• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Networking Diagrams and Case Study

Extracts from this document...

Introduction

Task 6: Networking Diagrams 1. A) Define: 1. Workstation ? A computer or a dumb terminal that is connected to a network that inputs and outputs data and is often the ending point of a network, but not always. 2. IP Addresses - An IP Address is a multi-digit number assigned to each device in a network that uses the internet protocol (IP) to communicate. 3. Switch ? A switch is a networking device that connects network devices. A switch is also commonly known as a network bridge that routes data at the data link layer (layer 2) of the OSI model. 4. Router - A router is a device that forwards data packets between computer networks. The router reads the address of the packet to determine where its final destination. 5. WAN/LAN ? LAN is a network that connects computers in a smaller area such as a home. The difference between a LAN and a WAN are that a WAN is when two LAN?s are connected with a LEASED line that connects them. 6. Firewall ? Can either be software or hardware-based and is used to help keep a network safe. Its main objective is to control the incoming and outgoing traffic as it analyzes the data packets and determining whether it should be allowed through or not. 7. Server/Proxy Server ? operates on layer 7, 6, 3 of the OSI model 8. Star Network ? One of the most common network topologies. ...read more.

Middle

The VPN network is better described in part 2, basically being a private network utilizing public telecommunications (the internet). Through the VPN, we will be able to connect each of the store?s LANs together, allowing for wider-scale networking for the Dingo MobileCompany. Justification ? Taking into consideration that Dingo Mobile desires a connection between the store and the head office, I?ve selected a VPN network to cater for this. The VPN will allow DingoMobile to create a ?universal? network, and allowing the potential future stores to be connected also. How VPN fulfils future needs ?The VPN utilizes the internet, therefor it isn?t going to restrict the possible expansions that DingoMobile may require (being one of their future needs). If ever Dingo Mobile requires the sending of important data between head office/stores, the VPN will ensure that the data sent is encrypted, catering to the potential need for safety of transferred data. Considerations for the VPN ?The VPN should operate fine, and should continue to do so into the future. Since the VPN is created using the internet, so obviously things such as bandwidth, speed etc., may become an issue. Measures however can be taken to speed up the VPN, so it isn?t a vital issue that needs to be worried about. ________________ 3b) Development Process ? The existing system, from the information that I have been provided, basically includes no real networking (The information provided doesn?t indicate whether the store/office have actual networks setup individually, so I?m going to assume that they do not). ...read more.

Conclusion

4. Enabling Firewalls (Monitoring the Web Access at Firewalls) ? This builds onto the filtering URL/certain emails/files that are sent or accessed throughout the network. It allows you to monitor exactly what is being filtered, and keep track of related activity. EvaluatingtheNetworkSystem ?Methods must be utilized to also evaluate the health, speed and general performance etc. of the network, these methods will be used to evaluate the network system in periodical intervals, indicating to the business when and where maintenance must occur on the network system. 1. Benchmarking ? Certain programs can be used to compare the network against others in terms of performance. This would be a good indication to how DingoMobile?s network compares to other, similar networks. 2. CheckingtheNetworkUsage ? There are tools that the administrators can use, such as the ping function, to measure the network usage, and also the Round Trip Time. This can be a good indication to how the network is performing. 3. Reading through related Error Logs ? Reading the error logs relevant to the network will enable the reader to detect any issues, big or small, that may be occurring within the network. Checking this periodically will hopefully enable Dingo Mobile to pick up any problems occurring within the network. 4. Testing the Speed of the Network ? Sending files from one premise to the other using the VPN aspect of the network can be used to test the speed of the network, and this can then highlight if there is any issues such as packet-loss that are occurring, and hopefully allows DingoMobile to then find and solve these problems. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

This document is part of a wider set of coursework as indicated by the title (Task 6). The student has taken care to answer each section in reasonable detail and going as far as to include diagrams to further ...

Read full review

Response to the question

This document is part of a wider set of coursework as indicated by the title (Task 6). The student has taken care to answer each section in reasonable detail and going as far as to include diagrams to further explain the definition of terms involved in computer networks.

One major issue consistent throughout the document is the mention of the OSI model. Despite describing which components belong to which layer, the student does not actually explain what the OSI model itself is.

The student is advised, that in future, when the main focus of a topic depends on a particular system or standardisation, that it is given a brief explanation at the very least (e.g. its significance).

Level of analysis

Although not typically expected, the student could have included further reading material and references e.g. for the claim that a star topology is one of the most popular choices in implementing a network, and more importantly, why.

On the other hand, the student has however shown the appropriate analytical skills for this level of qualification, and in some cases, surpassing it by providing a consistent set of clear and concise definitions and functions for various networking terms throughout the document.

Quality of writing

The quality of writing is inconsistent, often varying from formal to informal statements. The student is advised to adopt a more consistent and formal approach for future coursework. In addition, page numbers and a table of contents is recommended as it helps referencing the document and viewing specific topics.

As indicated above, the student has indeed used the technical terms expected at this level of qualification and exceeded expectations.

Numerous grammatical errors are present throughout the document along with the use of American English (e.g. ‘analyze’ as opposed to ‘analyse’). It is strongly recommended that for future coursework, the student makes full use of a British English spelling and grammar tool.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 07/07/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    This is all done in a notebook. 1.3. Describe the problems The current system has a lot of forms, some containing the same data or information. These have to be hand written by Luki which can take a long time to complete fully.

  2. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    And in its emphasis on small teams, short, iterative development cycles and an avoidance of prolonged requirements gathering up front, it shares many similarities with the extreme programming or agile development methodologies which still remain in vogue. As well as denoting a formal software development methodology, the phrase rapid application

  1. Peer reviewed

    Equipment needed for a Graphic PC

    4 star(s)

    Software Packages There are two types of graphics, Vector and Bitmap. Vector images are made up of many individual objects. These objects are defined by mathematical equations rather than pixels whereas Bitmap graphics use dots (pixels) to create the image.

  2. Hardware and software ICT revision notes

    which is a user friendly method of showing information on screen graphically. It lets you start programs, choose commands and other options by using the mouse to click icons (symbols) and lists of menu items. You no longer need to remember complicated commands.

  1. Video Rental System

    Long Int 1-99999999 Y PK, FK CUSTOMER ITEM_ID Item ID Number Long Int 1-99999999 Y PK RENTAL_DATE Item Rented date Date/Time dd/mm/yyyy hr:min:sec am/pm RENTAL_DUE_DATE Item rented Due date Date/Time dd/mm/yyyy hr:min:sec am/pm CUSTOMER_RENTAL_HISTORY CUS_ID Customer ID Number Long Int 1-99999999 Y PK,FK1 CUSTOMER ITEM_ID Item ID Number Long Int

  2. Computer systems assignment 1

    card takes the information and puts pixels in the same way as requested and then sends it to the monitor through a cable to display it on the screen. Another example could be a CPU receiving information from RAM, processing it and sending it further to another component.

  1. Growth and Influence of Computers and Computing

    For example, battery lives may not get much better for a while as it will be replaced for a sleeker, thinner looking device.

  2. Small Office Network Implementation - hardware and security.

    the computers on your internal network, must be protected from Internet attacks. This can be done using a combination of translation and firewall technologies. * Preferences and knowledge of installer- the network configuration is invariably influenced by the knowledge, experience, and personal preferences of the person installing the network components.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work