Sunteți pe pagina 1din 32

Name :-Mainul Hayat Foysal

Course :-HND in Computing


Passport No :-BP0405529

Mainul Hayat Foysal BP0405529 1


For P1 - Discuss the benefits and constraints of different network types and standards.

Ans:-

Peer-based :-In this network all computer are connected with each other via the internet and they
can transfer or shear file directly between system on the network without any central server .

Fig:- Peer based

Benefits of peer- based network:-

Low cost
Simple to configure or setup
User has full accessibility of the computer

Constraints of peer-based network:-

May have duplication in resources


Difficult to uphold security privacy
Difficult to handle uneven loading

Client-server:- In this network all workstation and personal mobile, computer ,printer are connected
with server via hub and internet. Clients can access all data and run any program from server.

Mainul Hayat Foysal BP0405529 2


Fig :-Client Server

Benefits of Client-server network:-

Centralized system. all data in one place

Server can be accessed administrator

Back and recovery possible

Security can be configured to manage account

Constraints of client-server network:-

High cost of server

Need expert to configure the network

Cloud based network:-It is a type of networking which gets their access from a third-party provider
using Wide Area Networking (WAN) and in this networking the network can be shared as well as the
computing resources.

Mainul Hayat Foysal BP0405529 3


Fig:-Cloud based network

Benefits of Cloud based network:-

Cost efficiency

Storage and Scalability

Backup and recovery

Mobility

Reliability

Constraints of cloud based network:-

Control

Security and Privacy

Compatibility

Downtime

Centralized network:- In this network all users are connect to a central server. This network work as
an agent for all communications. User account information and communication both would store in
this server.

Mainul Hayat Foysal BP0405529 4


Fig:-Centralized Network

Benefits of Centralized network:-

Centralized system

Easy to use

Server keep all information

Easy to control

Constraints of centralized base network:-

The possibility of complete failure

Not possible to use different operating system

Security problem

It create centralized targets

Virtualized network:- virtualized network’s main focus is to enable a data center or internet service
provider to provision the most suitable and efficient network for the application server.

Mainul Hayat Foysal BP0405529 5


Fig:-Virtualized network

Benefits of virtualized network:-

Easy to backup and recovery

Reduce of spending

Easy to maintain

Constraints of virtualized network:-

Problem of software licensing consideration

High cost

Security risk

IEEE 802.1X network:- This network is part of the IEEE 802.1 group of networking protocols and IEEE
standard for port-based network access control.

Mainul Hayat Foysal BP0405529 6


Fig:-IEEE 802.1X network

Benefits of IEEE 802.1X network:-

Easy to management

Easy to use

Scalability

Security

Constraints of IEEE 802.1X network:-

Network access

High cost

Conceptual network:- A conceptual network is an analytical tool with many variations and contexts.
It may be applied in several classes of work wherever an overall image is required. it's wont to create
abstract distinctions and organize concepts.

Benefits of conceptual model:-

The situation is avoided whereby standards area unit developed on a patchwork basis,
wherever a specific accounting problem is recognized as having emerged, and resources were
then channeled into standardization.

As explicit above, the development of sure standards (particularly national standards) are
subject to considerable political interference from interested parties. wherever there's a
conflict of interest between user teams on that policies to settle on, policies account from a
abstract framework will be less open to criticism that the standard-setter buckled to external
pressure.

Mainul Hayat Foysal BP0405529 7


Some standards might concentrate on the financial statement whereas some might
concentration the valuation of internet assets (statement of economic position)

Constraints of conceptual network:-

Financial statements are supposed for a spread of users, and it's not certain that a single
abstract framework is devised which will suit all users.

Given the range of user needs, there is also a necessity for a variety of accounting standards,
every made for totally different purpose (and with different ideas as a basic).

It isn't clear that an abstract framework makes the task of preparing and so implementing
standards any easier than while not a framework

For P2 - Explain the impact of network topology, communication and bandwidth requirements.

Ans:- The volume of data that may be transferred across a network at a given time is named its
bandwidth. a rich, high bandwidth network is able to transfer data is faster than a low bandwidth one.
The bandwidth is established by the kinds of network cards and modems used also as the amount and
kind of cable used.

