics.
This document discusses the testing and evaluation of a video transmission system using a wireless local area network (WLAN) access point for instructional video broadcasting at a university. The system was built using a computer server to store and transmit instructional videos to clients via a WLAN access point. Tests were conducted to analyze network performance parameters like throughput, packet loss, and delay. Results showed the system could successfully broadcast videos from the server to clients in different quality settings over the university's 100 Mbps local network via the access point. This research aims to understand how to implement a wireless network using an access point for instructional video broadcasting in a university setting.
The document proposes establishing a local area network (LAN) for the Advanced Technical Institute (ATI) to facilitate resource sharing across its six buildings. It outlines installing ethernet cabling and fiber optic infrastructure to connect the buildings and purchase networking equipment like switches, servers racks and media converters. An implementation plan and budget of approximately $188,000 is presented to achieve the objectives of high reliability, security, cost savings and internet access across all buildings on the ATI campus through the LAN. References for pricing the various networking components are also provided.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This lesson discusses electronic communication and managing email with Microsoft Outlook. It defines different types of electronic communication, identifies users, and examines the components. It describes how to categorize, send, and receive email, as well as manage email messages by filing, searching, and archiving them. It also covers sending attachments, formatting messages, and configuration options.
The document contains 57 multiple choice questions about topics relating to e-commerce infrastructure and the internet. The questions cover topics such as packet switching, IP addressing, internet protocols, cloud computing, wireless technologies, and internet governance organizations. Sample questions assess understanding of topics like how TCP/IP operates, advantages of client/server computing, and limitations of the current internet architecture.
This document provides an overview of communication methods and collaboration tools. It discusses objectives such as identifying appropriate uses of communication methods and advantages/disadvantages of electronic communications. Specific communication methods covered include email, instant messaging, teleconferencing, blogs/RSS. The document also addresses solving common electronic communication problems through tools like network diagnostics and help/support.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document outlines a unit on the internet, including objectives, tools, and plans. It discusses how to import text and images from web pages using copy and paste functions. It explains how to perform searches on the internet using search engines or web addresses. It defines key terms like the web, internet, website, and search engine. It also describes what is needed to set up an internet connection, including a computer, modem, internet service provider, and telephone line. Finally, it discusses different types of computer networks like LAN, MAN, and WAN.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of using the internet and the world wide web. It defines key terms like the internet, web browser, homepage and defines the differences between the internet and the web. It discusses how to connect to the internet via various methods, set up an internet connection, and manage data usage. It also covers how to navigate web pages using a browser, customize browser settings, and manage bookmarks and browsing history. Finally, it addresses some common web issues and how to ensure security while browsing.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of networks and telecommunications for an information systems course. It discusses the key components of telecommunications networks, including terminals, processors, channels, computers and software. It describes different network topologies like star, ring and bus configurations. The document also covers telecommunications protocols like OSI and TCP/IP, trends in telecommunications, and popular business uses of the internet like email, e-commerce and overcoming barriers.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document is a thesis submitted by three students analyzing 5G network technologies. It includes a title page, declaration, approval, acknowledgements, abstract, table of contents, and six chapters. The thesis analyzes the evolution of mobile networks leading to 5G, key 5G technologies like massive MIMO and device-to-device communication, a proposed 5G network architecture called NANOCORE, and a comparison of 4G and 5G networks. The students conclude with a discussion of future work and achievements from completing the thesis.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
IRJET-Accessing Information about Programs and Services through a Voice Site ...IRJET Journal
This document describes a proposed voice-based system to provide access to educational programs and services for underprivileged students in Sri Lanka. The system would create a "voice site" parallel to existing websites that could be accessed over the phone. It aims to address the lack of internet access for many students due to high costs and infrastructure issues. The system would use voice prompts and speech recognition to allow students to navigate program information and generate customized voice pages from templates. This could help institutions reduce costs while improving access for students without internet or computer skills.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document provides an overview of Abdi Kissi's internship at Ethio Telecom hosted by the Fixed Access Network department. It discusses:
1. Ethio Telecom's vision, mission, values, objectives, customers, products/services, and organizational structure.
2. Abdi's overall internship experience including objectives, how he joined the company, and an overview of the Fixed Access Network, Copper Access Network, Fiber Access Network, and Transmission divisions.
3. The benefits Abdi gained from the internship including practical experience with technologies like MSAGs, fiber splicing, troubleshooting faults, and network maintenance activities.
This document describes potential thesis topics in networking that a professor at UNSW is willing to supervise. It provides details on several proposed undergraduate thesis projects related to the supervisor's research interests in areas like video communication, network dependability, and wireless networking. Students are instructed to email their resume and academic record to the professor if interested in any of the topics.
This document discusses the testing and evaluation of a video transmission system using a wireless local area network (WLAN) access point for instructional video broadcasting at a university. The system was built using a computer server to store and transmit instructional videos to clients via a WLAN access point. Tests were conducted to analyze network performance parameters like throughput, packet loss, and delay. Results showed the system could successfully broadcast videos from the server to clients in different quality settings over the university's 100 Mbps local network via the access point. This research aims to understand how to implement a wireless network using an access point for instructional video broadcasting in a university setting.
