Sunteți pe pagina 1din 26

Networking Concepts Assignment 1 4/9/2010 NESCOT Daniel Rotaru

Networking Concepts
Assignment 1 Daniel Rotaru

Table of contents.......................................................................................page 2
P 1.1 Produce a report outlining how a network will benefit an organisation such as We Care. Include in your report possible disadvantages, the management needs to consider, when considering setting up a network........................................................................................page 3 Network evolution uses..........................................................................................page 3 LAN (local area network).......................................................................................page 3 Client server architecture.....................................................................................page 4 The MAC media access control.............................................................................page 5 File sharing in a LAN. ...............................................................................................page 5 TCP/IP and IP addresses .........................................................................................page 6 The MAN Metropolitan Area Network...............................................................page 7 WAN wide area network..........................................................................................page 7 Defining WAN Encapsulation Protocols.............................................................page 8 The advantages of designing a network.............................................................page 8 The disadvantages of the network........................................................................page 9

P1.2 Within the report evaluate the cost performance , security and utility values associated with the installation of a new network taking in the consideration their current IT audit...................................................................................................................................page 9 The function of LAN hardware.....................................................................page 9
The main types of LAN devices.................................................................................page 9

The network developing cost........................................................................page 10 P 1.3The current IT structure is running both Windows 2003 Server and Ubuntu Server on their servers. Provide an overview of the two network operating systems elaborating their key features and how they work by creating a power point of no more than 15 slides..........................................................................................................................................page 14 Ubuntu server and Windows 2003 Power Point.....................................page 14-22 P 2.1 Create a networking diagram that fits on 1 side of A4 of your proposed LAN showing all software and hardware components .Justify its fitness for purpose..... Network Diagram.....................................................................................................page 24 Explanation of the Devices on the network.................................................page 25

References..................................................................................................................................page 26

Page 2 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

P 1.1 Produce a report outlining how a network will benefit an organisation such as We Care. Include in your report possible disadvantages, the management needs to consider, when considering setting up a network. Network evolution uses In order to explain why a network will benefit this organisation I will look at the function of the company, asses how everyone will have access to their data according to their role in the company, and the network suitability for the staff needs. At the moment the company has 5 branches, but only one has a setup LAN (local area network).The company purpose is to provide services for care homes. The total number of employees is 197.They all need to update the health datasheet provided by Home care services. The future predicts the expandability of another 4 branches. One of the reasons for the setup of the network is the access of the data from different sites, update of track sheets for patients and ease of functions such as emergency services, document printing access to the internet, interoperability of software etc. In order to facilitate the needs of the staff many factors must be taken in the consideration such as: The access and exchange of data from any of the branches! How to connect all the branches LAN`s? The level of accessibility to the data(different staff has different status in the company ) What medium of connectivity will be between the LAN`s?

My idea about developing the network is to use the existing LAN in Leatherhead and develop small LAN`s in each of the other 4 existing branches and connect them to the central office by creating a MAN (metropolitan area network). Now that the purpose has been set I will define the meaning of the LAN and MAN explaining how each works. LAN (local area network) is defined by the way that the nodes are linked to each other either physically or logically through wires or wireless. A node is any device that is connected to the network (pc. printer, server etc.).A big consideration must be taken when choosing a topology because of the way that the devices are linked: peer-to-peer (the devices share the link equally) or primary-secondary (where one device control traffic and the others must transmit through it).

Page 3 of 26

Networking Concepts
Assignment 1 Daniel Rotaru Information cumulated from; Data Communication and Networking, By Behrouz A.Fouzan et al, second edition, ISBN 0071181601, page 22-28. The main types of topologies are:

(Behrouz.A. et al, Data Communications and Networking, second edition, p22-28) My recommendation in the choice is the tree topology because in comparison with other topologies it is more robust, is easier to fault find and control from the administrator point of view. The other perfect choice would be meshed, but the cost will be higher. Client server architecture Tree-is a variation of the star topology where the devices connect not only to a central hub, but there are devices that connect to secondary hubs .The central hub is an active hub that contains a repeater. The repeater allows regenerations of bits patterns before they are sent out and results in increased travelled distance of the signal. The secondary hubs can by active or passive (provides only a physical connection).The main advantage of this topology is that allows to prioritise communications from different computers and because the central hub it propagates the signal better. The standard that governs the LAN`s is 802.2 Logical Link Control common to all LAN Error and flow control over data frames with logical addresses. The LLC contains:

