Networking Concepts Assignment 1 4/9/2010 NESCOT Daniel Rotaru
Networking Concepts Assignment 1 Daniel Rotaru
Page 2 of 26
Networking Concepts Assignment 1 Daniel Rotaru
P 1.1 Produce a report outlining how a network will benefit an organisation such as We Care. Include in your report possible disadvantages, the management needs to consider, when considering setting up a network. Network evolution uses In order to explain why a network will benefit this organisation I will look at the function of the company, asses how everyone will have access to their data according to their role in the company, and the network suitability for the staff needs. At the moment the company has 5 branches, but only one has a setup LAN (local area network).The company purpose is to provide services for care homes. The total number of employees is 197.They all need to update the health datasheet provided by Home care services. The future predicts the expandability of another 4 branches. One of the reasons for the setup of the network is the access of the data from different sites, update of track sheets for patients and ease of functions such as emergency services, document printing access to the internet, interoperability of so ftware etc. In order to facilitate the needs of the staff many factors must be taken in the consideration such as:
The access and exchange of data from any of the branches!
How to connect all the branches LAN`s?
The level of accessibility to the data(different staff has different status in the company )
What medium of connectivity will be between the LAN`s?
My idea about developing the network is to use the existing LAN in Leatherhead and develop small LAN`s in each of the other 4 existing branches and connect them to the central office by creating a MAN (metropolitan area network). Now that the purpose has been set I will define the meaning of the LAN and MAN explaining how each works.
LAN (local area network) is defined by the way that the nodes are linked to each other either
physically or logically through wires or wireless. A node is any device that is connected to the network (pc. printer, server etc.).A big consideration must be taken when choosing a topology because of the way that the devices are linked: link equally) or
(the devices share the
(where one device control traffic and the others must
transmit through it).
Page 3 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Information cumulated from; Data Communication and Networking, By Behrouz A.Fouzan et al, second edition, ISBN 0071181601, page 22-28. The main types of topologies are:
(Behrouz.A. et al, Data Communications and Networking, second edition, p22-28) My recommendation in the choice is the tree topology because in comparison with other topologies it is more robust, is easier to fault find and control from the administrator point of view. The other perfect choice would be meshed, but the cost will be higher.
is a variation of the star topology where the devices connect not only to a central hub, but there are devices that connect to secondary hubs .The central hub is an active hub that contains a repeater. The repeater allows regenerations of bits patterns before they are sent out and results in increased travelled distance of the signal. The secondary hubs can by active or passive (provides only a physical connection).The main advantage of this topology is that allows to prioritise communications from different computers and because the central hub it propagates the signal better. common to all LAN Error and flow control over data frames with logical addresses. The LLC contains:
Page 4 of 26
Networking Concepts Assignment 1 Daniel Rotaru
PDU-protocol data unit – that has; DSPA( destination service access pointindicates whether a frame is intended for an individual group ) and SSAP (source service access point-indicates if the communication is a response or a command)
Control field that carry all the codes and information
In order for every node on the network to share the same transmission media in a constant way, a media access is needed. media access control. Is responsible for running the signalling protocol, determined by the appropriate standard. The main characteristics of the MAC protocol are packet format (size, headers), channel access mechanisms and network management. The two channel access mechanisms used by the MAC protocol in wireless LAN systems is carrier sense multiple access/collision avoidance (CSMA/CD) and Polling MAC. A channel access mechanism is the part of the protocol that specifies when to listen, when to transmit. The basic principles of CSMA/CA are to listen before talk and contention. Its main advantages are that it is suited for network protocols such as TCP/IP, adapts quite well to variable traffic conditions and is quite robust against interference. Therefore the wireless MAC protocol tries to avoid, instead of detecting, collisions. On every network interface adaptor card there is a set of computer chips that handle communication with the physical media (copper wire, fibre optic cable or the air) by controlling the communication signal (electricity, light or radio frequencies) over the physical media. identifies a specific network device and must be unique on a given LAN. The first 12-bit portion of the MAC address identifies the vendor of the network device; the last 12-bit portion identifies the unique ID of the device itself. The MAC control field contains all information used for flow control, connection establishment and teardown as well as error control. The content of the fields is dependent upon the specified standards for that particular data link layer protocol (Ethernet, Token Ring, FDDI etc.) The source MAC address field contains the MAC address of the transmitting device, and the receiver