The document proposes establishing a local area network (LAN) for the Advanced Technical Institute (ATI) to facilitate resource sharing across its six buildings. It outlines installing ethernet cabling and fiber optic infrastructure to connect the buildings and purchase networking equipment like switches, servers racks and media converters. An implementation plan and budget of approximately $188,000 is presented to achieve the objectives of high reliability, security, cost savings and internet access across all buildings on the ATI campus through the LAN. References for pricing the various networking components are also provided.
This document provides an overview of a course on routers and routing basics. The course introduces networking concepts and protocols, and teaches how to configure routers and switches. It is a 3-credit course offered online or offline that aims to help students learn about IP addressing, routing, and basic router and switch configuration.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
AAP Part I DeliverableHere is the assignment to be comple.docxannetnash8266
AAP Part I Deliverable:
Here is the assignment to be completed in your group. The tasks are organized in no particular order.
Highlevel drawing of proposed upgrades
Drawing of existing network
WAN links bandwidth for the network
Inventory and IP scheme
Scope of work or design requirements
The first task in a network design or an upgrading of the network is defining the scope of work. This
scope of work is outlined in the client’s Request for Proposal. This is your base line for developing the
scope of work. Here you will start gathering information about the client’s business goals and technical
requirements. To identify the business goals, interview upper management, focusing on technical
requirements. The IT department can then provide you with the specifications. In the real world, this step
is necessary to validate the information provided by the client’s RFP. In this assignment, however, this
part of the scope of work is optional. Either you can role play and interview each other to come up with
the information or you can skip it. If you skip it, your scope of work is the client’s RFP
Example: Identifying the scope of work:
The scope of this project consists of major modifications to the existing network, along with the
implementation of many new network devices and protocols. The main intent of this redesign is to: improve
network availability, network reliability, and network security; create a centralized network backbone;
implement the use of wireless access, and migrate from a PBX telephony system to an IP based telephony
solution.
The proposed design will affect all areas of the current network. Implementing a centralized backbone and
upgrading the speed of current links (from 10Mbs to 100Mbs) will greatly improve the entire network. The
implementation of a new IP schema, the introduction of VLAN’s, and implementation of new routing
protocols and security protocols will improve the network layer. Just as the implementation of wireless,
redundant switches, along with the design of a network edge area will improve the data link layer of the
network.
Ultimately, the redesign of the network needs to meet the customer’s intent for the redesign. During the
implementation phase of the redesign, the entire network will be affected in some way – that is, some
improvements will have an immediate impact, while other improvements are going to take more time to
implement and may cause some network disruption for a short time. However upon the conclusion of the
design implementation, the customer will have a greatly improved network, which will fulfill their company’s
IT needs, at present, and for many years to come.
The second task is to prepare the existing drawings, if not provided by the client.
The third task is to prepare an inventory list. This can be done by using software or physically verifying
the existing equipment. Your inventory list should include currently operable equipment and new
equipment (You can use the inventory t.
This document provides an overview of using the OPNET network simulation software. It discusses that OPNET is required reading for the TCM-250 course and can only be accessed in the school's lab. The document then covers basic probability concepts and terminology needed to understand network simulations, such as probability distribution functions and how they are used to model things like message sizes and interarrival times. It also summarizes some of OPNET's capabilities for modeling different network types and technologies.
This document provides an introduction to computer networks. It discusses network fundamentals like LAN, MAN and WAN and various network topologies including bus, star, ring and mesh. It also describes common network components like physical media, networking devices, computers that act as clients and servers, and networking protocols like TCP/IP. Finally, it lists several applications that operate over computer networks like email, web browsing, e-commerce, VoIP and video conferencing.
This document provides an introduction to computer networks. It discusses network fundamentals like LAN, MAN and WAN and various network topologies including bus, star, ring and mesh. It also describes common network components like physical media, networking devices, computers that act as clients and servers, and networking protocols like TCP/IP. Finally, it lists several applications that operate over computer networks like email, web browsing, e-commerce, VoIP and video conferencing.
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
This document outlines the topics and policies for a network management course. The topics to be discussed include types of networks, network hardware, TCP/IP fundamentals, and TCP and UDP communications. Course policies cover attendance, assignment deadlines, exams, and conduct. Grading will be based on exams, assignments, attendance, and quizzes. The document then provides content on network types and topologies, network devices, and internetworking models like OSI and TCP/IP.