Page 4 of 26

Networking Concepts
Assignment 1 Daniel Rotaru PDU-protocol data unit that has; DSPA( destination service access pointindicates whether a frame is intended for an individual group ) and SSAP (source service access point-indicates if the communication is a response or a command) Control field that carry all the codes and information In order for every node on the network to share the same transmission media in a constant way, a media access is needed. The MAC media access control. Is responsible for running the signalling protocol, determined by the appropriate standard. The main characteristics of the MAC protocol are packet format (size, headers), channel access mechanisms and network management. The two channel access mechanisms used by the MAC protocol in wireless LAN systems is carrier sense multiple access/collision avoidance (CSMA/CD) and Polling MAC. A channel access mechanism is the part of the protocol that specifies when to listen, when to transmit. The basic principles of CSMA/CA are to listen before talk and contention. Its main advantages are that it is suited for network protocols such as TCP/IP, adapts quite well to variable traffic conditions and is quite robust against interference. Therefore the wireless MAC protocol tries to avoid, instead of detecting, collisions. Applied MAC. On every network interface adaptor card there is a set of computer chips that handle communication with the physical media (copper wire, fibre optic cable or the air) by controlling the communication signal (electricity, light or radio frequencies) over the physical media. The MAC address identifies a specific network device and must be unique on a given LAN. The first 12-bit portion of the MAC address identifies the vendor of the network device; the last 12-bit portion identifies the unique ID of the device itself. The MAC control field contains all information used for flow control, connection establishment and teardown as well as error control. The content of the fields is dependent upon the specified standards for that particular data link layer protocol (Ethernet, Token Ring, FDDI etc.) The source MAC address field contains the MAC address of the transmitting device, and the receiver

Page 5 of 26

Networking Concepts
Assignment 1 Daniel Rotaru File sharing in a LAN. One method of sharing files internally can be done by adding through the server all of the individual PC or device (printer etc). All of the devices will be added to a list with the help of the MAC will be easier to identify. The setup can be done manually (takes time) or a software that detects all the devices from the network and supervises the health of each device. The steps to achieve this are as follows: Set an user interface of a client as a first environment configuration Connect the client to the main server Setting the configuration settings with the server Transmitting one of the environment parameters from the server to the client Change the parameters to suit the client server architecture (purpose) The best way is through a web server that stores all assessment data. A web-based interface (Portal) allows employees to login and complete their assessments and view their reports from different locations. Authorised managers can log in and view management reports on their staff, or the whole organisation. As the name suggests the access must be done trough internet browser. The TCP/IP will be the protocol that is implemented through internet to send data such as Email or documents. TCP/IP is TCP and IP work together where: -TCP takes care of the communication between the application software and network software (by breaking and assembling the data down to IP packets) -IP takes care of the communication with other computers and is responsible for sending the packets to the correct destination. TCP/IP uses 32 bits, or four numbers between 0 and 255, to address a computer. One computer byte is 8 bits. So TCP/IP uses 4 computer bytes. IP Addresses

Page 6 of 26

Networking Concepts
Assignment 1 Daniel Rotaru Each computer must have an IP address before it can connect to the Internet. Each IP packet must have an address before it can be sent to another computer. Each computer must have a unique IP address. When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information. Each of the intermediate routers consult the IP address of each packet received. Based on this, each will know exactly in which direction to forward the packet. Normally, each router has a routing table, where data about the neighbouring routers is stored. This data is used to calculate and decide where to send the packets. The packets go each one its own way and can move through different networks and take different paths. They all finally get routed to one same destination machine. The packets will be consumed by the machine, where the IP module on it will reassemble them and send the resulting data above to the TCP service for further processing.