Also, the approach in which computers are connected together to form a network has a massive
impact on its speed and potency. There are a number of various ways that to connect computers in a
network - however these are the most common network topology-

Bus Topology:- it’s a multipoint type of connection.

Fig:-Bus topology

Mainul Hayat Foysal BP0405529 8


Alternatively stated as a line topology, a topology may be a network setup in which every pc and
network device are connected to a single cable or backbone. depending on the kind of network card
used in every pc of the bus topology, a coaxial cable or a RJ-45 network cable is used to connect
computers together.

Advantages:

Easy to install, use for small network

Cheap

Easy to Expand

Disadvantages:-

Slow speed as only one system can transmit at a time

Fault cable bring down in whole network

Ring Topology:- In this each computer is connected to the next computer with the last one connected
to the first.

Fig:-Ring Topology

Advantages:-

Mainul Hayat Foysal BP0405529 9


Multipoint data connection

Token passing is used in this network

Disadvantages:-

Fault in any link disables entire network

Difficult to troubleshoot

Star Topology:-All the wires from the computers go to a center location having a device called Hub.

Fig:- Star Topology

Advantages:-

All connection goes through HUB

Easy to use

Disadvantages:-

If central HUB fails, whole network fails

Cabling cost is more

Mesh Topology:-In this each device has a dedicated point to point link to every other device.

Mainul Hayat Foysal BP0405529 10


Fig: Mesh Topology

Advantages:-

Point to point connection

No traffic problem

Failure of one link doesn’t effect entire network

Secure and private

Easy to fault diagnose

Disadvantages:-

Expensive

Tree topology:-This network is variation of Star Topology.

Mainul Hayat Foysal BP0405529 11


Fig:-Tree Topology

Advantages:-

Linked to central HUB

Disadvantages:-

Expensive

On failure of central HUB, entire network breaks down

Mainul Hayat Foysal BP0405529 12


Hybrid Topology:-it is the most complicated topology in computer network.in this network multiple
physical topologies are combined to form one large network.

Fig:- Hybrid Topology

Advantages:

Useful for larger network

Handles large volume of traffic

Easy to detect and remove fault

Disadvantages:-

More cable required then other topology

Expensive

Complex structure

For P3 - Discuss the operating principles of networking devices and server types.

Mainul Hayat Foysal BP0405529 13


Ans: operating principles of networking devices –

Router:-It’s a networking device. it’s forwards data packets between computer networks.

Fig: Router

Switch: it’s a computer networking device and its connect devices together on a computer network
by using packet switching to receive, process and forward data to the destination device.

Fig:- Switch

Firewall:- A firewall is a system designed to stop unauthorized access to or from a non-public network.
It’s a specialized version of router.

Fig:- Firewall

Mainul Hayat Foysal BP0405529 14


Wireless device:- wireless device is a network that enables devices to connect and communicate
wirelessly.

Fig:-Wireless Device

Access point:-Access point is allows wireless devices to connect to it by means of the antennas.

Fig:-Access Point

Terminal:-It is a hardware interface between a computer and ISDN line. A terminal adapter slight like
a modem.

Different types of server:-

Client server:- In this network all workstation and personal mobile, computer ,printer are connected
with server via hub and internet. Clients can access all data and run any program from server.

How does it works:- suppose a client sitting at a restaurant. he's waiting for the server to come by and
take his order. a similar rules apply in a client-server network; the client, which may be a laptop
computer, desktop, a smartphone, or just about any computerized device, will create a request from
the server. The consumer uses the network as the way to connect with and speak to the server. even
as the client speaks to his server, the consumer uses the network to send and receive communications
about its order, or request. The server can take the request and confirm that the request is valid. If
everything checks out okay, then the server can fetch the request and serve the consumer. The server
will create a request from the consumer also. it may want to check up on the status of the consumer,
or ask if it has received any security patches, or if it still desires resources from the server. If not, the
server can shut the connection in order to unlock network traffic.