The document discusses networking standards and the OSI model. It begins by defining what a network is as a group of connected computers that share information. It then provides an overview of the seven layers of the OSI model from physical to application layer, describing some of the key responsibilities and protocols associated with each layer. These include addressing, routing, encryption, compression, and making data visible and usable to end users. The OSI model helps explain how data is transferred through a network and the roles of different protocols at each layer of the model.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
The document provides an overview of networking technologies and concepts covered during a summer training program. It discusses network topologies including physical, logical and different types of networks. It also covers networking devices like routers, switches and cables. Concepts like IP addressing, classes, subnetting, VLANs and routing are explained. The training took place at HCL Career Development Centre and involved projects on addressing schemes, internet connections and configuration of switches and routers.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
This document provides an overview of telecommunications, networking technologies, the internet, and wireless technologies. It discusses the components of telecommunications networks including clients, servers, network interfaces, cabling, switches, and routers. It also describes different types of networks like local area networks (LANs) and wide area networks (WANs). Additionally, it explains key concepts like packet switching, TCP/IP protocols, internet addressing, domain name systems (DNS), and the architecture of the internet. Wireless technologies and standards for internet access are also covered.
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologySukanya Ben
This document provides an overview of key topics in telecommunications, networking, the internet, and wireless technologies. It discusses the components of telecommunications networks including clients, servers, interfaces, wiring, and devices. It also describes different types of networks like local area networks (LANs) and wide area networks (WANs). The document outlines internet architecture, addressing, and governance. It explains technologies like packet switching, TCP/IP protocols, and wireless transmission standards that enable digital communication over networks.
Similar to DISTRIBUTED NETWORKING - By Hansa Edirisinghe (20)
ADVANCED SYSTEMS DEVELOPMENT - By Hansa EdirisingheHansa Edirisinghe
Case Study - DreamTours is a travel Agency. The company offers a variety of tour packages to the general
public. Tour packages are offered according to their destination, duration (eg: number of days)
and itineraries. - By Hansa Edirisinghe
DATABASE DESIGN AND MANAGEMENT - By Hansa EdirisingheHansa Edirisinghe
The document discusses the design of a database for ABC's online ordering and delivery system. It identifies several entities and their attributes, including customers, orders, products, suppliers, warehouses, drivers, vehicles, and expenses. It also identifies various relationships between these entities, such as many-to-many relationships between orders and products, warehouses and products, and expenses and drivers/vehicles. The document further discusses normalizing the database relations and designing a distributed database to support ABC's expansion to new branches in Hong Kong and Malaysia.
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...Hansa Edirisinghe
This assignment in its task one attempts to analyze the diffusion of innovation of Smartphone technology using Geoffrey A Moore’s model contributed to Technology Adoption Life Cycle and under the Task two, a leading Human Resource solution provider hSenid Software International has been selected to analyze their adaption to Cloud Computing. - by Hansa Edirisinghe
Legal Applications in Technology - Analyze the legal and professional impact ...Hansa Edirisinghe
The preliminary objective of this research is to analyze the legal and professional impact of patent transfer within a typical commercial setting. In the process the researcher provides a basic understanding about the patent license, the rights belongs to patent owner and how the patent owner can use his/her rights under the legal setting. - By Hansa Edirisinghe
Legal Applications in Technology - Analyze the legal and professional impact ...Hansa Edirisinghe
Legal Applications in Technology - Analyze the legal and professional impact of Transfer of Patent license within a typical commercial setting - By Hansa Edirisinghe
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
This report discuses the employment of ethical hacking through a disciplined, systematic analysis as a way of reviewing and strengthening the security of information systems. The preliminary objective of this study is therefore to understand the concept of Ethical Hacking. - By Hansa Edirisinghe
Information Security Management - Hansa EdirisingheHansa Edirisinghe
The presentation for "Critique the employment of ethical hacking as a way of reviewing and strengthening the security of information systems" prepared by Hansa Edirisinghe. (MSc IT - Cardiff Metropolitan University, UK
)
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
1. DISTRIBUTED NETWORKING
BSc (Hons) Assignment
2011
DISTRIBUTED NETWORKING
Hansa K. Edirisinghe
BSc (Hons) University of Portsmouth, UK
3/1/2011
2. Case Study
After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy
(SAA) considers expanding and investing into a new Multimedia department and courses by
setting up campuses around Asia pacific region.
Currently, the Academy has a very poor data communication network. As you have designed
most of the other institutions’ network infrastructure, the dean of the Academy contracted you to
design a sound network that will cope with the current and the future demands.
Some facts about the current network at the Academy:
The school is located on the two-storey of the converted shopping mall in the City State of
Singapore. Each floor has several departments. Each department has 10 to 15 members of staff.
The ground floor comprehends the administration and the account departments. For payment,
the administration and the account departments are considering the use of smart cards based on
Biometrics technologies and Radio Frequency Identification (RFID). The Academy has a
corporate minicomputer (a UNIX computer) that processes all accounting data, and a Microsoft
File Server for students support.
The first floor accommodates a team of 30 academics, three IBM compatible labs, and two
multimedia labs. The two-multimedia labs are to be equipped with the latest multimedia tools
and technology. Each lab contains 20 personal computers, including wireless access points. The
applications running on two servers include Lotus Notes, remote access, student/staff workbench
and a management information system (MIS). Twenty of the existing classrooms in the school
are not connected to the network. The faculty, staff and students require communication with
each other via electronic mail, and have access to the Internet.
