• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Networking Diagrams and Case Study

Extracts from this document...


Task 6: Networking Diagrams 1. A) Define: 1. Workstation ? A computer or a dumb terminal that is connected to a network that inputs and outputs data and is often the ending point of a network, but not always. 2. IP Addresses - An IP Address is a multi-digit number assigned to each device in a network that uses the internet protocol (IP) to communicate. 3. Switch ? A switch is a networking device that connects network devices. A switch is also commonly known as a network bridge that routes data at the data link layer (layer 2) of the OSI model. 4. Router - A router is a device that forwards data packets between computer networks. The router reads the address of the packet to determine where its final destination. 5. WAN/LAN ? LAN is a network that connects computers in a smaller area such as a home. The difference between a LAN and a WAN are that a WAN is when two LAN?s are connected with a LEASED line that connects them. 6. Firewall ? Can either be software or hardware-based and is used to help keep a network safe. Its main objective is to control the incoming and outgoing traffic as it analyzes the data packets and determining whether it should be allowed through or not. 7. Server/Proxy Server ? operates on layer 7, 6, 3 of the OSI model 8. Star Network ? One of the most common network topologies. ...read more.


The VPN network is better described in part 2, basically being a private network utilizing public telecommunications (the internet). Through the VPN, we will be able to connect each of the store?s LANs together, allowing for wider-scale networking for the Dingo MobileCompany. Justification ? Taking into consideration that Dingo Mobile desires a connection between the store and the head office, I?ve selected a VPN network to cater for this. The VPN will allow DingoMobile to create a ?universal? network, and allowing the potential future stores to be connected also. How VPN fulfils future needs ?The VPN utilizes the internet, therefor it isn?t going to restrict the possible expansions that DingoMobile may require (being one of their future needs). If ever Dingo Mobile requires the sending of important data between head office/stores, the VPN will ensure that the data sent is encrypted, catering to the potential need for safety of transferred data. Considerations for the VPN ?The VPN should operate fine, and should continue to do so into the future. Since the VPN is created using the internet, so obviously things such as bandwidth, speed etc., may become an issue. Measures however can be taken to speed up the VPN, so it isn?t a vital issue that needs to be worried about. ________________ 3b) Development Process ? The existing system, from the information that I have been provided, basically includes no real networking (The information provided doesn?t indicate whether the store/office have actual networks setup individually, so I?m going to assume that they do not). ...read more.


4. Enabling Firewalls (Monitoring the Web Access at Firewalls) ? This builds onto the filtering URL/certain emails/files that are sent or accessed throughout the network. It allows you to monitor exactly what is being filtered, and keep track of related activity. EvaluatingtheNetworkSystem ?Methods must be utilized to also evaluate the health, speed and general performance etc. of the network, these methods will be used to evaluate the network system in periodical intervals, indicating to the business when and where maintenance must occur on the network system. 1. Benchmarking ? Certain programs can be used to compare the network against others in terms of performance. This would be a good indication to how DingoMobile?s network compares to other, similar networks. 2. CheckingtheNetworkUsage ? There are tools that the administrators can use, such as the ping function, to measure the network usage, and also the Round Trip Time. This can be a good indication to how the network is performing. 3. Reading through related Error Logs ? Reading the error logs relevant to the network will enable the reader to detect any issues, big or small, that may be occurring within the network. Checking this periodically will hopefully enable Dingo Mobile to pick up any problems occurring within the network. 4. Testing the Speed of the Network ? Sending files from one premise to the other using the VPN aspect of the network can be used to test the speed of the network, and this can then highlight if there is any issues such as packet-loss that are occurring, and hopefully allows DingoMobile to then find and solve these problems. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

This document is part of a wider set of coursework as indicated by the title (Task 6). The student has taken care to answer each section in reasonable detail and going as far as to include diagrams to further ...

Read full review

Response to the question

This document is part of a wider set of coursework as indicated by the title (Task 6). The student has taken care to answer each section in reasonable detail and going as far as to include diagrams to further explain the definition of terms involved in computer networks.

One major issue consistent throughout the document is the mention of the OSI model. Despite describing which components belong to which layer, the student does not actually explain what the OSI model itself is.

The student is advised, that in future, when the main focus of a topic depends on a particular system or standardisation, that it is given a brief explanation at the very least (e.g. its significance).

Level of analysis

Although not typically expected, the student could have included further reading material and references e.g. for the claim that a star topology is one of the most popular choices in implementing a network, and more importantly, why.

On the other hand, the student has however shown the appropriate analytical skills for this level of qualification, and in some cases, surpassing it by providing a consistent set of clear and concise definitions and functions for various networking terms throughout the document.

Quality of writing

The quality of writing is inconsistent, often varying from formal to informal statements. The student is advised to adopt a more consistent and formal approach for future coursework. In addition, page numbers and a table of contents is recommended as it helps referencing the document and viewing specific topics.

As indicated above, the student has indeed used the technical terms expected at this level of qualification and exceeded expectations.

Numerous grammatical errors are present throughout the document along with the use of American English (e.g. ‘analyze’ as opposed to ‘analyse’). It is strongly recommended that for future coursework, the student makes full use of a British English spelling and grammar tool.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 07/07/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    The Freedom of Information Act The FoIA is not included where more sensitive information is required, they cannot access all of this information because of the DPA (Data Protection Act 1998.) This limits them in what kind of information is allowed.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Logical decisions can be made by the processor. (The processor can use the ALU to decide whether one value is greater than another, or if one is negative,..., and then make decisions based on the answers) 3. Communication with peripheral devices is carried out via the ALU.

  1. Social Networking

    Let's look at the student progress in High school for a while; a Global Secure System performed a survey on 500 English school children between the age of 13 and 17. The result of this survey shows that 51% of student confirmed to being on SNS to check their profiles

  2. Computer systems assignment 1

    Windows XP can run and is compatible with a lot of applications which makes it useful in everyday life. The main purpose of it is multimedia for people who like to enjoy themselves. It offers various applications which are already built in such as Windows Media Player which is able

  1. Identify the constituent parts of a total computer system.

    This sort of operation requires very complex operating systems. Some general features of operating systems are: * they control the backing store and peripherals such as disk units and printers * they control the loading and running of programs * they organise the use of memory between programs * they organise processing time between programs and users * they

  2. Video Rental System

    Y ITEM_LONG_DESC Item Long Description Text 255 X(255) ITEM_RUNTIME Item Runtime Text 10 X(10) ITEM_LANG Item Language Text 100 X(100) ITEM_TYPE_ID Item Type ID Text 2 X(2) ITEM_TOTAL_STOCK Item Total Stock Number Long Int 0-99999999 ITEM_CURRENT_STOCK Item Current Stock Number Long Int 0-99999999 ITEM_RATING Item Rating Text 3 X(3)

  1. James. T. Russell and the Invention of the Compact Disc.

    * A laser, and a lens system that focuses in on and reads the bumps. * A tracking mechanism, which moves the laser assembly so that the laser's beam can follow (and be centered on) the spiral track. The tracking system has to be able to move the laser at micro resolutions.

  2. Hardware and software ICT revision notes

    Use the notes you made in Assignment 5 to revise the topics above Software Computer systems need software to make them work. You will need to learn the purpose of different types of software, including: * the ROM (start up and BIOS)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work