Mainul Hayat Foysal BP0405529 15


Fig:-Client Server

Advantages of client server:-

Centralized system. all data in one place

Server can be accessed administrator

Back and recovery possible

Security can be configured to manage account

Disadvantages of Clint Server:-

High cost of server

Need expert to configure the network

Application server:- A server that exposes business logic to client applications through varied
protocols as well as communications protocol. To deliver varied applications to a different device, it
permits everybody in the network to run software package off of a similar machine.

How does it work:- An application server consists of a server operating system (OS) and server
hardware that work along to supply computing-intensive operations and services to the residing

Mainul Hayat Foysal BP0405529 16


application. an application server executes and provides user and/or different app access when
utilizing the installed application's business/functional logic. Key needed options of an application
server include data redundancy, high convenience, load balancing, user management,
data/application security and a centralized management interface. Moreover, an application server is
also connected by enterprise systems, networks or intranet and remotely accessed via the web.
Depending on the installed application, an application server is also classified in a sort of ways that,
together with as an internet server, database application server, general purpose application server
or enterprise application (EA) server.

Fig:-Application Server

Advantages of application servers:-

Easy to install application in one place.

Changes to the application configuration, like a move of database server, or system settings,
will surface centrally.

By centralizing business logic on an individual server or on a-little range of server machines,


updates and upgrades to the appliance for all users may be bonded.

Application servers saves a lot of time compared to installing a replica on each client machine.

easy to manage software licenses to make sure only the allowed number of users will run the
application at any one time.

Application servers software patches and security updates may be simply deployed.

Disadvantages of application server:-

Mainul Hayat Foysal BP0405529 17


Anyone can’t access the application server, if servers go down

Expensive

FTP server:- FTP is used to transfer files between two computers over a network and web. FTP is a
method of exchanging data between two computers or a computer and a server. FTP or file transfer
protocol works by following commands to upload and download files.

Fig:-FTP Server

How does it’s work:- FTP works once you have successfully opened the server command port twenty
one and established a connection between the consumer and FTP server. Then you'll transfer or access
keep files through basic commands. To connect and execute commands, the user is typically needed
to authenticate by entering an username and password.

Mail server:- With the clicking of a mouse button, you can send an email from one purpose of the
world to a different in a matter of seconds. Most people take this method for granted, giving very little
thought to how it truly works. it is easy to know how normal snail-mail gets from purpose A to purpose
B - but how will an email message build its approach from a sender to a recipient? the solution to that
question revolves around something known as a mail server.

Fig:-Mail Server

Mainul Hayat Foysal BP0405529 18


Types of Mail Server:- Mail servers will be dampened into 2 main categories: outgoing mail servers
and incoming mail servers. Outgoing mail servers are called SMTP, or simple Mail Transfer Protocol,
servers. Incoming mail servers are available 2 main varieties. POP3, or Post office Protocol, version 3,
servers are best known for storing sent and received messages on PCs' local hard drives. IMAP, or web
Message Access Protocol, servers always store copies of messages on servers. Most POP3 servers will
store messages on servers, too, that may be a lot a lot of convenient.

How does Mail Server Works:- The sender composes a message exploitation the e-mail consumer
on their computer. When the user sends the message, the e-mail text and attachments are uploaded
to the SMTP (Simple Mail Transfer Protocol) server as outgoing mail. All outgoing messages wait within
the outgoing mail queue whereas the SMTP server communicates with the DNS (Domain Name
Server–like a phone book for domain names and server ip addresses) to find out wherever the
recipient’s email server is found. If the SMTP server finds the recipient’s email server, it'll transfer the
message and attachments. If the recipient’s server can’t be found, the sender can get a “Mail Failure”
notification in their inbox. The next time the recipient clicks “Send & Receive,” their email consumer
can download all new messages from their own email server. You’ve got mail!

For P4 - Discuss the inter-dependence of workstation hardware with relevant networking software.

Ans:

Network Interface Card: A Network interface card is an device that connects a pc to a computer
network, typically a local area network. it's considered a bit of computer hardware. most up-to-date
computers support an internal network interface controller embedded within the motherboard
directly instead of provided as an external element. Network cards let a pc exchange information with
a network. to achieve the connection, network cards use an appropriate protocol, as an example
CSMA/CD. Network cards typically implement the first 2 layers of the OSI model, that's the physical
layer, and also the data link layer. There are a unit older network protocols like ARCNET, introduced
in 1977, Local Talk or Token Ring, but today, most network cards use ethernet.