Page 5 of 26
Networking Concepts Assignment 1 Daniel Rotaru
. One method of sharing files internally can be done by adding through the server all of the individual PC or device (printer etc). All of the devices will be added to a list with the help of the MAC will be easier to identify. The setup can be done manually (takes time) or a software that detects all the devices from the network and supervises the health of each device. The steps to achieve this are as follows:
Set an user interface of a client as a first environment configuration
Connect the client to the main server
Setting the configuration settings with the server
Transmitting one of the environment parameters from the server to the client
Change the parameters to suit the client – server architecture (purpose)
The best way is through a web server that stores all assessment data. A web-based interface (Portal) allows employees to login and complete their assessments and view their reports from different locations. Authorised managers can log in and view management reports on their staff, or the whole organisation. As the name suggests the access must be done trough internet browser. The TCP/IP
will be the protocol that is implemented through internet to send data such as Email or documents. : -TCP takes care of the communication between the application software and network software (by breaking and assembling the data down to IP packets) -IP takes care of the communication with other computers and is responsible for sending the packets to the correct destination. TCP/IP uses 32 bits, or four numbers between 0 and 255, to address a computer. One computer byte is 8 bits. So TCP/IP uses 4 computer bytes.
Page 6 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Each computer must have an IP address before it can connect to the Internet. Each IP packet must have an address before it can be sent to another computer. Each computer must have a unique IP address. When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information. Each of the intermediate routers consult the IP address of each packet received. Based on this, each will know exactly in which direction to forward the packet. Normally, each router has a routing table, where data about the neighbouring routers is stored. This data is used to calculate and decide where to send the packets. The packets go each one its own way and can move through different networks and take different paths. They all finally get routed to one same destination machine. The packets will be consumed by the machine, where the IP module on it will reassemble them and send the resulting data above to the TCP service for further processing.
MAN Technologies, addressing, and services is addressed trough the protocol DQDB-distributed queue bus that uses a dual bus configuration. Each device connects to two backbone links through a mechanism called distribution queues. The data is transmitted when a slot is captured in the downstream direction only. This system works whit FIFO (first-in, first-out0ques that gives an equal chance of transmission. DQDB works in the physical layer, MAC sub layer and it defines the electronic devices, media and data rates.
Wide area networks (WANs) provide data connectivity over much bigger distances than the local area network. Data rates on WANs are lower because in many cases WANs are transported over the PSTN voice channels, either analogue or digital. In both cases there are limited bit rate capacities. The telephone companies deploy WANs to service large regional areas or the entire nation. Many companies have their own private WANs to link
Page 7 of 26
Networking Concepts Assignment 1 Daniel Rotaru
remote offices, or they use the Internet for connectivity. Of course, the Internet is the worlds largest WAN.
— PPP (Pope, PPPoA) originally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links. PPP also established a standard for the assignment and management of IP addresses.
— the process of identifying an individual, usually based on a username and password Customer premises equipment (CPE) encapsulates PPP sessions based on this RFC for transport across the ADSL loop and the digital subscriber line access multiplexer (DSLAM).
— Company information must be restricted, allowing users access only to areas in the network for which they are authorized. For example, access lists can filter out unauthorized data flow between offices. PPP network links, such as PAP and CHAP, can identify the remote entity to prevent unauthorized network connection. SOHOs and branch office users gain access to secure sites through the use of VPN technologies.