As the Academy expands, the network connections were put in as required. There has been some
discussion about establishing a corporate website as well. The dean is interested in running a
collaboration application like groupware, Voice over IP (VoIP) and Video Conferencing with
University partners in Boston, USA, and London, UK.
The current infrastructure runs on a token ring network with a capacity of 4Mbps. Furthermore,
the communication between various departments, connected to the network and the University
partners, is established via emails and Internet services.
Requirements of the proposed network for the Academy:
1) To implement a LAN and WLAN for the Academy which replace the current 4Mbps token
ring network,
3. 2) To implement access points for wireless access for the students, staff and guests,
3) To link up all the office networks together on to a backbone network to support higher
volume of data,
4) To Identify and evaluate the state-of-art smart card Biometrics Technologies, and the Radio
Frequency Identification (RFID) mechanisms for payment,
5) To include further network expansion at the Academy to tolerate additional increases in the
network traffic such as the immediate inclusion of 20 computers, and to set up a web server
in order to establish a corporate website,
6) To implement a WAN to automate the data transfer between all the offices and the
University partners’ networks,
7) To provide a high bandwidth platform for collaboration application like groupware, Voice
over IP (VoIP) and Video Conferencing with the University partners and other campuses,
8) To identify and resolve key issues relating to network security for the school.
THERE ARE FIVE MARKS OVERALL ALLOCATED, FOR USE OF LANGUAGE
AND PRESENTATION
QUESTION 1
Discuss suitable LAN and WLAN technologies for the Academy. Critically evaluate your
proposed solution in terms of protocols, topology and cabling used. A details description of the
protocol, the advantages and pitfalls of the topology and a technical specification of the cables is
mandatory.
QUESTION 2
Critically discuss how to minimize the network congestion and the data access between
Academy campuses and the University partners’ networks using WAN connectivity. Your
discussions should include two different possible types of networks to connect between the two
continents. Your answer should also include the protocols associated, data rate, cost, and
performance aspect.
QUESTION 3
Prepare a comprehensive contingency plan for the Academy network in terms of strategy and
appropriate hardware/software solutions to ensure network availability. You should include four
significant threats that would affect network availability in case of major service disruptions and
propose counter measure mechanisms.
4. QUESTION 4
Critically evaluate three key strategic network security safeguards that can help to secure the
Academy Network. You should provide a detailed description of how these security mechanisms
can be used to secure the network and a comprehensive assessment of the advantages and
disadvantages of your proposal.
QUESTION 5
Design and explain, with the aid of a suitable fully labelled network diagram, how far the
proposed Academy Network meets the requirements listed. Provide a detailed assessment to
justify your proposed network, and any recommendations that you made for the specific
hardware and software technologies. You must clearly stated their usage in your proposal.
5. Table of content
Question 1................................................................................................................................... 2
Question 2................................................................................................................................... 8
Question 3................................................................................................................................... 12
Question 4................................................................................................................................... 15
Question 5................................................................................................................................... 17
List of reference.......................................................................................................................... 19
Page 1 of 23
6. 1. Question 1
Considering the current network of Singapore Arts Academy, We have to improve several arias
when establishing a strong data communication network within the branch campuses and among
the campuses.
Topologies which are going to use
Hardware the build the network
Reliability, effectiveness and cost
Contingency Plane
Network system Software
Token Ring is the currently using Technology which connects all the computers to ring or stare
and use a token passing methodology to transfer data or communicated between two computers.
When one computer needs to transfer data, it receives a free token, discard it and replace new
token with its own data, address to IP and release to the network. When the addressed IP
received data, it makes as received and passes it back to originating station, discard data frame
and release new token to the network. Token Ring data transfer rate is 4Mbps or 16Mbps. This is
a quite old technology and its devices are much more expensive. The main disadvantage of token
ring is only two stations in the network can send and receive data at one time.
Choose a LAN and WLAN technology
Considering about the requirement, I would like to propose 4Mbps Token Ring connection
replace with the Ethernet with the bandwidth of 1000Mbps as the Local Area Network of the
Academy. Ethernet use the Carrier Sense, Multiple Access / Collision Detect (CSMA/CD)
protocol to data communication.
CSMA/CD
Carrier Sense: Every nod is listening to the Ethernet wire
and check whether any device transmitting data. If
transaction happens, the nod waits while the current
transaction gets finish.
Multiple Access: It is possible to sensing (listening and
waiting to transmit) data from one or more devices at the
same time.
Collision Detection: If more than one ethane nods transmit
data the same time, Ethernet is able to detect collision.
Figure 1.1 CSMA/CD
Advantages of the Ethernet
Source : http://www.payer.de/cmc/cmc0801.gif
An any network nod can send data in any time
Bandwidth availability 10, 100, 1000Mbps
Much easy to plane and low installation cost
Network components such as cables, Network interface cards and Connectors as low in
cost
Page 2 of 23
7.
