• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Networking Diagrams and Case Study

Extracts from this document...

Introduction

Task 6: Networking Diagrams 1. A) Define: 1. Workstation ? A computer or a dumb terminal that is connected to a network that inputs and outputs data and is often the ending point of a network, but not always. 2. IP Addresses - An IP Address is a multi-digit number assigned to each device in a network that uses the internet protocol (IP) to communicate. 3. Switch ? A switch is a networking device that connects network devices. A switch is also commonly known as a network bridge that routes data at the data link layer (layer 2) of the OSI model. 4. Router - A router is a device that forwards data packets between computer networks. The router reads the address of the packet to determine where its final destination. 5. WAN/LAN ? LAN is a network that connects computers in a smaller area such as a home. The difference between a LAN and a WAN are that a WAN is when two LAN?s are connected with a LEASED line that connects them. 6. Firewall ? Can either be software or hardware-based and is used to help keep a network safe. Its main objective is to control the incoming and outgoing traffic as it analyzes the data packets and determining whether it should be allowed through or not. 7. Server/Proxy Server ? operates on layer 7, 6, 3 of the OSI model 8. Star Network ? One of the most common network topologies. ...read more.

Middle

The VPN network is better described in part 2, basically being a private network utilizing public telecommunications (the internet). Through the VPN, we will be able to connect each of the store?s LANs together, allowing for wider-scale networking for the Dingo MobileCompany. Justification ? Taking into consideration that Dingo Mobile desires a connection between the store and the head office, I?ve selected a VPN network to cater for this. The VPN will allow DingoMobile to create a ?universal? network, and allowing the potential future stores to be connected also. How VPN fulfils future needs ?The VPN utilizes the internet, therefor it isn?t going to restrict the possible expansions that DingoMobile may require (being one of their future needs). If ever Dingo Mobile requires the sending of important data between head office/stores, the VPN will ensure that the data sent is encrypted, catering to the potential need for safety of transferred data. Considerations for the VPN ?The VPN should operate fine, and should continue to do so into the future. Since the VPN is created using the internet, so obviously things such as bandwidth, speed etc., may become an issue. Measures however can be taken to speed up the VPN, so it isn?t a vital issue that needs to be worried about. ________________ 3b) Development Process ? The existing system, from the information that I have been provided, basically includes no real networking (The information provided doesn?t indicate whether the store/office have actual networks setup individually, so I?m going to assume that they do not). ...read more.

Conclusion

4. Enabling Firewalls (Monitoring the Web Access at Firewalls) ? This builds onto the filtering URL/certain emails/files that are sent or accessed throughout the network. It allows you to monitor exactly what is being filtered, and keep track of related activity. EvaluatingtheNetworkSystem ?Methods must be utilized to also evaluate the health, speed and general performance etc. of the network, these methods will be used to evaluate the network system in periodical intervals, indicating to the business when and where maintenance must occur on the network system. 1. Benchmarking ? Certain programs can be used to compare the network against others in terms of performance. This would be a good indication to how DingoMobile?s network compares to other, similar networks. 2. CheckingtheNetworkUsage ? There are tools that the administrators can use, such as the ping function, to measure the network usage, and also the Round Trip Time. This can be a good indication to how the network is performing. 3. Reading through related Error Logs ? Reading the error logs relevant to the network will enable the reader to detect any issues, big or small, that may be occurring within the network. Checking this periodically will hopefully enable Dingo Mobile to pick up any problems occurring within the network. 4. Testing the Speed of the Network ? Sending files from one premise to the other using the VPN aspect of the network can be used to test the speed of the network, and this can then highlight if there is any issues such as packet-loss that are occurring, and hopefully allows DingoMobile to then find and solve these problems. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

This document is part of a wider set of coursework as indicated by the title (Task 6). The student has taken care to answer each section in reasonable detail and going as far as to include diagrams to further ...

Read full review

Response to the question

This document is part of a wider set of coursework as indicated by the title (Task 6). The student has taken care to answer each section in reasonable detail and going as far as to include diagrams to further explain the definition of terms involved in computer networks.

One major issue consistent throughout the document is the mention of the OSI model. Despite describing which components belong to which layer, the student does not actually explain what the OSI model itself is.

The student is advised, that in future, when the main focus of a topic depends on a particular system or standardisation, that it is given a brief explanation at the very least (e.g. its significance).

Level of analysis

Although not typically expected, the student could have included further reading material and references e.g. for the claim that a star topology is one of the most popular choices in implementing a network, and more importantly, why.

On the other hand, the student has however shown the appropriate analytical skills for this level of qualification, and in some cases, surpassing it by providing a consistent set of clear and concise definitions and functions for various networking terms throughout the document.

Quality of writing

The quality of writing is inconsistent, often varying from formal to informal statements. The student is advised to adopt a more consistent and formal approach for future coursework. In addition, page numbers and a table of contents is recommended as it helps referencing the document and viewing specific topics.

As indicated above, the student has indeed used the technical terms expected at this level of qualification and exceeded expectations.

Numerous grammatical errors are present throughout the document along with the use of American English (e.g. ‘analyze’ as opposed to ‘analyse’). It is strongly recommended that for future coursework, the student makes full use of a British English spelling and grammar tool.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 07/07/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Social Issue Essay

    After considering the issues outlined, I believe that responsibility is not something which a scientific researcher should have to take into consideration when conducting their work. The role of the researcher is to make progress in the world of science, whether this is in the field of genetic engineering, artificial intelligence or nuclear power.

  2. Video Rental System

    Since a purchase order can contain more than one item, each purchase order will have multiple entries. Similarly the Purchase order has "VEND_NAME" and "VEND_ID". Each Vendor can place more than one purchase order. There will be repetition of the "VEND_NAME" and other vendor related details.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    5. A department store decides to place a computer system by the main entrance to the store so that customers can find out whereabouts in the store items are available. The different departments remain in the same places, but the articles available in each department change on a regular basis.

  2. Different ways of data capture

    the swapping of the contents of memory out to disk known as virtual memory because it makes the comp appear to have more memory than it actually does. Resource allocation and scheduling: OS is responsible for allocating processing time, memory and input output resources.

  1. Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The ...

    VoIP- is when vocally communicating with another person whilst using a computer over the internet. Online gaming- is a service which allows you to interact with people around the world and play against them over the internet. Login (controlled) Remote Logins VPN DHCP DNS D.)

  2. Assess the relative advantages of Quantitative research data and Qualitative

    Another disadvantage is generalisation as the researcher can't be everywhere observing large numbers of people so it is not possible to generalise from the findings. Researchers are more likely to impose their own interpretations and meanings onto behaviour they observe.

  1. Introduction to Viruses

    > Fast and Slow Infectors Viruses that infect in a particular way to try to avoid specific Anti-virus software. > Sparse Infectors Viruses that don't infect very often. > Armored Viruses Viruses that are programmed to make disassembly difficult. > Multipartite Viruses Viruses that may fall into more than one of the top classes.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    This would most definitely enable the staff to be more efficient as in if there was new software that comes in they would be prepared as to what to do. If a company did not have a training policy they would most probably be uninformed as to what they would need to do.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work