Name :-Mainul Hayat Foysal Course :-HND in Computing Passport No :-BP0405529
Mainul Hayat Foysal
BP0405529
1
For P1 - Discuss the benefits and constraints of different network types and standards.
Ans:-
Peer-based :-In this network all computer are connected with each other via the internet and they can transfer or shear file directly between system on the network without any central server .
Fig:- Peer based
Benefits of peer- based network:-
Low cost Simple to configure or setup User has full accessibility of the computer Constraints of peer-based network:-
May have duplication in resources Difficult to uphold security privacy Difficult to handle uneven loading
Client-server:- In this network all workstation and personal mobile, computer ,printer are connected with server via hub and internet. Clients can access all data and run any program from server.
Mainul Hayat Foysal
BP0405529
2
Fig :-Client Server
Benefits of Client-server network:-
Centralized system. all data in one place Server can be accessed administrator Back and recovery possible Security can be configured to manage account Constraints of client-server network:-
High cost of server Need expert to configure the network Cloud based network:-It is a type of networking which gets their access from a third-party provider using Wide Area Networking (WAN) and in this networking the network can be shared as well as the computing resources.
Mainul Hayat Foysal
BP0405529
3
Fig:-Cloud based network
Benefits of Cloud based network:-
Cost efficiency Storage and Scalability Backup and recovery Mobility Reliability Constraints of cloud based network:-
Control Security and Privacy Compatibility Downtime Centralized network:- In this network all users are connect connect to a central server. This network work as an agent for all communications. User account information and communication both would store in this server.
Mainul Hayat Foysal
BP0405529
4
Fig:-Centralized Network Benefits of Centralized network:-
Centralized system Easy to use Server keep all information Easy to control Constraints of centralized base network:-
The possibility of complete failure Not possible to use different operating system Security problem It create centralized targets Virtualized network:- virtualized network’s main focus is to enable a data center or internet service provider to provision the most suitable and efficient network for the application server.
Mainul Hayat Foysal
BP0405529
5
Fig:-Virtualized network Benefits of virtualized network:-
Easy to backup and recovery r ecovery Reduce of spending Easy to maintain Constraints of virtualized network:-
Problem of software licensing consideration High cost Security risk IEEE 802.1X network:- This network is part of the IEEE 802.1 group of networking protocols and IEEE standard for port-based network access control.
Mainul Hayat Foysal
BP0405529
6
Fig:-IEEE 802.1X network Benefits of IEEE 802.1X network:-
Easy to management management Easy to use Scalability Security Constraints of IEEE 802.1X network:-
Network access High cost Conceptual network:- A conceptual network is an analytical tool with many variations and contexts. It may be applied in several classes of work wherever an overall image is required. it's wont to create abstract distinctions and organize concepts. Benefits of conceptual model:-
The situation is avoided whereby standards area unit developed on a patchwork basis, wherever a specific accounting problem is recognized as having emerged, and resources were then channeled into standardization. standardization. As explicit above, the development of sure standards (particularly national standards) are subject to considerable political interference from interested parties. wherever there's a conflict of interest between user teams on that policies to settle on, policies account from a abstract framework will be less open to criticism that the standard-setter buckled to external pressure.
Mainul Hayat Foysal
BP0405529
7
Some standards might concentrate on the financial statement whereas some might concentration the valuation of internet assets (statement of economic position)
Constraints of conceptual network:-
Financial statements are supposed for a spread of users, and it's not certain that a single abstract framework framework is devised which will suit all users. Given the range of user needs, there is also a necessity for a variety of accounting standards, every made for totally different purpose (and with different ideas as a basic). It isn't clear that an abstract framework makes the task of preparing and so implementing standards any easier than while not a framework
For P2 - Explain the impact of network topology, communication and bandwidth requirements.
Ans:- The volume of data that may be transferred across a network at a given time is named its bandwidth. a rich, high bandwidth network is able to transfer data is faster than a low bandwidth one. The bandwidth is established by the kinds of network cards and modems used also as the amount and kind of cable used. Also, the approach in which computers are connected together to form a network has a massive impact on its speed and potency. There are a number of various ways that to connect computers in a network - however these are the most common network topology-
Bus Topology:- it’s a multipoint type of connection .