In this case we must adapt different technologies in order to accommodate more LAN`s on the same network. The advantages can be classified as follows:
The administrator has a choice for topology
The design will be done to suit the company needs
There will be easy to access nodes from the server and make changes in programs
The fault finding will be assessed in most cases from the network administrator office through remote access
Quotes will be given to staff to accommodate their level of expertise
Page 8 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Network manager will decide upon the most economical way of setting a MAN (in this case it will be through ISP)
The network manager can set the security on the network
The administrator has to review the existing devices and do the best he can with what he has in order to keep the cost to a minimum
Some of the hardware or software might be outdated and needs updating
If the internet connection is interrupted then communication from other location to the main servers will be not achievable
The staff will need training with the changes made in the access
P1.2 Within the report evaluate the cost performance, security and utility values associated with the installation of a new network taking in the consideration their current IT audit.
Data acquired from Data Communication and Networking, By Behrouz A.Fouzan et al, second edition, ISBN 0071181601, page 613-638 Internetworking Devices In order to have LAN that work there must be at least two devices connected with the purpose of sharing data. The types of devices will depend on the distance between them, the number of devices on the network, the clarity of the signal compatibility and others. If two or more LAN`s are connected than different devices will be necessary to form an internetworking. Each device interacts with protocols at different layers of the OSI (discussed in detail in assignment1).
is an electronic device that operates at the physical layer of the OSI and has the role of receiving a signal (before losses his strength or corrupted), regenerates the bit pattern and releases the refreshed copy back on the link. The distance between the Page 9 of 26
Networking Concepts Assignment 1 Daniel Rotaru
transmitted signal and the repeater is vital because of the noise that can destroy the originality of the bit pattern. can be used to divide a large network in small segments and they can also relay frames between separate LAN`s. They operate in the physical and data link layers through addresses to all devices connected. They have logic that filters the traffic and offer a good security. The bridge not only repeats the bit sequence, but also knows where it came from and where to be directed only to the specified address. Each bridge must have incorporated a table with all t he addresses of the devices that are connected through to know where to direct the data. Types of bridges include:
Simple bridge where the addresses must be installed manually.
Multiport bridge used to connect more than two LAN`s .It has tables for each port there is an physical address.
Transparent bridge where the address is automatically updated with any address of any new device connected through.
The bridge can connect LAN, but they must be governed by a Spanning Tree Algorithm or by Source Routing where the source defines the path of transmission for the data. Bridges have several issues at the data link layer when they connect two different networks (Ethernet and Token Ring) such as:
The frames from each network are different in their format
The size of the data in a frame depends from protocol to protocol(payload size)
If the data rates differ between the networks, the bridge must buffer and compensate to achieve the same data rate exchange
The bit order of addresses is different .Egg. An address should be reversed if it connects an Ethernet LAN to a Token Ring LAN.
There are many factors that must be addressed when a bridge is involved between different networks such as:-ACK, collision, priority and other differences between The LAN`s protocols.
Page 10 of 26
Networking Concepts Assignment 1 Daniel Rotaru
are sophisticated devices that have address access through software contained and they operate in the physical, data link and network layers of the OSI. They make possible the transfer of data from one device to another based on the destination address. Because routers act as stations on the network they have links to different networks that allows them to route the data to the related address through the best found (fastest) route. They are two ways to calculate the shortest path between routers:
Distance vector routing where periodically the router is sharing his knowledge about the network with the neighbouring routers
Distance vector routing where the router has a table with predetermined information about the network such as cost, ID and the router to access a particular network.
EG when data is sent from a network device to a different network the router receives the data and switches to the destination network. If the router cannot find the destined router from the destination network than it will pass the data to a different router and the data will travel until it finds a route for the f inal address. Routing can be adaptive (the data is sent from router in packets on different networks) and nonadaptive (once a path is established the data will be transmitted through). Because the routers decide what is the fastest way for a packet to travel, there might be a danger of packets not reaching their destination due to a possible loop. In order for the data to be destroyed and the frame resent an added packet called Packet Lifetime or Time to Live (TTL) that is market with a number (represents the number of loops allowed before the packet is considered lost and destroyed). are very similar to bridges but allot more efficient .They can act as a multiport bridge to connect devices or parts in a LAN through buffer for each link that is connected. When it receives a packet it stores it in the buffer and checks the address. The Switches are:-Store and forward switch (stores the frame until all packets has arrived)
Page 11 of 26
Networking Concepts Assignment 1 Daniel Rotaru
-Cut-Trough-Switch forwards the packet to the output buffer once he has received the destination address. In order for the data to be transmitted on the right port the CPU together with the control unit consult the switching table .After the address has been found the buffered frame is sent for transmission.