Fig:-Network interface Card

Cabling:- A structured cabling system could be a complete system of cabling and associated hardware,
that provides a comprehensive telecommunications infrastructure. This infrastructure serves a large
vary of uses, like to provide phone service or transmit information through a electronic network. It

Mainul Hayat Foysal BP0405529 19


shouldn't be device dependent. We additional define a structured cabling system in terms of
ownership. The structured cabling system begins at the purpose wherever the service supplier (SP)
terminates. this is that the point of demarcation or Network Interface Device.

Most file systems have ways to assign permissions or access rights to specific users and teams of users.
These permissions control the flexibility of the users to look at, change, navigate, and execute the
contents of the filing system.

Fig:-Cabling

Permissions :-Two kinds of permissions are terribly wide used: traditional UNIX operating system
permissions date back several decades to the earliest days of UNIX operating system. they're
universally available on all UNIX operating system and Linux derived platforms. Access control Lists
(ACLs) are more modern in origin and area unit universally used on Microsoft Windows based mostly
filing systems wherever the file system supports user permissions , and are currently commonly used
and wide offered in most typical UNIX system and Linux based mostly systems, although not
essentially all. they're typically capable of much more detailed fine-tuning of permissions than the
traditional UNIX operating system permissions, and allow a system of access control that traditional
ACLs cannot provide. On UNIX operating system and Linux based mostly systems, the standard kind
of ACL is that defined by the POSIX standard (POSIX ACLs) but alternative variants exist like NFS v3 and
v4 ACLs, that work slightly differently (NFSv3 ACLs or NFSv4 ACLs).Where multiple systems are
available inside a similar package, there's sometimes some way to specify which is able to be used for
any given filing system, and how the system ought to handle attempts to access or modify permissions
that area unit controlled by one of these, exploitation commands designed for an additional. the
standard resolution is to make sure at least some degree of awareness and inter-operability between
the different commands and methods.

Client software :-The client software package is optional and not needed for basic logging, however,
it will give users with access to advanced options. These options include:-

1.Real-time feedback to the user as well as their account balances and event messages like
"print job denied" reasons.

2.Access to the account selection popup therefore users will allocate print jobs to shared
accounts - as an example, accounts representing departments, projects, clients, etc. this can
be notably necessary in an exceedingly business setting.

Server software :-Server software may be a kind of software that's designed to be used, operated and
managed on a computing server. It provides and facilitates the harnessing of underlying server
computing power to be used with an array of high-end computing services and functions. Server
software is primarily designed to act with a server’s hardware infrastructure, as well as the processor,

Mainul Hayat Foysal BP0405529 20


memory, storage, input/output (I/O) and alternative communication ports. looking on the kind or
usage of the server, server software is also classified into varied forms, like the following:

1.Web server software

2.Application server software

3.Database server software

4.Cloud computing server software

5.File server software

Each of the higher than kinds of server software utilizes the server for various functions and services,
however all focus their primary objective on using inherent pc capability and resources. Moreover,
server software is also for a physical or virtual/cloud server built on a physical server.

Client Operating System:- A desktop computer doesn't need any networks or external elements to
operate properly. The client operating system is that the system that works inside computer desktops
and varied portable devices. this technique is totally different from centralized servers as a result of it
solely supports a single user. Smartphones and small pc devices are ready to support client operating
systems. The system is in a position to manage totally different elements of the device like printers,
monitors, and cameras. every pc usually has a specific kind of operating system. Some computers have
the power to contain multiple operating systems. this can be called a dual boot configuration. once a
pc is designed during this way, it can be set up to run a particular device for every operating system
configuration. this allows flexibility for software that's designed for a particular package. once
somebody has 2 operating systems, they will have access to additional difficult software programs. In
this day and age, there are lots of completely different types of operating systems created for client
computers. a number of samples of this are Windows, Android, Mac, and Linux. every operating
system is supposed to function with a certain kind of hardware. Hardware compatibility could be a
major concern once selecting a system for client computers. There are many freeware versions
available for desktop computers. This client operating system offers multiprocessing power for a
reasonable price. Most of the Linux system configurations would like an explicit level of system
engineering information. the method of installing this system isn't meant for a beginner with
computers . Windows is maybe the most widely used client operating system these days. This
operating system has fully grown in quality ever since the discharge of Windows 95. several businesses
around the world use Windows office suite for his or her word processing wants and without the
Windows operating system it can’t be operate.The Windows operating system wants special
hardware so as to run. That hardware should be designed to support that individual application.