Ethernet can work with Star topology, as well as Bus topology
Trustworthy and reliable when working with home and office network environments
It is easy to add and remove computers on the network
Supported by most Software and hardware systems
Disadvantages of Ethernet
A large traffic rate such as 40% - 50% may delay the whole network
Packet swishing produces visible delay
Which protocols to select
A protocol is the special set of rules that end points in a telecommunication connection use when
they communicate. (SearchNetworking.com 2011)
OSI and TCP/IP are the two models which
gather network protocols in to layers.
TCP/IP is an open source protocol which uses
to any kind of network, but there are some
restrictions also in the TCP/IP. In the SAA
network there are lot of changes can happen in
that protocol. So in side this protocol there is
advantages and disadvantages in the protocol
which use this university network. There are
IBM main frames compares also in this
Academy building. But the TCP/IP protocol is
unable to use in the IBM servers. So it will be
a pitfall in the university network in
Singapore. However as its mention the Art and
Design University the TCP/IP is a very reliable
protocol because less cost effect and it’s easy
to implement the network in any second.
Because the there are selected web sites or host or IPs has to block in the university. TCP/IP can
make change the routing configuration easy and make block the site and access the sites the user
need and wants. This makes advantage of the TCP/IP.
Selection of a Network Topology
Topology is a layout which devices can interact with each other. There are four major types of
topologies and there are plus points, as well as minuses in each and every topology. According to
them we should select the best suitable topology for our environment.
Topology
Bus
Advantages
Easy to control.
Easy to implement.
Most suitable for small networks
with 10 – 15 nods.
Disadvantages
Cable length limited.
Number of stations limited.
Cannot perform well.
Page 3 of 23
8. Ring
Star
Mesh
Transition data packets among two
nodes pass through the all other
nodes in the network.
Central server not required for
configuration.
Simplicity of operation.
Add and remove nod is easy.
Failure of one node will not affect
to the whole network.
Error detection is easy.
No network traffic occurs.
Modification of a cable or nod does
not affect to the entire network.
Failure of single device or cable will down
the entire network.
Add and remove nod is difficult.
Failure central device fails the entire
network.
High cost.
Considering of SAA environment, I would like to suggest Star Topology.
Star topology connects all the devices in the view of a
visual star. There is a central HUB or Switch. All the
other Nods (Computers, servers, printers, fax
machines, clock Machines) connected to the Central
Device. This central HUB or Switch acts as a repeater
for the data flow. The total data communication
network handles by the central device. Each and every
bit of data drives through the central device to its
destination nod. So a failure of one cable or failure of
one nod does not harm to the entire network. But
failures of the central device (it can be HUB or a
Switch) come out with an error the entire network
goes down. The nature (layout) of star network makes
really easy of trouble shooting within the network.
For the configuration of star, it is possible to use twisted
pair (STP or UTP) cables or Fiber-optic Cables.
Widely using cable type for Star is UTP cables
(Unshielded Twisted Pair cables) and the network port that is connected to both ends are RJ45
ports.
Looking at the Singapore Art Academy’s environment, it’s a two storied building. It’s facilitated
with 3 IBM and 2 Multimedia labs with two departments for Staff. Two departments and the File
servers are in ground floor.
Scenario:
An IBM lab equipped with 20 IBM PCs per each lab and Multimedia labs with 20 PCs.
According to the standard switch sizes, we have to use 24 port switches and connect the entire
lab PCs directly to switch as per the star topology layout. It was connected by UTP cables
Page 4 of 23
9. Hierarchical Star
The hierarchical topology is used to make
more connection ports available within an
building, office, university or Institute.
Plugging outlying switches (access switches)
into a master switch (Distribution or Core
switch) gives more hosts a place to plug in
without having to pull additional cable into
the area.
Advantages of Star
Star topology has simply
understandable layout
It makes easy to install the topology
Figure 1.4 Hierarchical Star
Source : http://tjliu.myweb.hinet.net/COA_CH_12.htm
Star performance is good. The way of
star transaction process, it performs
better than other network topologies.
When there is a communication goes on, just only tree network devices and two network
links actively participate to the communication process from the entire star. It can avoid
the unnecessary traffic within the network.
The rate of Error detection in star network devices, higher than other networks, because
of the simplicity of network structure.
If a failure occur in one nod does not harm the entire network connection and it is easy to
repair or replace the defected nod without breaking the entire network.
According to star structure, it is very easy to adding new devices and grove the network.
Disadvantages of Star
The entire network is highly depending on the central hub. If the hub (Switch) comes up
with error, the functionality of entire network goes down.
There are limited in the central hub. So there is a limit to grove the network and
connection of one new nod to star effect entire performance cycle of the network.
The performance level is dropped, when switch hands its high traffic, then the entire
network will get slow.
Network Cables
Within a wired network, cables play one of the main roles on the network.