Fig:-Bus topology
Mainul Hayat Foysal
BP0405529
8
Alternatively stated as a line topology, a topology may be a network setup in which every pc and network device are connected to a single cable or backbone. depending on the kind of network card used in every pc of the bus topology, a coaxial cable or a RJ-45 network cable is used to connect computers together.
Advantages:
Easy to install, use for small network Cheap Easy to Expand Disadvantages:-
Slow speed as only one system can transmit at a time Fault cable bring down in whole network Ring Topology:- In this each computer is connected to the next computer with the last one connected to the first.
Fig:-Ring Topology
Advantages:-
Mainul Hayat Foysal
BP0405529
9
Multipoint data connection Token passing is used in this network Disadvantages:-
Fault in any link disables entire network Difficult to troubleshoot Star Topology:-All the wires from the computers go to a center location having a device called Hub.
Fig:- Star Topology
Advantages:-
All connection goes through HUB Easy to use Disadvantages:-
If central HUB fails, whole network fails Cabling cost is more Mesh Topology:-In this each device has a dedicated point to point link to every other device.
Mainul Hayat Foysal
BP0405529
10
Fig: Mesh Topology Advantages:-
Point to point connection No traffic problem Failure of one link doesn’t effect entire network Secure and private Easy to fault diagnose Disadvantages:-
Expensive Tree topology:-This network is variation of Star Topology.
Mainul Hayat Foysal
BP0405529
11
Fig:-Tree Topology
Advantages:-
Linked to central HUB Disadvantages:-
Expensive On failure of central HUB, entire network breaks down
Mainul Hayat Foysal
BP0405529
12
Hybrid Topology:- it is the most complicated topology in computer network.in this network multiple physical topologies are combined to form one large network.
Fig:- Hybrid Topology
Advantages:
Useful for larger network Handles large volume of traffic Easy to detect and remove fault Disadvantages:-
More cable required then other topology Expensive Complex structure
For P3 - Discuss the operating principles of networking devices and server types.
Mainul Hayat Foysal
BP0405529
13
Ans: operating principles of networking devices – Router:-It’s a networking device. it’s forwards data packets between computer networks.
Fig: Router Switch: it’s a computer networking device and its connect devices together on a computer network by using packet switching to receive, process and forward data to the destination device.
Fig:- Switch Firewall:- A firewall is a system designed to stop unauthorized access to or from a non-public network. It’s a specialized version of router.
Fig:- Firewall
Mainul Hayat Foysal
BP0405529
14
Wireless device:- wireless device is a network that enables devices to connect and communicate wirelessly.
Fig:-Wireless Device Access point:-Access point is allows wireless devices to connect to it by means of the antennas.
Fig:-Access Point Terminal:-It is a hardware interface between a computer and ISDN line. A terminal adapter slight like a modem. Different types of server:Client server:- In this network all workstation and personal mobile, computer ,printer are connected with server via hub and internet. Clients can access all data and run any program from server.
How does it works:- suppose a client sitting at a restaurant. r estaurant. he's waiting for the server to come by and take his order. a similar rules apply in a client-server network; the client, which may be a laptop computer, desktop, a smartphone, or just about any computerized device, will create a request from the server. The consumer uses the network as the way to connect with and speak to the server. even as the client speaks to his server, the consumer uses the network to send and receive communications communications about its order, or request. The server can take the request and confirm that the request is valid. If everything checks out okay, then the server can fetch the request and serve the consumer. The server will create a request from the consumer also. it may want to check up on the status of the consumer, or ask if it has received any security patches, or if it still desires resources from the server. If not, the server can shut the connection in order to unlock network traffic.
Mainul Hayat Foysal
BP0405529
15
Fig:-Client Server Advantages of client server:-
Centralized system. all data in one place Server can be accessed administrator Back and recovery possible Security can be configured to manage account Disadvantages of Clint Server:-
High cost of server Need expert to configure the network
Application server:- A server that exposes business logic to client applications through varied protocols as well as communications protocol. To deliver varied applications to a different device, it permits everybody in the network to run software package off of a similar machine.