The MAN Metropolitan Area Network 802.6 Metropolitan Area Network -MAN Technologies, addressing, and services is addressed trough the protocol DQDB-distributed queue bus that uses a dual bus configuration. Each device connects to two backbone links through a mechanism called distribution queues. The data is transmitted when a slot is captured in the downstream direction only. This system works whit FIFO (first-in, first-out0ques that gives an equal chance of transmission. DQDB works in the physical layer, MAC sub layer and it defines the electronic devices, media and data rates. WAN wide area network Wide area networks (WANs) provide data connectivity over much bigger distances than the local area network. Data rates on WANs are lower because in many cases WANs are transported over the PSTN voice channels, either analogue or digital. In both cases there are limited bit rate capacities. The telephone companies deploy WANs to service large regional areas or the entire nation. Many companies have their own private WANs to link

Page 7 of 26

Networking Concepts
Assignment 1 Daniel Rotaru remote offices, or they use the Internet for connectivity. Of course, the Internet is the worlds largest WAN.

Defining WAN Encapsulation Protocols Point-to-Point Protocol (PPP)PPP (Pope, PPPoA) originally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links. PPP also established a standard for the assignment and management of IP addresses. Authenticationthe process of identifying an individual, usually based on a username and password Customer premises equipment (CPE) encapsulates PPP sessions based on this RFC for transport across the ADSL loop and the digital subscriber line access multiplexer (DSLAM). Access controlCompany information must be restricted, allowing users access only to areas in the network for which they are authorized. For example, access lists can filter out unauthorized data flow between offices. PPP network links, such as PAP and CHAP, can identify the remote entity to prevent unauthorized network connection. SOHOs and branch office users gain access to secure sites through the use of VPN technologies. The advantages of designing a network. In this case we must adapt different technologies in order to accommodate more LAN`s on the same network. The advantages can be classified as follows: The administrator has a choice for topology The design will be done to suit the company needs There will be easy to access nodes from the server and make changes in programs The fault finding will be assessed in most cases from the network administrator office through remote access Quotes will be given to staff to accommodate their level of expertise

Page 8 of 26

Networking Concepts
Assignment 1 Daniel Rotaru Network manager will decide upon the most economical way of setting a MAN (in this case it will be through ISP) The network manager can set the security on the network

The disadvantages of the network The administrator has to review the existing devices and do the best he can with what he has in order to keep the cost to a minimum Some of the hardware or software might be outdated and needs updating If the internet connection is interrupted then communication from other location to the main servers will be not achievable The staff will need training with the changes made in the access P1.2 Within the report evaluate the cost performance, security and utility values associated with the installation of a new network taking in the consideration their current IT audit. The function of LAN hardware. Data acquired from Data Communication and Networking, By Behrouz A.Fouzan et al, second edition, ISBN 0071181601, page 613-638 Internetworking Devices In order to have LAN that work there must be at least two devices connected with the purpose of sharing data. The types of devices will depend on the distance between them, the number of devices on the network, the clarity of the signal compatibility and others. If two or more LAN`s are connected than different devices will be necessary to form an internetworking. Each device interacts with protocols at different layers of the OSI (discussed in detail in assignment1). The main types of LAN devices REPEATER is an electronic device that operates at the physical layer of the OSI and has the role of receiving a signal (before losses his strength or corrupted), regenerates the bit pattern and releases the refreshed copy back on the link. The distance between the Page 9 of 26

Networking Concepts
Assignment 1 Daniel Rotaru transmitted signal and the repeater is vital because of the noise that can destroy the originality of the bit pattern. BRIDGE can be used to divide a large network in small segments and they can also relay frames between separate LAN`s. They operate in the physical and data link layers through addresses to all devices connected. They have logic that filters the traffic and offer a good security. The bridge not only repeats the bit sequence, but also knows where it came from and where to be directed only to the specified address. Each bridge must have incorporated a table with all the addresses of the devices that are connected through to know where to direct the data. Types of bridges include: Simple bridge where the addresses must be installed manually. Multiport bridge used to connect more than two LAN`s .It has tables for each port there is an physical address. Transparent bridge where the address is automatically updated with any address of any new device connected through. The bridge can connect LAN, but they must be governed by a Spanning Tree Algorithm or

by Source Routing where the source defines the path of transmission for the data.
Bridges have several issues at the data link layer when they connect two different networks (Ethernet and Token Ring) such as: The frames from each network are different in their format The size of the data in a frame depends from protocol to protocol(payload size) If the data rates differ between the networks, the bridge must buffer and compensate to achieve the same data rate exchange The bit order of addresses is different .Egg. An address should be reversed if it connects an Ethernet LAN to a Token Ring LAN. There are many factors that must be addressed when a bridge is involved between different networks such as:-ACK, collision, priority and other differences between The LAN`s protocols.