Server operating system:- A server operating system, additionally known as a server OS, is an
operating system specifically designed to run on servers, that are specialized computers that operate
among a client/server design to serve the requests of client computers on the network. The server
operating system, or server OS, is that the software layer on top of that alternative software programs,
or applications, will run on the server hardware. Server operating systems facilitate enable and
facilitate typical server roles like web server, mail server, file server, database server, application
server and print server. Popular server operating systems include Windows Server, mac OS X Server,
and variants of Linux like Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server.

The most deployed on-premises server operating systems-

Mainul Hayat Foysal BP0405529 21


Windows Server 2003

Windows Server 2008

Windows Server 2012

Linux (excluding RHEL)

Windows Server 2000

Red Hat Enterprise Linus (RHEL)

Network operating system :- A Network Server pc offers its services to a bunch of Network client
devices. A Server pc usually has a lot of computing resources like Processors Power, a lot of Physical
Memory (RAM), a lot of storage space etc., compared to client computers. The Server pc machine runs
on Server operating system, additionally called as Network operating system (NOS), that usually has
more options and process capabilities compared with the client computer's operating system. The
server is also installed with special software, to perform as a Server Role. The special software allows
a Server pc to function a particular server role, sort of a file server, Web Server, Mail Server, Directory
Server etc.A Network operating system (NOS) includes far more capabilities than a standard client
workstation (or Desktop) operating system. most well liked Network operating Systems are listed
below.

Windows NT

Windows 2000

Windows 2003

Windows 2008 / Windows 2008 R2

Windows 2012/ Windows 2012 R2 (Current)

UNIX operating system -Oracle Solaris, IBM AIX, HP UX, FreeBSD, NetBSD, OpenBSD, SCO UNIX etc.

Linux operating system-RedHat Enterprise Linux, Debian Linux, SUSE Enterprise, Ubuntu Server,
CentOS Server, Mandriva, Fedora etc.

For M1 - Compare common networking principles and how protocols enable the effectiveness of
networked systems.

Ans:-An application layer protocol defines however application processes (clients and servers),
running on completely different end systems, pass messages to every alternative. particularly, an
application layer protocol defines:

Mainul Hayat Foysal BP0405529 22


The types of messages. for example, request messages and response messages.

The syntax of the varied message sorts, for example, the fields within the message and the way the
fields are delineated.

The semantics of the fields. for example, the that means of the data that the sector is supposed to
contain;

Rules for determining once and how a method sends messages and responds to messages.

SMTP (Simple Mail Transfer Protocol):

Fig:-Simple Mail transfer protocol

One of the most common network service is electronic mail (e-mail).

The TCP/IP protocol that supports electronic mail on the net is called simple Mail Transfer Protocol
(SMTP).

SMTP transfers messages from senders' mail servers to the recipients' mail servers using transmission
control protocol connections.

Users based on e-mail addresses.

SMTP provides services for mail exchange between users on constant or completely different
computers.

Following the client/server model:

SMTP has 2 facets: a client side that executes on a sender's mail server, and server aspect that
executes on recipient's mail server.

Both of the client and server sides of simple mail transfer protocol run on every mail server.

Mainul Hayat Foysal BP0405529 23


When a mail server sends mail (to alternative mail servers), it acts as an SMTP client.

When a mail server receives mail (from alternative mail servers) it acts as an SMTP server.

TELNET (Terminal Network):

TELNET is client-server application that enables a user to log onto remote machine and lets the user
to access any applications programmed on a remote pc.

TELNET uses the Network Virtual Terminal system to encode characters on the local operating system.