How does it work:- An application server consists of a server operating system (OS) and server hardware that work along to supply computing-intensive operations and services to the residing
Mainul Hayat Foysal
BP0405529
16
application. an application server executes and provides user and/or different app access when utilizing the installed application's business/functional logic. Key needed options of an application server include data redundancy, high convenience, load balancing, user management, data/application data/application security and a centralized management interface. Moreover, an application server is also connected by enterprise systems, networks or intranet and remotely accessed via the web. Depending on the installed application, an application server is also classified in a sort of ways that, together with as an internet server, database application server, general purpose application server or enterprise application (EA) server.
Fig:-Application Server Advantages of application servers:-
Easy to install application in one place. Changes to the application configuration, configuration, like a move of database server, or system settings, will surface centrally. By centralizing business logic on an individual server or on a-little range of server machines, updates and upgrades to the appliance for all users may be bonded. Application servers saves a lot of time compared to installing a replica on each client machine. easy to manage software licenses to make sure only the allowed number of users will run the application at any one time. Application servers software patches and security updates may be simply deployed. Disadvantages of application server:-
Mainul Hayat Foysal
BP0405529
17
Anyone can’t access the application server, if servers go down
Expensive FTP server:- FTP is used to transfer files between two computers over a network and web. FTP is a method of exchanging data between two computers or a computer and a server. FTP or file transfer protocol works by following commands to upload and download files.
Fig:-FTP Server How does it’s work:- FTP works once you have successfully opened the server command port twenty one and established a connection between the consumer and FTP server. Then you'll transfer or access keep files through basic commands. To connect and execute commands, commands, the user is typically needed to authenticate by entering an username and password. Mail server:- With the clicking of a mouse button, you can send an email from one purpose of the world to a different in a matter of seconds. Most people take this method for granted, giving very little thought to how it truly works. it is easy to know how normal snail-mail gets from purpose A to purpose B - but how will an email message build its approach from a sender to a recipient? the solution to that question revolves around something known as a mail server.
Fig:-Mail Server
Mainul Hayat Foysal
BP0405529
18
Types of Mail Server:- Mail servers will be dampened into 2 main categories: outgoing mail servers and incoming mail servers. Outgoing mail servers are called SMTP, or simple Mail Transfer Protocol, servers. Incoming mail servers are available 2 main varieties. POP3, or Post office Protocol, version 3, servers are best known for storing sent and received messages on PCs' local hard drives. IMAP, or web Message Access Protocol, servers always store copies of messages on servers. Most POP3 servers will store messages on servers, too, that may be a lot a lot of convenient. How does Mail Server Server Works:- The sender composes a message exploitation the e-mail consumer on their computer. When the user sends the t he message, the e-mail text and attachments are uploaded to the SMTP (Simple Mail Transfer Protocol) server as outgoing mail. All outgoing messages wait within the outgoing mail queue whereas the SMTP server communicates with the DNS (Domain Name Server –like a phone book for domain names and server ip addresses) to find out wherever the recipient’s email server is found. If the SMTP server finds the recipient’s email server, it'll transfer the message and attachments. If the recipient’s server can’t be found, the sender can get a “Mail Failure” notification in their inbox. The next time the recipient clicks “Send & Receive,” their email consumer can download all new messages from their own email server. You’ve got mail!
For P4 - Discuss the inter-dependence of workstation hardware with relevant networking software.
Ans: Network Interface Card: A Network interface card is an device that connects a pc to a computer network, typically a local area network. it's considered a bit of computer hardware. most up-to-date computers support an internal network interface controller embedded within the motherboard directly instead of provided as an external element. Network cards let a pc exchange information with a network. to achieve the connection, network cards use an appropriate protocol, as an example CSMA/CD. Network cards typically implement the first 2 layers of the OSI model, that's the physical layer, and also the data link layer. There are a unit older network protocols like ARCNET, introduced in 1977, Local Talk or Token Ring, but today, most network cards use ethernet.