Page 10 of 26

Networking Concepts
Assignment 1 Daniel Rotaru ROUTERS are sophisticated devices that have address access through software contained and they operate in the physical, data link and network layers of the OSI. They make possible the transfer of data from one device to another based on the destination address. Because routers act as stations on the network they have links to different networks that allows them to route the data to the related address through the best found (fastest) route. They are two ways to calculate the shortest path between routers: Distance vector routing where periodically the router is sharing his knowledge about the network with the neighbouring routers Distance vector routing where the router has a table with predetermined information about the network such as cost, ID and the router to access a particular network. EG when data is sent from a network device to a different network the router receives the data and switches to the destination network. If the router cannot find the destined router from the destination network than it will pass the data to a different router and the data will travel until it finds a route for the final address. Routing can be adaptive (the data is sent from router in packets on different networks) and nonadaptive (once a path is established the data will be transmitted through). Because the routers decide what is the fastest way for a packet to travel, there might be a danger of packets not reaching their destination due to a possible loop. In order for the data to be destroyed and the frame resent an added packet called Packet Lifetime or Time to Live

(TTL) that is market with a number (represents the number of loops allowed before the packet is considered lost and destroyed).
Switch are very similar to bridges but allot more efficient .They can act as a multiport bridge to connect devices or parts in a LAN through buffer for each link that is connected. When it receives a packet it stores it in the buffer and checks the address. The Switches are:-Store and forward switch (stores the frame until all packets has arrived)

Page 11 of 26

Networking Concepts
Assignment 1 Daniel Rotaru -Cut-Trough-Switch forwards the packet to the output buffer once he has received the destination address. In order for the data to be transmitted on the right port the CPU together with the control unit consult the switching table .After the address has been found the buffered frame is sent for transmission. Workstations are devices on the network that are at the end of the user such as PC`s, laptops etc. Server- is very similar to a computer, but is allot more powerful in the way is set up. The name server suggests that it serves something. In a network he administrates all of the computers or other devices, through software. Many applications are controlled from the server.

The network developing cost


The existing company has hardware that allows all the current staff access to the network as follows: Main servers x2 Secondary /backup servers x3 Workstations x120 Laptops :20 =0.72 units

The company has a total of 197 employees .The calculated ratio of workstations is per person.
Title of network device Main server Backup server Workstations Laptops Existing Units number 2 3 120 20 Price per unit in 1800 1200 300 450

Total price 3600 3600 36000 9000 Total Inventory Price 52200

Page 12 of 26

Networking Concepts
Assignment 1 Daniel Rotaru Although this are the major components of the network many devices and software packages have be have been omitted. After an entire review the list with all the components looks as follows.

Title of network device Main server Backup server Workstations Laptops Router Printer Transparent bridge Cat 5 cable Extension lead 5 outlets Software with business multiuser licence Windows XP professional Windows server 2003 Ubuntu server Microsoft office 2003 Adobe IGX/BPX Cisco auto-routing Norton security Other extras Total Inventory price

Existing units Price per unit in Total price in 2 3 120 20 2 10 8 180 45 1800 1200 300 450 500 60 200 5 10 The software is all part of a package paid one of acquired at the original setting of the network 3600 3600 36000 9000 1000 600 1600 900 450

2 2 2 2 2 2 2

The Total price of software is 8000 2000 3000 70300

As seen in the above when a new administrator is appointed he becomes liable to assess all the components in the network. He also needs to have a very good knowledge in both Hardware and Software. The existing network is well designed, but some of the hardware and software will need changing. Some of the proposed changes are as follows: First the transparent bridges although good it will be better for the network if they could be replaced by switches The Main servers will be set in a well ventilated room, with access only by the network administrator. Physical protection of the devices on the network will be implemented (locks).