On the server (remote) machine, NVT decodes the characters to a type acceptable to the remote
machine.

TELNET may be a protocol that gives a general, bi-directional, eight-bit byte orientated
communications facility.

Many application protocols are designed upon the TELNET protocol

Telnet services are used on PORT 23.

HTTP (Hypertext Transfer Protocol):-

Fig:-HTTP

This is a protocol used in the main to access information on the world Wide web (www).

The hypertext Transfer Protocol (HTTP) the Web's main application-layer protocol although current
browsers will access alternative kinds of servers

A repository of data spread all over the planet and joined together.

The HTIP protocol transfer data within the kind of plain text, hyper text, audio, video and so on.

Mainul Hayat Foysal BP0405529 24


HTTP utilizes server send requests and replies TCP connections to client .

it's a synchronous protocol that works by making both persistent and no persistent connections.

HTTPS (Hypertext Transfer Protocol Secure):-

HTTP is for websites using extra safety features like certificates. HTTPS is used once web transactions
are needed to be secure. HTTPS uses a certificate based technology like VeriSign.

Certificate-based transactions provide a mutual authentication between the client and the server.
HTTPS, additionally to using certificate-based authentication, encrypts all data packets sent during a
session.

Because of the encryption, confidential user information cannot be compromised. To use HTTPS, a
web website should purchase a certificate from a third-party vendor like VeriSign, Carto, united states
postal service, or alternative certificate providers. when the certificate is issued to an online website
from a third-party vendor, the online website is using trusted communication with the client. The
communication is trusted because the third party isn't biased toward either the online website or the
client. to view a certificate throughout a HTTPS session, simply double-click the lock icon within the
lower-right area of the online browser. HTTPS operates on port 443 and uses transmission control
protocol for communication.

OSI layered Model:-

Historically, one technique of talking about the various layers of network communication is that the
OSI model. OSI stands for Open Systems Interconnect.

Fig:-OSI Model

This model defines seven separate layers. The layers during this model are:

Application:- The application layer is that the layer that the users and user-applications most
frequently interact with. Network communication is mentioned in terms of availability of resources,
partners to communicate with, and information synchronization.

Presentation:- The presentation layer is responsible for mapping resources and making context. it's
wont to translate lower level networking data into data that applications expect to see.

Mainul Hayat Foysal BP0405529 25


Session:- The session layer may be a connection handler. It creates, maintains, and destroys
connections between nodes in a persistent method.

Transport: -This layer is responsible for handing the layers on top of it a reliable connection. during
this context, reliable refers to the ability to verify that a bit of data was received intact at the other
end of the connection.

This layer will resend data that has been dropped or corrupted and may acknowledge the receipt of
data to remote computers.

Network:- The network layer is used to route information between totally different nodes on the
network. It uses addresses to be ready to tell which pc to send information to. This layer may also
break apart larger messages into smaller chunks to be reassembled on the opposite end.

Data Link:- This layer is enforced as a technique of creating and maintaining reliable links between
totally different nodes or devices on a network using existing physical connections.

Physical:- The physical layer is responsible for handling the particular physical devices that are wont
to create a connection. This layer involves the bare software that manages physical connections also
because the hardware itself (like Ethernet).

As you'll see, there are many various layers that may be discussed based on their proximity to bare
hardware and also the functionality that they provide.

TCP/IP Model:-The TCP/IP model, a lot of commonly known as the internet protocol suite, is another
layering model that's less complicated and has been widely adopted. It defines the four separate
layers, a number of that overlap with the OSI model:

Application:- During this model, the application layer is responsible for making and transmitting user
information between applications. The applications is on remote systems, and may seem to operate
as if locally to the end user.

The communication is alleged to require place between peers.

Transport:- This layer is responsible for communication between processes. This level of networking
utilizes ports to address totally different services. It will build up unreliable or reliable connections
depending on the kind of protocol used.

Internet:- The internet layer is used to move information from node to node in a network. This layer
is attentive to the endpoints of the connections, however doesn't worry about the particular
connection required to get from one place to a different. IP addresses are outlined during this layer
as the way of reaching remote systems in an addressable manner.