Fig:-Network interface Card
Cabling:- A structured cabling system could be a complete system of cabling and associated hardware, that provides a comprehensive comprehensive telecommunications infrastructure. This infrastructure serves a large vary of uses, like to provide phone service or transmit information through a electronic network. It
Mainul Hayat Foysal
BP0405529
19
shouldn't be device dependent. We additional define a structured cabling system in terms of ownership. The structured cabling system begins at the purpose wherever the service supplier (SP) terminates. this is that the point of demarcation or Network Interface Device. Most file systems have ways to assign permissions or access rights to specific users and teams of users. These permissions control the flexibility of the users to look at, change, navigate, and execute the contents of the filing system.
Fig:-Cabling Permissions :-Two kinds of permissions are terribly wide used: traditional UNIX operating system permissions date back several decades to the earliest days of UNIX operating system. they're universally available on all UNIX operating system and Linux derived platforms. Access control Lists (ACLs) are more modern in origin and area unit universally used on Microsoft Windows based mostly filing systems wherever the file system supports user permissions , and are currently commonly used and wide offered in most typical UNIX system and Linux based mostly systems, although not essentially all. they're typically capable of much more detailed fine-tuning of permissions than the traditional UNIX operating system permissions, and allow a system of access control that traditional ACLs cannot provide. On UNIX operating operating system and Linux based mostly mostly systems, the standard kind of ACL is that defined by the POSIX standard (POSIX ACLs) but alternative variants exist like NFS v3 and v4 ACLs, that work slightly differently (NFSv3 ACLs or NFSv4 ACLs).Where multiple systems are available inside a similar package, there's sometimes some way to specify which is able to be used for any given filing system, and how the system ought to handle attempts to access or modify permissions that area unit controlled by one of these, exploitation commands designed for an additional. the standard resolution is to make sure at least some degree of awareness and inter-operability between the different commands commands and methods. Client software :-The client software package is optional and not needed for basic logging, however, it will give users with access to advanced options. These options include:-
1.Real-time feedback to the user as well as their account balances and event messages like "print job denied" reasons. 2.Access to the account selection popup therefore users will allocate print jobs to shared accounts - as an example, accounts accounts representing departments, projects, clients, etc. this can be notably necessary in an exceedingly business setting.
Server software :-Server software may be a kind of software that's designed to be used, operated and managed on a computing server. It provides and facilitates the harnessing of underlying server computing power to be used with an array of high-end computing services and functions. Server software is primarily designed to act with a server’s hardware infrastructure, as well as the processor,
Mainul Hayat Foysal
BP0405529
20
memory, storage, input/output (I/O) and alternative communication ports. looking on the kind or usage of the server, server software is also classified into varied forms, like the following: 1.Web server software 2.Application server software 3.Database server software 4.Cloud computing server software 5.File server software Each of the higher than kinds of server software utilizes the server for various functions and services, however all focus their primary objective on using inherent pc capability and resources. Moreover, server software is also for a physical or virtual/cloud server built on a physical server. Client Operating System:- A desktop computer doesn't need any networks or external elements to operate properly. The client operating system is that the system that works inside computer desktops and varied portable devices. this technique is totally different from centralized servers as a result of it solely supports a single user. Smartphones and small pc devices are ready to support client operating systems. The system is in a position to manage totally different elements of the device like printers, monitors, and cameras. every pc usually has a specific kind of operating system. Some computers computers have the power to contain multiple operating systems. this can be called a dual boot configuration. once a pc is designed during this way, it can be set up to run a particular device for every operating system configuration. this allows flexibility for software that's designed for a particular package. once somebody has 2 operating systems, they will have access to additional difficult software programs. In this day and age, there are lots of completely different types of operating systems created for client computers. a number of samples of this are Windows, Android, Mac, and Linux. every operating system is supposed to function with a certain kind of hardware. Hardware compatibility could be a major concern once selecting a system for client computers. There are many freeware versions available for desktop computers. This client operating system offers multiprocessing power for a reasonable price. Most of the Linux system configurations would like an explicit level of system engineering information. the method of installing this system isn't meant for a beginner with computers . Windows is maybe the most widely used client operating system these days. This operating system has fully grown in quality ever since the discharge of Windows 95. several businesses around the world use Windows office suite for his or her word processing wants and without the Windows operating system it can’t be operate .The Windows operating system wants special hardware so as to run. That hardware should be designed to support that individual application. Server operating system:- A server operating system, additionally known as a server OS, is an operating system specifically designed to run on servers, that are specialized computers that operate among a client/server design to serve the requests of client computers on the network. The server operating system, or server OS, is that the software layer on top of that alternative software programs, programs, or applications, will run on the server hardware. Server operating systems facilitate enable and facilitate typical server roles like web server, mail server, file server, database server, application server and print server. Popular server operating systems include Windows Server, mac OS X Server, and variants of Linux like Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server.