Page 13 of 26

Networking Concepts
Assignment 1 Daniel Rotaru Microsoft office has a newer version (2010) that has many more features and will help the business through a professional finish of the documents, reports and other written data. This in turn will show the seriousity and good organisation against other competitors. The present provider of the leased line is quite expensive and there is the option of changing to a business DSL ,that will decrease the price and allow to set up a VLAN (virtual LAN) where all the LAN`s on the network can connect through the internet. The cost will be dramatically reduced and data can be transferred at high speed between different sites of the company. The user will be able to access their specific tasks and upgrade the reports from anywhere as long as they have a username and password, access to the internet that will allow them to enter the private VLAN. All the staff will have to be trained to know how to use the new software and how to logon on to their specific site. The security of the data entered will need upgrading as the Internet has many possible viruses. P 1.3The current IT structure is running both Windows 2003 Server and Ubuntu Server on their servers. Provide an overview of the two network operating systems elaborating their key features and how they work by creating a power point of no more than 15 slides.

LINUX server and WINDOWS 2003server

Characteristics

Page 14 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Purpose of an Operating System


To manage hardware and software resources in a system Memory, processor, disk space, programs To ensure the system behaves in a predictable way To provide a stable, consistent high-level interface to the hardware Individual applications do not need to know hardware implementation details

When is an Operating System Needed?


When you want to abstract away from the hardware You want your program to run on different hardware platforms When systems must be multi-functional To run different kinds of programs
An operating system is not needed when the system does only one thing and flexibility is not needed. E.g., a microwave

Page 15 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

The Ubuntu Server System requirements


It requires a minimum of 128Mb of RAM and 1Gb of disk space. Depending on your needs, you might manage with less than this. Ubuntu Server integrates with existing operating systems allowing reproducible, hardware-independent deployment scenarios that can be easily adapted to match virtually every need. This is achieved through the flexibility of the kernel. To do this, it is customary to setup one machine as a DHCP/TFTP/HTTP(main) server that provides the configuration information for installation over the network.

Ubuntu characteristics
Uses the Debian Installer and Kick-start during the install comprehensive process to automate and personalise the installation process. Is optimised to run in a virtual environment through IO drivers and usage of hardware features. Has an easy to set up mail server based on Postfix and Dovecot two known open source packages. The Bind9 package allows to act as a DNS Domain name server and dynamic host configuration server or resolver as well as providing enhanced security , protocol enhancement .

Page 16 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Ubuntu Characteristics
The ISC's DHCP3 packages included in Ubuntu can distribute all network-configuration to clients as well as act as a relay agent for other DHC servers. Has the boot info function to perform network boot for PXE enabled machines, when used in conjunction with tftpd-hpa, thus allowing automated deployments. Has implemented OpenVPN package a solution that creates secured (encrypted) connections between networks, allowing secure remote access or providing Wifi security by using encryption mechanism SSL/TLS and can be combined with multiple forms authentication .

Page 17 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Ubuntu Characteristics
Authentication Authorisation and Accounting (AAA)is achieved through Free Radius package that provides access control and auditing services to most network equipment including routers, remote access servers, proxies and VPN. It also provides a client framework so that services can be easily enabled. It can work with LDAP (OpenLDAP or others) and SQL back ends (including MySQL and PostgreSQL) to check credentials or authorisations and store accounting logs, with duplication and fallback mechanisms.

Ubuntu Characteristics
Monitoring is achieved through information collected by Munin and can be presented graphically through a web interface that trigger alerts . BackupPC is a high-performance, enterprise-grade system for backing up Linux and WinXX PCs and laptops to a server's disk. Network UPS Nut permits one server to monitor the UPS and notifies the other servers connected to the same UPS when the UPS is on or has a low battery, allowing them to smoothly shutdown before complete loss of power, thus avoiding critical data loss that could occur otherwise.

Page 18 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Ubuntu security methods


Ubuntu does not install default services that listen on open network ports by default. This reduces the chances that a system would be compromised. Role-based administration allows for better security, error prevention and auditing(useful on systems where more than 1 user might have been given root access). No X server by design or any graphical desktop applications. It is believed that most servers should be serviced remotely, are safer without the addition of code that needs direct communication from user space to hardware.

Ubuntu security methods


Updates when necessary Security can also be greatly enhanced through the use of mandatory access control (MAC) rules provided by AppArmor. It allows the system administrator to associate each programme with a security profile which restricts the authority and access rights of that programme. Uncomplicated Firewall ufw is a command line utility that does make it very simple to add host based rules protection for the server. In order to maintain backward compatibility, ufw is disabled but installed by default, and enabling it is just a command away.