– are devices on the network that are at the end of the user such as PC`s, laptops etc. - is very similar to a computer, but is allot more powerful in the way is set up. The name server suggests that it serves something. In a network he administrates all of the computers or other devices, through software. Many applications are controlled from the server.
The network developing cost The existing company has hardware that allows all the current staff access to the network as follows:
Main servers x2
Secondary /backup servers x3
Workstations x120
Laptops :20
The company has a total of 197 employee’s .The calculated ratio of workstations is
=0.72 units
per person. Title of network device Main server Backup server Workstations Laptops
Existing Units number
Price per unit in £
Total price
2
1800
3600
3 120
1200 300
3600 36000
20
450
9000 Total Inventory Price 52200
Page 12 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Although this are the major components of the network many devices and software packages have be have been omitted. After an entire review the list with all the components looks as follows.
Title of network device
Existing units Price per unit in £ Total price in £
Main server Backup server Workstations Laptops Router Printer Transparent bridge Cat 5 cable Extension lead 5 outlets Software with business multiuser licence Windows XP professional Windows server 2003 Ubuntu server Microsoft office 2003 Adobe IGX/BPX Cisco auto-routing Norton security Other extras Total Inventory price
2 3 120 20 2 10 8 180 45
2 2 2 2 2 2 2
1800 1200 300 450 500 60 200 5 10 The software is all part of a package paid one of acquired at the original setting of the network
3600 3600 36000 9000 1000 600 1600 900 450
The Total price of software is 8000 2000 3000 70300
As seen in the above when a new administrator is appointed he becomes liable to assess all the components in the network. He also needs to have a very good knowledge in both Hardware and Software. The existing network is well designed, but some of the hardware and software will need changing. Some of the proposed changes are as follows:
First the transparent bridges although good it will be better for the network if they could be replaced by switches
The Main servers will be set in a well ventilated room, with access only by the network administrator. Physical protection of the devices o n the network will be implemented (locks).
Page 13 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Microsoft office has a newer version (2010) that has many more features and will help the business through a professional finish of the do cuments, reports and other written data. This in turn will show the seriousity and good organisation against other competitors.
The present provider of the leased line is quite expensive and there is the option of changing to a business DSL ,that will decrease the price and allow to set up a VLAN (virtual LAN) where all the LAN`s on the network can connect through the internet.
The cost will be dramatically reduced and data can be transferred at high speed between different sites of the company. The user will be able to access their specific tasks and upgrade the reports from anywhere as long as they have a username and password, acc ess to the internet that will allow them to enter the private VLAN.
All the staff will have to be trained to know how to use the new software and how to logon on to their specific site.
The security of the data entered will need upgrading as the Internet has many possible viruses.
P 1.3The current IT structure is running both Windows 2003 Server and Ubuntu Server on their servers. Provide an overview of the two network operating systems elaborating their key features and how they work by creating a power point of no more than 15 slides.
LINUX server and WINDOWS 2003server
Characteristics
Page 14 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Purpose of an Operating System
To manage hardware and software resources in a system – Memory, processor, disk space, programs To ensure the system behaves in a predictable way
To provide a stable, consistent high-level interface to the hardware
– Individual applications do not need to know hardware implementation details
When is an Operating System Needed? When
you want to abstract away from the hardware – You want your program to run on different hardware platforms When systems must be multi-functional – To run different kinds of programs An operating system is not needed when the system does only one thing and flexibility is not needed. – E.g., a microwave
Page 15 of 26
Networking Concepts Assignment 1 Daniel Rotaru
The Ubuntu Server System requirements
It requires a minimum of 128Mb of RAM and 1Gb of disk space. Depending on your needs, you might manage with less than this.