The most deployed on-premises server operating systems-
Mainul Hayat Foysal
BP0405529
21
Windows Server 2003 Windows Server 2008 Windows Server 2012 Linux (excluding RHEL) Windows Server 2000 Red Hat Enterprise Linus (RHEL)
Network operating system :- A Network Server pc offers its services to a bunch of Network client devices. A Server pc usually has a lot of computing resources like Processors Power, a lot of Physical Memory (RAM), a lot of storage space etc., compared to client computers. The Server pc machine runs on Server operating system, additionally called as Network operating system (NOS), that usually has more options and process capabilities compared with the client computer's operating system. The server is also installed with special software, to perform as a Server Role. The special software allows a Server pc to function a particular server role, sort of a file server, Web Server, Mail Server, Directory Server etc.A Network operating system (NOS) includes far more capabilities than a standard client workstation (or Desktop) operating system. most well liked Network operating Systems are listed below.
Windows NT Windows 2000 Windows 2003 Windows 2008 / Windows 2008 R2 Windows 2012/ Windows 2012 R2 (Current) UNIX operating system -Oracle Solaris, IBM AIX, HP UX, FreeBSD, NetBSD, OpenBSD, SCO UNIX etc. Linux operating system-RedHat Enterprise Linux, Debian Linux, SUSE Enterprise, Ubuntu Server, CentOS Server, Mandriva, Fedora etc.
For M1 - Compare common networking principles and how protocols enable the effectiveness of networked systems.
Ans:-An application layer protocol defines however application processes (clients and servers), running on completely different end systems, pass messages to every alternative. particularly, an application layer protocol defines:
Mainul Hayat Foysal
BP0405529
22
The types of messages. for example, request messages and response messages. The syntax of the varied message sorts, for example, the fields within the message and the way the fields are delineated. The semantics of the fields. for example, the that means of the data that the sector is supposed to contain; Rules for determining once and how a method sends messages and responds to messages. SMTP (Simple Mail Transfer Protocol):
Fig:-Simple Mail transfer protocol
One of the most common network service is electronic mail (e-mail). The TCP/IP protocol that supports electronic mail on the net is called simple Mail Transfer Protocol (SMTP). SMTP transfers messages from senders' mail servers to the recipients' mail servers using transmission control protocol connections. connections. Users based on e-mail addresses. SMTP provides services for mail exchange between users on constant or completely different computers. Following the client/server model: SMTP has 2 facets: a client side that executes on a sender's mail server, and server aspect that executes on recipient's mail server. Both of the client and server sides of simple mail transfer protocol run on every mail server.
Mainul Hayat Foysal
BP0405529
23
When a mail server sends mail (to alternative mail servers), it acts as an SMTP client. When a mail server receives mail (from alternative mail servers) it acts as an SMTP server. TELNET (Terminal Network):
TELNET is client-server application that enables a user to log onto remote machine and lets the user to access any applications programmed on a remote pc. TELNET uses the Network Virtual Terminal system to encode characters on the local operating system. On the server (remote) machine, NVT decodes the characters to a type acceptable to the remote machine. TELNET may be a protocol that gives a general, bi-directional, eight-bit byte orientated communications communications facility. Many application protocols are designed upon the TELNET protocol Telnet services are used on PORT 23. HTTP (Hypertext Transfer Protocol):-
Fig:-HTTP
This is a protocol used in the main to access information on the world Wide web (www). The hypertext Transfer Protocol (HTTP) the Web's main application-layer protocol although current browsers will access alternative kinds of servers A repository of data spread all over the planet and joined together. The HTIP protocol transfer data within the kind of plain text, hyper text, audio, video and so on.