Page 19 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Windows server 2003 features


Windows Server 2003 implements fault tolerance features through memory mirroring support, ensuring that no memory failure will bring down the system; Hot Plug PCI technology for adding PCI cards without shutting down the server; Hot Add Memory, for adding memory ; load balancing and failover; and multi-path IO for storage. Windows Server 2003 supports up to 256 GB of RAM, and technologies such as hyper threading and NUMA (Non-Uniform Memory Architecture), which allows Windows Servers to be partitioned like a mainframe.

Windows server 2003 features


Interoperability - Microsoft's interoperability story revolves almost solely around Web services, also the 32-bit and 64-bit Windows Server 2003 products are completely interoperable. Security-Windows Server 2003 includes a secure VPN gateway, a new secure wireless standard called 802.1x, and a standardsbased TCP/IP infrastructure, including support for DNS, DHCP, NAT, and IPv6. Software Restriction Policies (SRP) feature lets administrators determine which applications can and can not-execute in their environment. Windows Server 2003 also supports Smartcard technologies, so that admins can logon with a normal account but swipe the card when they need to perform secure administrative tasks under admin privileges.

Page 20 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Windows server 2003 features


Windows Server 2003 supports communications technologies, including IPv6, network bridging and Internet Connection Sharing (ICS), IPSec,IP over Firewire, and so on. Remote access is common now that almost everyone use VPN (Virtual Private Networking) AD(active directory) has many UI improvements, including drag and drop capabilities, multiple object selection and editing, saved queries, and other refinements. Easier deployment and configuration supports Remote Installation Services (RIS) = rapid installation of a small number servers. Manage Your Server and Configure Your Server wizards simplify the process of assigning server roles, a new concept for this release: You might configure a server to be a file server, print server, Web server, and so on, and can easily assign multiple roles where appropriate.

Windows sever 2003 Features


Staying up to date and secure supports Software Update Services and Auto Update. The Software Restriction Policies (SRP) feature creates a virtual box that prevents unauthorized code execution. SRP is policy-based. Managing many as one Group Policy Management Console (GPMC) provides a scriptable interface for managing group policies that integrate with Resultant Set of Policies (RSoP), which lets admins generate reports to view and test what policies have been applied to specific users and machines.ng them live. File System and Storage includes Volume Shadow Copy Service (VSS) and various improvements to the NTFS file system and storage subsystem. For the first time Microsoft has created a backup framework, that can be extended by third parties.

Page 21 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Windows server 2003 features


Other file system and storage improvements include deep SAN support, Virtual Disk Service , Automated System Recovery command line disk defragging that now supports any cluster size, a dramatically enhanced Check Disk Terminal Server supports two modes: A single user mode for administration purposes, and a multi-user mode for full Terminal Server functionality, where users are accessing a desktop or specific applications remotely. WMI and Group Policies, better scalability, and a new Remote Desktop Client, which supports execution of remote desktops within a window, an IE browser, or the MMC. Application Server include the .NET Framework and its support for ASP .NET, ADO .NET, and related technologies. Essentially, it's that portion of the OS that lets Windows Server act as the middle tier of a multi-tier application and services infrastructure.

Ubuntu server and Windows server example of services


SMTP, LMTP & QMQP protocol support for mail routing and delivery Delivery Status Notification IPv6 support MIME encoding Pipelining of multiple message in the same connexion SASL (through Dovecot plug-in) TLS support for encrypted connection Multiple Junk mail control features and plugging Multiple database support (SQLor LDAP based) Maildir and mailbox formats for storing emails Virtual domains support Address masquerading and rewriting

File server Print server Application server(IIS, ASP.NET) Mail server (POP3, SMTP) Terminal server Remote access/VPN server Domain controller (Active Directory) DNS server DHCP server Streaming media server WINS server

Page 22 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

Conclusion
The Software used by people is entirely their choice ,but most of the servers offer similar services or dedicated services specific for the user needs. In our case the Servers compared previously offer interoperability ,great security , upgradability ,stability, user policy or group policy , and make the networking process allot easier from the administrator point of view.