Twisted-pair (Shielded and Unshielded twisted are the two categories of Twisted pair)
cables
Coaxial cable (very famously used before twisted pair)
Fiber-optic cables are the generally using network cable types. By looking at the cost of
cables, data transfer speed, usability and durability, we need to identify, what is the most
suitable cable type for our network.
Page 5 of 23
10. Twisted-pair cables
Two insulated copper wires warped around each other are Twisted-pair. When the electric
signals walking through the copper wire, it generate a small magnetic field around the wire
(according to Fleming’s right-hand thumb rule). The twisted nature of twisted pair cables is
minimize this disturbance. Ethernet over twisted-pair is not new within a building amount
several floors and several partitions.
Two typed of twisted-pair cables are;
Unshielded twisted pair (UTP)
Shielded twisted pair. (STP)
Unshielded twisted-pair (UTP)
UTP cable composed with eight copper wires which are covered by material which reduce
electromagnetic interferences. It reduces its electromagnetic interference according to the way it
twisted. UTP is low in cost and it is possible to use major networking architectures. Cable is very
flexible and easy to install. I suggest UTP cabling is the most suitably to an environment like
SAA. UTP cable can transfer from 10 Mbps to 1000Mbps in speed and the maximum cable
length for gigabit is Ethernet is 100 meters. Connecter would be RJ 45 and the cost is low. So
UTP is the most suitable cable type for SAA network. Because we have more than 120
computers and servers to connect with WAN and we selected 1000Mbps (gigabit) Ethernet to
implement the new network.
Shielded twisted-pair (STP)
STP has four pairs of copper wires and each pair is wrapped with a metallic foil, then these four
pairs again wrapped with a metallic foil. This is why we call it as Shielded and this reduces the
outer electromagnetic interferences and the inner electronic disturbances as well. Comparing
with the UTP cable STP prevents inner and outer disturbances better than UTP. But STP is
expensive and installation is difficult. Considering the SAA environment, it is not good enough
to go for STP cabling network according to the academy’s requirement and the STP cabling cost
probably be and additional cost to the academy.
Selection Cables for the topology
When we selecting a cable, we should the always look into bellow characteristics of a cable. The
characteristics which are
Maximum segmentation Length (max length of the cable that can transfer data)
Speed (speed in bits per second)
Cost (cheap or expensive)
Advantages and disadvantages of the using the selected cable type of cable.
Page 6 of 23
11. As above mentioned, my suggestion is UTP cable the most suitable cable for SAA networks out
of the other 4 cable types, according to requirements.
UTP Cable Standards
UTP cables divide into categories according to UTP standards. They are Cat 3 UTP, Cat 5 UTP,
Cat 5e UTP, Cat 6 UTP Cat 6A UTP and Cat 7 UTP. But we have to forget about the Cat 3 UTP
and Cat 5 UTP, because those can carry data only up to 10Mbps and 100Mbpd Ethernet.
Cat 6A UTP and Cat 7 UTP are designed for 10 Gbps Ethernet. So we are not necessary to go to
that much unwanted expense. Cat 5e UTP and Cat 6 UTP is only suite for Gigabit Ethernet.
Thus Cat 5e UTP can handle Gigabit Ethernet; I select Cat 6 UTP to configure the Academy
network.
Cat 6 UTP has backward compatibility. It support to the occurring rate of Crosstalk and noise
damage to the signal, keep on low level. Provide performance frequency up to 250MHz. Cat 6
UTP 10BASE-T UTP, 100BASE-TX (Fast Ethernet) UTP, 1000BASE-T/1000BASE-TX
(Gigabit Ethernet) UTP. Proper integrated Cat 6 UTP cables supports up to 10Gbps speed.
Page 7 of 23
13. Network Congestion
When a nod or device transmits more data at ones and overload, network congestion takes place.
This congestion reduces the accuracy and trustworthiness of network and communication data.
Because it delay the communication speed and the congestion might loess or block data packets.
When the switching nod getting congested and the round trip time duration increases, the
network problems are not addressable.
Going through the SAA network, we can find several points which can occur network
congestion.
When multiple links feed its data into to single link. It usually happen the points which internal
LANs are connected to WAN, such as the academy internal network links University partners in
Boston and London.
According to the proposed network, the academy network usage is very high. Other than the
current use wireless router implementation Smart card Biometrics Technology, RFID, newly
including computers, web server, VoIP Video Conferencing and new security futures require
more bandwidth and speed. So the routers in core network are capable to handle a large traffic.
Otherwise it will be another reason for occurring congestion.
Mainly the academy internal and external communication purposes and data and file transaction
purposes with partner Universities, TCP/IP such as Internet is essential. But it is a major point
which occurs of terrible network congestion, because the basic connection is less nature.
Minimise the network Congestion
We can use several telecommunication technologies to minimise congestions and sometimes it
makes fast data transmission. These telecommunication services designed for connect LAN and
WAN connectivity. As we discussed earlier, network congestion directly related theses services.