Mainul Hayat Foysal BP0405529 26


Link: -The link layer implements the particular topology of the local network that allows the internet
layer to present an available interface. It establishes connections between neighboring nodes to send
information.

As you'll see, the TCP/IP model, may be a bit a lot of abstract and fluid. This created it easier to
implement and allowed it to become the dominant way that networking layers are classified.

For M2 - Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.

Ans:

Virtual servers:- Virtual dedicated servers or Infrastructure as a Service as it´s usually known is a
method of getting your own machine and while the top result's similar, the thanks to order one is
completely different. You start by registering an account (here at city Cloud), and once you have
confirmed your email and identity, you get access to our control board. From there, you only click on
“New VM”, choose the operating system and/or image (some of them come with pre-installed
software package ready to go) and wait a couple of minutes. That´s right, once a couple of minutes
you get a brand new virtual machine that may be accessed by SSH or VNC. The IP address is assigned
automatically therefore you have everything you need to begin installing software package.

Fig:-Virtual Server

The pros and Cons of Virtual Servers:-Virtualization is that the act of inserting multiple "virtual
servers" on physical instrumentation. this enables physical server resources to be split between
multiple workloads for optimum efficiency and cost savings. Virtualization usually happens within the
cloud or on servers that are owned, maintained, and located offsite. Hiring a hosting vendor who
offers secure cloud services is that the most typical method that organizations switch to virtualization.

Mainul Hayat Foysal BP0405529 27


Advantages of Virtual Servers:-

Fewer upfront prices, since you're not needed to buy hardware.

Potential for lower period prices on configuration and maintenance.

Access to skilled help on setup, configuration, maintenance, and software system licenses.

Reduced would like for in-house IT talent.

Potential to consolidate servers and increase work efficiency.

Reduced environmental footprint, because of shared workloads.

Disadvantages of Virtual Servers:-

Potential for higher recurring monthly prices, as opposed to higher upfront investment.

Possible problems with application compatibility, that are best mentioned with a
knowledgeable vendor.

Not all vendors are amenable to scaling your agreement up or down in tiny increments, that
mostly depends on vendor policies and repair level agreements (SLAs).

No longer severally in control of your physical server and therefore the applications running
on them.

Cost and system Requirement of Virtual Server: 1 – 16 core server, 32 GB of RAM, several 4-port
ethernet cards, 1 TB – 2 TB disk, for a complete of $45,196

physical servers:- A physical server is simply as the name says, a server (physical computer) on that
an operating system, like Windows or Linux runs even as on any other pc. The physical servers are in
the majority aspects like desktop computers, with several improvements that desktop PCs lack
featuring things like redundant power provides, raid controllers, multiple network cards etc. The
physical servers are larger in size with rather more powerful elements in general. all of them need a
separate space in the server rack. Most of the servers even have two or more physical CPUs with
multiple cores each.

Advantages of Physical Servers:-

IT team has full access to your dedicated server resources 24/7/365, which might be
advantageous for high-demand or business-critical operations.

The server could also be situated onsite or in a conveniently-located colocation facility.

IT employees will totally customize and configure the server to your specifications and
business needs.

Mainul Hayat Foysal BP0405529 28


Disadvantages of Physical Servers:-

Relatively high price of server purchase, maintenance, and in the case of hardware failure,
replacement.

IT employees are to blame for setup, configuration, and maintenance on a continual basis.

May need to rent a contractor or vendor for facilitate if you've got problem with configuration
or repairs.

Users cannot scale storage in tiny increments once reach the maximum work, since you buy
and own the hardware.

Requires physical or colocation space.

Cost and system requirement of Physical Server: -eight dual-core servers, 4 GB RAM, 1-2 ethernet
ports, 150 GB disk for $1,339 each, for a complete of $10,172

Tomcat:- Apache tomcat, is an open source net server and servlet container developed by the Apache
Software Foundation. Basically, it implements the Java Servlet and also the Java Server Pages (JSP)
specifications from Sun Microsystem, and provides a "pure Java" http net server surroundings for Java
code to run in. within the simplest configuration tomcat runs in a very single operating system
method. Runs a Java virtual machine (JVM) and each single http request from a browser to tomcat is
processed within the tomcat process in a very separate thread. Apache tomcat includes tools for
configuration and management, however may be configured by editing XML configuration files.