References
1) Paul Thurrott,2002, Windows Server 2003 Review Article found at http://www.winsupersite.com/reviews/winnetserver_r c1.asp, accessed on 27.04.2010 2) Ubuntu organisation,2010,Ubuntu-linux server features , article found at http://www.ubuntu.com/products/whatisubuntu/server edition,accessed on 24.04.2020

Page 23 of 26

Networking Concepts
Assignment 1 Daniel Rotaru P 2.1 Create a networking diagram that fits on 1 side of A4 of your proposed LAN showing all software and hardware components .Justify its fitness for purpose.
Different Location

WAN
High Speed Back bone Fibre optic DSL service with VPN Access

LAN 4

LAN 3

Provider Exchange

DSLAM and Provider exchange

UPS UPS VDSL Locked administrated servers

Locked Main servers Desktop PC Firewall Cloud Internet Wireless Multifunction al device

Firewall

Secondary server All in one Printer

Router

LAN 2

PDA

Personal device

Wireless projector

Administrator LAN 1 Wireless Desktop PC

Wireless Laptop

MAC computer User User Laptop User

Page 24 of 26

Networking Concepts
Assignment 1 Daniel Rotaru Explanation of devices in the above LAN `s: Mac computer, Desktop PC, Laptop and PDA are workstations on the LAN where a user can access the data necessary, through applied software and the internet. From workstation the data can be transmitted and received on the network. Multifunctional Printer is connected to the network through either a router or a server and has different roles such as printing, scanning, copying. All the above are connected to the Server through either a switch, router or directly to the server through Cat 5 cable. The server is vital as all the interoperability (hardware and software) of the network will need to connect, store data and exchange securely data inside the LAN but also on the internet. UPS Uninterruptible power supply has the role of maintaining the hardware power up in case of power cut .This helps to keep the server safe and the data also on the system. Network software and DSL technology The DSL technology has been adapted on to the POTS plain old telephone service and offers great bandwidth through implemented technology at ends, exchange and customer. From the client the analogue signals are separated by an ADSL splitter (filter) with the help of DMT multi-carrier modulation method that divides the signals that pass through different frequencies. One will provide the phone line and the others will be used for all other. From the splitter the analogue signal is quantised and will go through a modem that will transform the analogue signals into digital data(1 and 0) recognized by digital devices(PC)that in turn will display the data received. VDSL Very High Data-Rate DSL needs shorter cable lengths than most other forms of DSL (maximum 4,500 feet as compared to 18,000 feet for regular ADSL), but it also achieves the highest data rate (roughly 51,840 kbps). Connectionless communication as the name implies does not require a to establish a connection and is very simple because it only sends the data, but it has no confirmation of delivery. The only way of knowing if the data has reached its destination is if the recipient sends a reply and the reply is not lost .The main advantage of this system is that is fast, cheaper, but less reliable( UDP) The protocol that implements both TCP (Transport Control Protocol-connection oriented) and UDP (user Datagram Protocol-connectionless) is IP .The IP is providing a route for their data packets to reach their destination. IP (internet protocol) uses logical addressing to deliver data on a complex routed network to a specific device depending on the IP address .IP has a format that consist of:

Page 25 of 26

Networking Concepts
Assignment 1 Daniel Rotaru

References; Behrouz A.Fouzan et al ,Data Communication and Networking, second edition, ISBN 0071181601, page 22-28(topology) Behrouz A.Fouzan et al ,Data Communication and Networking, second edition, ISBN 0071181601, page 22-28(topology) page 369-421 Project 802 Behrouz A.Fouzan et al ,Data Communication and Networking, second edition, ISBN 0071181601, page 613-638 Internetworking Devices Media Access Control(MAC) ,article accessed at http://www.inetdaemon.com/tutorials/networking/lan/ethernet/mac.shtml Page accessed on the 13-04-2010 Paul Thurrott,2002, Windows Server 2003 Review ,Article found at http://www.winsupersite.com/reviews/winnetserver_rc1.asp, accessed on 27.04.2010 Ubuntu organisation,2010,Ubuntu-linux server features , article found at http://www.ubuntu.com/products/whatisubuntu/serveredition,accessed on 24.04.2020 William Stalling- Data and Computer Communication, seventh edition 2004 by Pearson Incorporation inc., p 215-220 Image found at http://www.uni-muenster.de/ZIV.Film/ziv/07_VPN-Verbindung.flv.jpg, Accessed on 26-05.2010

Page 26 of 26

S-ar putea să vă placă și