Frame Relay, X.25 and Asynchronous Transfer Mode (ATM) are some of them.
Page 9 of 23
14. Frame Relay
Frame relay is a digital dedicated low cost data transmission service, which has higher data rate
intermittent traffic between Local area networks (LAN to LAN), between end points in Wide
area networks (WAN), remote accesses and access to internet. The information divided into data
packet, labelled with an ID and carries to the identified destination with very efficient way. This
process is known as packet switching technology. It sends data frames (data packets) over the
network for communication and checking errors while the transmission process. When there is
any error detection it retransmits the data.
In SAA network we can use Frame relay with the transition from Router. It makes our data
transaction fast and efficient.
This network service transmits data between remote networks with leased line access. Frame
relay has 56Kbps to 45Mbps range of bandwidth and it is possible to select the bandwidth which
is suit to our Academy usage. The physical connection to our frame relay circuit is known as port
speed.
Packet switching technology is also use with TCP/IP and X.25.
Frame Relay Structure
Figure 2.1 Frame Relay Structure
Source : http://www.protocols.com/pbook/frame.htm
Protocol use in Frame Relay
The protocol which is using with frame relay is HDLC. HDLC stands for High-level Data Link
Control. HDLC is the protocol which manages the flow of data in Frame Relay. This is the most
common protocol using in layer 2 in OSI model.
ATM
Asynchronous Transfer Mode is a technology based on transfer data in cells or packets for a
fixed size. A cell which is used with ATM is small in size and it allows transmitting video, audio
and computer data along network.
So it is possible to use ATM to our technology between switches and end user computers of
multimedia Labs.
ATM creates a fixed cannel among two points when the beginning of the transmission process.
ATM utilized for high bandwidths like 34Mbps to upwards.
Page 10 of 23
15. X.25
X.25 is the advances version of Frame Relay. X.25 divides into three categories. Those are data
DTE, DCE and PSE. DTE stands for terminal equipment, DCT stands for data circuitterminating equipment and PSE stands for packet-switching exchange. DTE devices are
endpoints such as PCs, terminators, printers, scanners that communicate across X.25 networks.
DCE devices are communication devisers such as modems and packet switches. DCE are the
interface between DTE and PSE. PSE are swatches to compose bulk carriers of network.
Page 11 of 23
16. Figure 2.2 Characteristics between Frame relay and X.25
Source : http://www.dcbnet.com/notes/framerly.html
3. Question 3
According to the structure of the Academy and considering about the new requirements there are
several hardware devices to configure a better network and software to control the network and
track the transaction. We have to consider about the several facts including reliability, efficiency
and cost.
Hardware
Switch
Switch is used to interconnect several
hosts(nods) together. There are switches in
different sizes. The common sizes are 4
port, 8 port, 16port, 24 ports and 48 port
switches and the size of the switch can be
selected according to the according to our
network. For each port there is a light
which blinks when it connected to
network. Switch operates at the data link
layer, which is the second layer of the OSI
model.
Figure 3.1 Switch
Source :
http://lh4.ggpht.com/_9R2czlR5ELs/SoDac_wAD1I/AAAAAAAAA
Qs/5rl4f0gu5lc/img-xavb1004-back.jpg
The MAC addresses of all the devices
which connect to switch are in its storage.
When a data frame passes through the switch, it examines the destination MAC address.
According to the Destination device MAC and the data frame’s destination MAC, switch decides
Page 12 of 23
17. to which port, the data frame to copy. If the data frame’s destination MAC is unknown, then
switch will broadcast the frame to all of its ports.
We have 5 computer labs and two departments at the ground floor. There are several serves to
connect to the network. Because of that, this device is important to us. Make star network within
the IBM and Multimedia labs, connect servers including file, application and web, to the
Academy’s LAN. Switch can support 10/100/1000 Mbps port transfer rate and multiple switches
in the same network can support for different speeds. The price of a switch differs from brand to
brand, sizes and transfer rates. However a 24 port switch which supports for 1Gbps speed, we
need to allocate $100 - $150 from our SAA networking budget.
Wired Router and Wireless Router
Router is a device which transfer data to nods and work as a filter of data and its task is to copy
frames from one to another. It is a device which uses to connect on internet and other outside
networks. Router configuration allows you to apply filters, block accesses and deny access to
selected hosts. According to OSI model router operates at the network which is layer number
three.
Router use one more than one routing protocols
to create its routing table and looking at the
routing table router makes its decisions. Wired
routes are accessible with interface types, such
as DSL, Ethernet, Fast Ethernet, Fiber
Distributed Data Interface (FDDI) and Token
ring.