Mainul Hayat Foysal
BP0405529
24
HTTP utilizes server send requests and replies TCP connections to client . it's a synchronous protocol that works by making both persistent and no persistent connections. HTTPS (Hypertext Transfer Protocol Secure):-
HTTP is for websites using extra safety features like certificates. HTTPS is used once web transactions are needed to be secure. HTTPS uses a certificate based technology like VeriSign. Certificate-based transactions provide a mutual authentication between the client and the server. HTTPS, additionally to using certificate-based authentication, encrypts all data packets sent during a session. Because of the encryption, confidential user information cannot be compromised. To use HTTPS, a web website should purchase a certificate from a third-party vendor like l ike VeriSign, Carto, united states postal service, or alternative certificate providers. when the certificate is issued to an online website from a third-party vendor, the online website is using trusted communication with the client. The communication communication is trusted because the third party isn't biased toward either the online website or the client. to view a certificate throughout a HTTPS session, simply double-click the lock icon within the lower-right area of the online browser. HTTPS operates on port 443 and uses transmission control protocol for communication. OSI layered Model:-
Historically, one technique of talking about the various layers of network communication is that the OSI model. OSI stands for Open Systems Interconnect. Interconnect.
Fig:-OSI Model This model defines seven separate layers. The layers during this model are: Application:- The application layer is that the layer that the users and user-applications most frequently interact with. Network communication is mentioned in terms of availability of resources, partners to communicate communicate with, and information synchronization. synchronization. Presentation:- The presentation layer is responsible for mapping resources and making context. it's wont to translate lower level networking data into data that applications expect to see.
Mainul Hayat Foysal
BP0405529
25
Session:- The session layer may be a connection handler. It creates, maintains, and destroys connections between nodes in a persistent method. Transport: -This layer is responsible for handing the layers on top of it a reliable connection. during this context, reliable refers to the ability to verify that a bit of data was received intact at the other end of the connection.
This layer will resend data that has been dropped or corrupted and may acknowledge the receipt of data to remote computers.
Network:- The network layer is used to route information between totally different nodes on the network. It uses addresses to be ready to tell which pc to send information to. This layer may also break apart larger messages into smaller chunks to be reassembled on the opposite end. Data Link:- This layer is enforced as a technique of creating and maintaining reliable links between totally different nodes or devices on a network using existing physical connections. Physical:- The physical layer is responsible for handling the particular physical devices that are wont to create a connection. This layer involves the bare software that manages physical connections also because the hardware itself (like Ethernet).
As you'll see, there are many various layers that may be discussed based on their proximity to bare hardware and also the functionality that they provide.
TCP/IP Model:-The TCP/IP model, a lot of commonly commonly known as the internet protocol suite, is another layering model that's less complicated and has been widely adopted. It defines the four separate layers, a number of that overlap with the OSI model:
Application:- During this model, the application layer is responsible for making and transmitting user information between applications. The applications is on remote systems, and may seem to operate as if locally to the end user.
The communication is alleged to require place between peers. Transport:- This layer is responsible for communication communication between processes. This level of networking utilizes ports to address totally different services. It will build up unreliable or reliable connections depending on the kind of protocol used. Internet:- The internet layer l ayer is used to move information from node to node in a network. This layer is attentive to the endpoints of the connections, however doesn't worry about the particular connection required to get from one place to a different. IP addresses are outlined during this layer as the way of reaching remote systems in an addressable manner.
Mainul Hayat Foysal
BP0405529
26
Link: -The link layer implements the particular topology of the local network that allows the internet layer to present an available interface. It establishes connections between neighboring nodes to send information.