Ubuntu Server integrates with existing operating systems allowing reproducible, hardware-independent deployment scenarios that can be easily adapted to match virtually every need. This is achieved through the flexibility of the kernel.
To do this, it is customary to setup one machine as a DHCP/TFTP/HTTP(main) server that provides the configuration information for installation over the network.
Ubuntu characteristics
Uses the Debian Installer and Kick-start during the install comprehensive process to automate and personalise the installation process.
Is optimised to run in a virtual environment through IO drivers and usage of hardware features.
Has an easy to set up mail server based on Postfix and Dovecot two known open source packages.
The Bind9 package allows to act as a DNS Domain name server and dynamic host configuration server or resolver as well as providing enhanced security , protocol enhancement .
Page 16 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Ubuntu Characteristics
The ISC's DHCP3 packages included in Ubuntu can distribute all network-configuration to clients as well as act as a relay agent for other DHC servers.
Has the boot info function to perform network boot for PXE enabled machines, when used in conjunction with tftpd-hpa, thus allowing automated deployments.
Has implemented OpenVPN package a solution that creates secured (encrypted) connections between networks, allowing secure remote access or providing Wifi security by using encryption mechanism SSL/TLS and can be combined with multiple forms authentication .
Page 17 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Ubuntu Characteristics
Authentication Authorisation and Accounting (AAA)is achieved through Free Radius package that provides access control and auditing services to most network equipment including routers, remote access servers, proxies and VPN.
It also provides a client framework so that services can be easily enabled.
It can work with LDAP (OpenLDAP or others) and SQL back ends (including MySQL and PostgreSQL) to check credentials or authorisations and store accounting logs, with duplication and fallback mechanisms.
Ubuntu Characteristics
Monitoring is achieved through information collected by Munin and can be presented graphically through a web interface that trigger alerts .
BackupPC is a high-performance, enterprise-grade system for backing up Linux and WinXX PCs and laptops to a server's disk.
Network UPS Nut permits one server to monitor the UPS and notifies the other servers connected to the same UPS when the UPS is on or has a low battery, allowing them to smoothly shutdown before complete loss of power, thus avoiding critical data loss that could occur otherwise.
Page 18 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Ubuntu security methods
Ubuntu does not install default services that listen on open network ports by default. This reduces the chances that a system would be compromised.
Role-based administration allows for better security, error prevention and auditing(useful on systems where more than 1 user might have been given root access).
No X server by design or any graphical desktop applications. It is believed that most servers should be serviced remotely, are safer without the addition of code that needs direct communication from user space to hardware.
Ubuntu security methods
Updates when necessary
Security can also be greatly enhanced through the use of mandatory access control (MAC) rules provided by AppArmor.
It allows the system administrator to associate each programme with a security profile which restricts the authority and access rights of that programme.
Uncomplicated Firewall ufw is a command line utility that does make it very simple to add host based rules protection for the server. In order to maintain backward compatibility, ufw is disabled but installed by default, and enabling it is just a command away.
Page 19 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Windows server 2003 features
Windows Server 2003 implements fault tolerance features through memory mirroring support, ensuring that no memory failure will bring down the system; Hot Plug PCI technology for adding PCI cards without shutting down the server; Hot Add Memory, for adding memory ; load balancing and failover; and multi-path IO for storage.
Windows Server 2003 supports up to 256 GB of RAM, and technologies such as hyper threading and NUMA (Non-Uniform Memory Architecture), which allows Windows Servers to be partitioned like a mainframe.
Windows server 2003 features
Interoperability - Microsoft's interoperability story revolves almost solely around Web services, also the 32-bit and 64-bit Windows Server 2003 products are completely interoperable.