Apache:- Apache HTTP Server may be a freely-available web server software package that's
distributed under associate open source license. Apache HTTP server was formerly called Apache web
Server and has been offered since 1995 through the Apache software Foundation. The software offers
an extensible and secure net server with services in set with modern HTTP standards. HTTP Server is
compatible with most UNIX-based operating systems (such as mac OS, Linux, Solaris, Digital UNIX
system, and AIX), on alternative UNIX/POSIX-derived systems and on Microsoft Windows. Apache
HTTP Server was the most popular webserver from 1996 till June of 2016.While Apache still remains
one in every of the world’s most heavily-used webservers it lost market share to NGINX, Microsoft
and others since 2016.

Docker :- Docker could be a computer program that performs operating-system-level virtualization,


additionally called "containerization". it absolutely was 1st released in 2013 and is developed by
docker. Docker is employed to run software packages known as "containers". Containers are isolated
from one another and bundle their own tools, libraries and configuration files; they will communicate
with one another through well-defined channels. All containers are run by a single operating system
kernel and are so additional light-weight than virtual machines. Containers area unit created from
"images" that specify their precise contents. pictures are usually created by combining and modifying
standard pictures downloaded from public repositories.

For D1 - Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.

Mainul Hayat Foysal BP0405529 29


Mainul Hayat Foysal BP0405529 30
Reference:

Singh, C. (2018). Types of Network Architecture. [online] The Practical Dev. Available at:
https://dev.to/cadellsinghh_25/types-of-network-architecture-56i7 [Accessed 19 Nov. 2018].

Managed Services and IT Support Houston TX | Intellegens Inc. (2018). Pros and Cons of different
types of network topologies • Managed Services and IT Support Houston TX | Intellegens Inc. [online]
Available at: http://intellegensinc.com/pros-and-cons-of-different-types-of-network-topologies/
[Accessed 19 Nov. 2018].

Shekhar, A. (2018). Different Networking Devices And Hardware Types — Hub, Switch, Router,
Modem, Bridge, Repeater. [online] Fossbytes. Available at: https://fossbytes.com/networking-devices-
and-hardware-types/ [Accessed 19 Nov. 2018].

Beal, V. (2018). Server Types - Webopedia.com. [online] Webopedia.com. Available at:


https://www.webopedia.com/quick_ref/servers.asp [Accessed 19 Nov. 2018].

Fcit.usf.edu. (2018). Chapter 2: Protocol. [online] Available at:


https://fcit.usf.edu/network/chap2/chap2.htm [Accessed 19 Nov. 2018].

Fcit.usf.edu. (2018). Chapter 3: Hardware. [online] Available at:


https://fcit.usf.edu/network/chap3/chap3.htm [Accessed 19 Nov. 2018].

Fcit.usf.edu. (2018). Chapter 4: Cabling. [online] Available at:


https://fcit.usf.edu/network/chap4/chap4.htm [Accessed 19 Nov. 2018].

Fcit.usf.edu. (2018). Chapter 5: Topology. [online] Available at:


https://fcit.usf.edu/network/chap5/chap5.htm [Accessed 19 Nov. 2018].

Fcit.usf.edu. (2018). Chapter 6: Software. [online] Available at:


https://fcit.usf.edu/network/chap6/chap6.htm [Accessed 19 Nov. 2018].

Stroud, F. (2018). What is a Server Operating System? Webopedia Definition. [online] Webopedia.com.
Available at: https://www.webopedia.com/TERM/S/server_operating_system.html [Accessed 19 Nov.
2018].

Beal, V. (2018). The 7 Layers of the OSI Model - Webopedia Study Guide. [online] Webopedia.com.
Available at: https://www.webopedia.com/quick_ref/OSI_Layers.asp [Accessed 19 Nov. 2018].

Mainul Hayat Foysal BP0405529 31


Thank You

Mainul Hayat Foysal BP0405529 32

S-ar putea să vă placă și