In the SAA network we need a wired router
and as well as wireless router. The academy’s
IBM and Multimedia labs have computers with
wireless access points and they require
implementing access points for wireless access for
Figure 3.2 Wireless Router
Source : http://kb.netgear.com/app/answers/detail/a_id/1000/~/whatthe students, staff and guests.
is-a-router%3F
Wireless routers are available with interfaces such
as IEEE 802.11(Wi-Fi)
How router works
Page 13 of 23
18. Threats affect to the network availability
Flood, Earthquakes, Tsunami
These are natural threats which we cannot stop or get rid of it. But we can minimise the damage
from these threats. For an example we have out academy database server and the backup server
in the same building. But will destroy all our property when sudden Tsunami disaster. If we keep
another backup server in our branch campuses in another country, it will minimise the damage
us.
Fire
Using fire alarm system and CO2 fire extinguishers will minimise the damage.
Sudden power failures
Sudden power failures can affect to computer software, hardware and network devices. UPS is a
device which supplies power from its battery for about 5 - 10 minutes, until power supply
connected to generators. Otherwise these UPS power supply time is enough to turn of the
devices.
Trojan horse, Viruses, Worm
Page 14 of 23
19. These are small software which designed to delete or corrupt data in the computers, databases
and servers. This makes the PCs and servers to slow, and sometimes it harms to the network.
Using a fire wall and properly updated antivirus software can avoid these Virus infections.
Hackers and Unauthorized Access
People can come to our academy network without permission and harm or seal machined data
and network data. Not only the data, they can seal our hardware items as well. Using a password
protection to every PC is the primary protection for the network. Using different passwords even
from lab to lab is better for the security. Keep network administration passwords and server
passwords confidentially is essential. When the students, parents or staffs logging in to the
system there should be audit log. Audit log means there will be records of logins and the record
of the activities.
4. Question 4
It is essential to maintain a very good security system for large network like academy network,
which spread worldwide. There are a lot of ways which can attack the network.
Attack Sophistication vs. Intruder Technical Knowledge
Figure 4.1 Attack Sophistication vs. Intruder Technical Knowledge
Source : www.andrew.cmu.edu/course/95-752/notes/netsec.ppt
Firewall
Firewall is a secure machine, which is works between a private network and a public network.
Normally firewall closely working with a router program, and check each and every network
packet to determine whether to forward it toward its destination.
Page 15 of 23
20. How Firewall Works…
There are lots of firewall screening methods. A Simple one is to screen requests to make sure
they come from acceptable domain name and Internet protocol address. Firewall use one of these
methods to control the traffic flowing in and out of the network.
Packet Filtering
Proxy service.
Shameful inspection
Biometrics authentication Techniques
Biometric authentication used to identify the person’s physical, biological characteristics
uniquely. This can be used in ongoing and absolute identification.
Eg: finger prints, Foot prints, Walking Style, DNA patterns, Voice
VPN
VPN is a private network which is used to
communicate with remote sites.
Page 16 of 23
23. Reference
SearchNetworking.com (2011) accessed 4 March 2011
http://searchnetworking.techtarget.com/definition/protocol
Bibliography
Topologies Available at wikipedia.org (2011) accessed 18 Feb 2011
http://en.wikipedia.org/wiki/Network_topology
Advantages and Disadvantages of Topologies Available at buzzle.com (2011) accessed 27 Feb
2011 http://www.buzzle.com/articles/advantages-and-disadvantages-of-different-networktopologies.html
Star Topology Available at exforsys.com (2011) accessed 21 Feb 2011
http://www.exforsys.com/tutorials/networking/star-topology.html
Advantages and Disadvantages of Tree Available at buzzle.com (2011) accessed 21 Feb 2011
http://www.buzzle.com/articles/star-topology.html and wikipedia.org (2011) accessed 21 Feb
2011 http://en.wikipedia.org/wiki/Star_network
Network Cables Available at freeonlineresearchpapers.com (2011) accessed 21 Feb 2011
http://www.freeonlineresearchpapers.com/lan-topology-disgn-cabling-specifications
UTP Cable Standards Available at tech-faq.com (2011) accessed 20 Feb 2011 http://www.techfaq.com/utp.html and comptechdoc.org (2011) accessed 21 Feb 2011
http://www.comptechdoc.org/independent/networking/guide/nettopology.html
Network Congestion Available at linktionary.com (2011) accessed 27 Feb 2011
http://www.linktionary.com/c/congestion.html
TCP Congestion Control Available at jpkc.ncwu.edu.cn (2011) accessed 27 Feb 2011
http://jpkc.ncwu.edu.cn/jsjwl/net/ross/book/transport_layer/congestion.html
Frame Relay Available at shopforbandwidth.com (2011) accessed 1 March 2011
http://www.shopforbandwidth.com/frame-relay.php
X.25 Available at networking.ringofsaturn.com (2011) accessed 2 March 2011
http://networking.ringofsaturn.com/Protocols/x25.php
Network Hardware Available at book.opensourceproject.org.cn (2011) accessed 3 March 2011
http://book.opensourceproject.org.cn/distrib/ubuntu/unleashed/opensource/0672329093/ch18lev1
sec4.html and tech-faq.com (2011) accessed 3 March 2011 http://www.tech-faq.com/types-ofnetwork-hardware.html
Page 19 of 23