As you'll see, the TCP/IP model, may be a bit a lot of abstract and fluid. This created it easier to implement and allowed it to become the dominant way that networking layers are classified.
For M2 - Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization.
Ans: Virtual servers:- Virtual dedicated servers or Infrastructure as a Service as it´s usually known is a method of getting your own machine and while the top result's similar, the thanks to order one is completely different. You start by registering an account (here at city Cloud), and once you have confirmed your email and identity, you get access to our control board. From there, you only click on “New VM”, choose the operating system and/or image (some of them come with pre -installed software package ready to go) and wait a couple of minutes. That´s right, once a couple of minutes you get a brand new virtual machine that may be accessed by SSH or VNC. The IP address is assigned automatically automatically therefore you have everything you need to begin installing software package.
Fig:-Virtual Server
The pros and Cons of Virtual Servers:-Virtualization is that the act of inserting multiple "virtual servers" on physical instrumentation. this enables physical server resources to be split between multiple workloads for optimum efficiency and cost savings. Virtualization usually happens within the cloud or on servers that are owned, maintained, and located offsite. Hiring a hosting vendor who offers secure cloud services is that the most typical method that organizations switch to virtualization.
Mainul Hayat Foysal
BP0405529
27
Advantages of Virtual Servers:-
Fewer upfront prices, since you're not needed to buy hardware. Potential for lower period prices on configuration and maintenance. maintenance. Access to skilled help on setup, configuration, maintenance, maintenance, and software system licenses. Reduced would like for in-house IT talent. Potential to consolidate servers and increase work efficiency. Reduced environmental footprint, because of shared workloads. Disadvantages of Virtual Servers:-
Potential for higher recurring monthly prices, as opposed to higher upfront investment. Possible problems with application compatibility, that are best mentioned with a knowledgeable vendor. Not all vendors are amenable to scaling your agreement up or down in tiny increments, that th at mostly depends on vendor policies and repair level agreements (SLAs). No longer severally in control of your physical server and therefore the applications running on them. Cost and system Requirement of Virtual Server: 1 – 16 core server, 32 GB of RAM, several 4-port ethernet cards, 1 TB – 2 TB disk, for a complete of $45,196
physical servers:- A physical server is simply as the name says, a server (physical computer) on that an operating system, like Windows or Linux runs even as on any other pc. The physical servers are in the majority aspects like desktop computers, with several improvements that desktop PCs lack featuring things like redundant power provides, raid controllers, multiple network cards etc. The physical servers are larger in size with rather more powerful elements in general. all of them need a separate space in the server rack. Most of the servers even have two or more physical CPUs with multiple cores each.
Advantages of Physical Servers:-
IT team has full access to your dedicated server resources 24/7/365, which might be advantageous advantageous for high-demand or business-critical operations. The server could also be situated onsite or in a conveniently-located colocation colocation facility. IT employees will totally customize and configure the server to your specifications and business needs.
Mainul Hayat Foysal
BP0405529
28
Disadvantages of Physical Servers:-
Relatively high price of server purchase, maintenance, and in the case of hardware failure, replacement. IT employees are to blame for setup, configuration, and maintenance on a continual basis. May need to rent a contractor or vendor for facilitate if you've got problem with configuration or repairs. Users cannot scale storage storage in tiny increments once reach the maximum maximum work, since you buy and own the hardware. Requires physical or colocation colocation space. Cost and system requirement of Physical Server: -eight dual-core servers, 4 GB RAM, 1-2 ethernet ports, 150 GB disk for $1,339 each, for a complete of $10,172 Tomcat:- Apache tomcat, tomcat, is an open source net server and servlet container developed by the Apache Software Foundation. Basically, it implements the Java Servlet and also the Java Server Pages (JSP) specifications from Sun Microsystem, and provides a "pure Java" http net server surroundings for Java code to run in. within the simplest configuration tomcat runs in a very single operating system method. Runs a Java virtual machine (JVM) and each single http request from a browser to tomcat is processed within the tomcat process in a very separate thread. Apache tomcat includes tools for configuration and management, however may be configured by editing XML configuration files.