Security-Windows Server 2003 includes a secure VPN gateway, a new secure wireless standard called 802.1x, and a standardsbased TCP/IP infrastructure, including support for DNS, DHCP, NAT, and IPv6.
Software Restriction Policies (SRP) feature lets administrators determine which applications can and can not-execute in their environment.
Windows Server 2003 also supports Smartcard technologies, so that admins can logon with a normal account but swipe the card when they need to perform secure administrative tasks under admin privileges.
Page 20 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Windows server 2003 features
Windows Server 2003 supports communications technologies, including IPv6, network bridging and Internet Connection Sharing (ICS), IPSec,IP over Firewire, and so on.
Remote access is common now that almost everyone use VPN (Virtual Private Networking)
AD(active – directory) has many UI improvements, including drag and drop capabilities, multiple object selection and editing, saved queries, and other refinements.
Easier deployment and configuration supports Remote Installation Services (RIS) = rapid installation of a small number servers. Manage Your Server and Configure Your Server wizards simplify the process of assigning server roles, a new concept for this release: You might configure a server to be a file server, print server, Web server, and so on, and can easily assign multiple roles where appropriate.
Windows sever 2003 Features
Staying up to date and secure supports Software Update Services and Auto Update. The Software Restriction Policies (SRP) feature creates a virtual box that prevents unauthorized code execution. SRP is policy-based.
Managing many as one Group Policy Management Console (GPMC) provides a scriptable interface for managing group policies that integrate with Resultant Set of Policies (RSoP), which lets admins generate reports to view and test what policies have been applied to specific users and machines.ng them live.
File System and Storage includes Volume Shadow Copy Service (VSS) and various improvements to the NTFS file system and storage subsystem. For the first time Microsoft has created a backup framework, that can be extended by third parties.
Page 21 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Windows server 2003 features
Other file system and storage improvements include deep SAN support, Virtual Disk Service , Automated System Recovery command line disk defragging that now supports any cluster size, a dramatically enhanced Check Disk
Terminal Server supports two modes: A single user mode for administration purposes, and a multi-user mode for full Terminal Server functionality, where users are accessing a desktop or specific applications remotely.
WMI and Group Policies, better scalability, and a new Remote Desktop Client, which supports execution of remote desktops within a window, an IE browser, or the MMC.
Application Server include the .NET Framework and its support for ASP .NET, ADO .NET, and related technologies. Essentially, it's that portion of the OS that lets Windows Server act as the middle tier of a multi-tier application and services infrastructure.
Ubuntu server and Windows server example of services
File server
Print server
Application server(IIS, ASP.NET)
Mail server (POP3, SMTP)
Terminal server
TLS support for encrypted connection
Remote access/VPN server
Multiple Junk mail control features and plugging
Multiple database support (SQLor LDAP based)
Domain controller (Active Directory)
DNS server
Maildir and mailbox formats for storing emails
DHCP server
Streaming media server
WINS server
SMTP, LMTP & QMQP protocol support for mail routing and delivery
Delivery Status Notification
IPv6 support
MIME encoding
Pipelining of multiple message in the same connexion
SASL (through Dovecot plug-in)
Virtual domains support
Address masquerading and rewriting
Page 22 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Conclusion
The Software used by people is entirely their choice ,but most of the servers offer similar services or dedicated services specific for the user needs.
In our case the Servers compared previously offer interoperability ,great security , upgradability ,stability, user policy or group policy , and make the networking process allot easier from the administrator point of view.