Apache:- Apache HTTP Server may be a freely-available web server software package that's distributed under associate open source license. Apache HTTP server was formerly called Apache web Server and has been offered since 1995 through the Apache software Foundation. The software offers an extensible and secure net server with services in set with modern HTTP standards. HTTP Server is compatible with most UNIX-based operating systems (such as mac OS, Linux, Solaris, Digital UNIX system, and AIX), on alternative UNIX/POSIX-derived systems and on Microsoft Windows. Apache HTTP Server was the most popular webserver from 1996 till June of 2016.While Apache still remains one in every of the world’s most heavily -used webservers it lost market share to NGINX, Microsoft and others since 2016. Docker :- Docker could be a computer program that performs operating-system-level operating-system-level virtualization, additionally called "containerization". it absolutely was 1st released in 2013 and is developed by docker. Docker is employed to run software packages known as "containers". Containers are isolated from one another and bundle their own tools, libraries and configuration files; they will communicate with one another through well-defined channels. All containers are run by a single operating system kernel and are so additional light-weight than virtual machines. Containers area unit created from "images" that specify their precise contents. pictures are usually created by combining and modifying standard pictures downloaded from public repositories.
For D1 - Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system.
Mainul Hayat Foysal
BP0405529
29
Mainul Hayat Foysal
BP0405529
30
Reference:
Singh, C. (2018). Types of Network Architecture. Architecture . [online] The Practical Dev. Available at: https://dev.to/cadellsinghh_25/types-of-network-architecture-56i7 [Accessed 19 Nov. 2018]. Managed Services and IT Support Houston TX | Intellegens Inc. (2018). Pros and Cons of different types of network topologies • Managed Services a nd IT Support Houston TX | Intellegens Inc . [online] Available at: http://intellegensinc.com/pros-and-cons-of-different- types-of-network-topologies/ [Accessed 19 Nov. 2018]. Shekhar, A. (2018). Different Networking Devices And Hardware Types — Hub, Switch, Router, Modem, Bridge, Repeater . [online] Fossbytes. Available at: https://fossbytes.com/networking-devicesand-hardware-types/ [Accessed 19 Nov. 2018]. Beal, V. (2018). Server Types - Webopedia.com. Webopedia.com. [online] Webopedia.com. https://www.webopedia.com/quick_ref/servers.asp [Accessed 19 Nov. 2018].
Available
at:
Fcit.usf.edu. (2018). Chapter 2: Protocol . [online] https://fcit.usf.edu/network/chap2/chap2.htm [Accessed 19 Nov. 2018].
Available
at:
Fcit.usf.edu. (2018). Chapter 3: Hardware. Hardware. [online] https://fcit.usf.edu/network/chap3/chap3.htm [Accessed 19 Nov. 2018].
Available
at:
Fcit.usf.edu. (2018). Chapter 4: Cabling . [online] https://fcit.usf.edu/network/chap4/chap4.htm [Accessed 19 Nov. 2018].
Available
at:
Fcit.usf.edu. (2018). Chapter 5: Topology . [online] https://fcit.usf.edu/network/chap5/chap5.htm [Accessed 19 Nov. 2018].
Available
at:
Fcit.usf.edu. (2018). Chapter 6: Software. Software . [online] https://fcit.usf.edu/network/chap6/chap6.htm [Accessed 19 Nov. 2018].
Available
at:
Stroud, F. (2018). What is a Server Operating System? W ebopedia Definition. Definition. [online] Webopedia.com. Available at: https://www.webopedia.com/TERM/S/server_operating_system.html [Accessed 19 Nov. 2018]. Beal, V. (2018). The 7 Layers of the OSI Model - Webopedia Study Guide . [online] Webopedia.com. Available at: https://www.webopedia.com/quick_ref/OSI_Layers.asp [Accessed 19 Nov. 2018].
Mainul Hayat Foysal
BP0405529
31
Thank You
Mainul Hayat Foysal
BP0405529
32