References 1) Paul Thurrott,2002, Windows Server 2003 Review Article found at http://www.winsupersite.com/reviews/winnetserver_r c1.asp, accessed on 27.04.2010
2) Ubuntu organisation,2010,Ubuntu-linux server features , article found at http://www.ubuntu.com/products/whatisubuntu/server edition,accessed on 24.04.2020
Page 23 of 26
Networking Concepts Assignment 1 Daniel Rotaru
P 2.1 Create a networking diagram that fits on 1 side of A4 –of your proposed LAN showing all software and hardware components .Justify its fitness for purpose. Different Location
LAN 3
WAN
LAN 4
High Speed Back bone Fibre optic
DSL service with VPN Access
DSLAM and Provider exchange
Provider Exchange
UPS UPS
Locked administrated servers
VDSL
Locked Main servers Desktop PC
Cloud Internet
Firewall
Secondary server
LAN 2
Firewall Wireless Multifunction al device
Router
All in one Printer
Personal device
PDA
Administrator
LAN 1
Wireless Desktop PC
Wireless projector
Wireless Laptop
MAC computer User User Laptop
User
Page 24 of 26
Networking Concepts Assignment 1 Daniel Rotaru
Explanation of devices in the above LAN `s: Mac computer, Desktop PC, Laptop and PDA are workstations on the LAN where a user can access the data necessary, through applied software and the internet. From workstation the data can be transmitted and received on the network.
Multifunctional Printer is connected to the network through either a router or a server and has different roles such as printing, scanning, copying.
All the above are connected to the Server through either a switch, router or directly to the server through Cat 5 cable.
The server is vital as all the interoperability (hardware and software) of the network will need to connect, store data and exchange securely data inside the LAN but also on the internet.
UPS Uninterruptible power supply has the role of maintaining the hardware power up in case of power cut .This helps to keep the server safe and the data also on the system.
Network software and DSL technology The DSL technology has been adapted on to the POTS –plain old telephone service and o ffers great bandwidth through implemented technology at ends, exchange and c ustomer. From the client the analogue signals are separated by an ADSL splitter (filter) with the help of DMT multi-carrier modulation method that divides the signals that pass through different frequencies. One will provide the phone line and the others will be used for all other. From the splitter the analogue signal is quantised and will go through a modem that will transform the analogue signals into digital data(1 and 0) recognized by digital devices(PC)that in turn will display the data received.
VDSL Very High Data-Rate DSL needs shorter cable lengths than most other forms of DSL (maximum 4,500 feet as compared to 18,000 feet for regular ADSL), but it also achieves the highest data rate (roughly 51,840 kbps).
Connectionless communication as the name implies does not require a to establish a connection and is very simple because it only sends the data, but it has no confirmation of delivery. The only way of knowing if the data has reached its destination is if the recipient sends a reply and the reply is not lost .The main advantage of this system is that is fast, cheaper, but less reliable( UDP) The protocol that implements both TCP (Transport Control Protocol-connection oriented) and UDP (user Datagram Protocol-connectionless) is IP .The IP is providing a route for their data packets to reach their destination. IP (internet protocol) uses logical addressing to deliver data on a complex routed network to a specific device depending on the IP address .IP has a format that consist of:
Page 25 of 26
Networking Concepts Assignment 1 Daniel Rotaru
References;
Behrouz A.Fouzan et al ,Data Communication and Networking, second edition, ISBN 0071181601, page 22-28(topology)
Behrouz A.Fouzan et al ,Data Communication and Networking, second edition, ISBN 0071181601, page 22-28(topology) page 369-421 Project 802
Behrouz A.Fouzan et al ,Data Communication and Networking, second edition, ISBN 0071181601, page 613-638 Internetworking Devices
Media Access Control(MAC) ,article accessed at http://www.inetdaemon.com/tutorials/networking/lan/ethernet/mac.shtml Page accessed on the 13-04-2010
Paul Thurrott,2002, Windows Server 2003 Review ,Article found at http://www.winsupersite.com/reviews/winnetserver_rc1.asp, accessed on 27.04.2010
Ubuntu organisation,2010,Ubuntu-linux server features , article found at http://www.ubuntu.com/products/whatisubuntu/serveredition,accessed on 24.04.2020
William Stalling- Data and Computer Communication, seventh edition 2004 by Pearson Incorporation inc., p 215-220
Image found at http://www.uni-muenster.de/ZIV.Film/ziv/07_VPN-Verbindung.flv.jpg, Accessed on 26-05.2010
Page 26 of 26