• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24

Computer networks: Operation and application

Extracts from this document...

Introduction

Computer networks: Operation and application Abstract In the definition of he coursework the iTekx Company Plc has basically five different departments with the number of computers. The computers of the different departments have to be connected with the computers with their own departments. For that I have define a LAN for each departments so the computers of each departments are connected with the one common switch. Each department is having its own switch. Secondly each departments should be connected with other departments because to share the business information with the other departments as the information of the one department can be used by some another department. To solve this problem I have put one router and connect each switch of different department with it. So the information can be pass out via router to another department. I have defined IP addresses to each department and subnets and subnets mask of different departments. I have used different books and used many websites to solve out this definition of the coursework. Introduction Subnetting Scheme Firstly, iTekx company has the IP address 200.5.6.0. Basically it shows it is the class c address. In the IP address format is 32 bit in length and it has two parts: the network number or address and the host number or address. Normally IP addresses are binary in nature, but they are expressed in a format that can be read by the human eye. This 3 bit address are divided into four section of 8 bits. It is known as octets. Each of this octets is then converted into decimal format and separated by dots. ...read more.

Middle

So the remaining 30 network address within this network can be assign to the hosts in the network. Like the above diagram all the departments have this kind if IP addresses and the host addresses. 192.168.10.64 192.168.10.65 192.168.10.66 . . . 192.168.10.95 192.168.10.96 192.168.10.96 192.168.10.97 192.168.10.98 . . . 192.168.10.126 192.168.10.127 Training Dept 1 Training Dept 2 The iTekx company has the two training department called Training department 1 and training department 2, T1 is having 14 host in its network and T2 has 12 hosts in its network. 192.168.10.128 192.168.10.129 192.168.10.130 . . . 192.168.10.158 192.168.10.159 192.168.10.160 192.168.10.161 192.168.10.162 . . . 192.168.10.190 192.168.10.191 MMC R'n'D On the first floor of the iTekx company there are two departments called MMC and R'n'D department having 16 and 24 hosts in each department. ` The above diagram shows the basic network diagram of the Administration department, training department 1 and the training department 2. The network address are given to the each host of the network. All the host are connected to the switch via Ethernet. The network address is also given too the switches are 192,168.10.33 (Admin Dept), 192.168.10.65 (Training 1), 192.168.10.96 (Training 2), 192.168.10.129 (MMC), 192.168.10.161(R'n'D). This network connection enables the host of each department to connect the other host of the same department. As we have already assign the Network address to all the hosts of the each departments. We need to assign the network address to each switch of the departments. After establish the network within the different departments, we need to establish the connection between the all the departments because may the information of the different department can be used by the another departments. ...read more.

Conclusion

The advantages of this mechanism are that every incoming packet must transits two filters and one application gateway to go in or out. Conclusion and further work: The network design which I have used in my coursework, I think it is the quality solution of the given application of the iTekx company Plc. Firstly I have thought it is a small company, and the design of the network is smaller too. There are mainly five departments each department is having minimum of 10 and maximum of 24 computers or hosts. I have use the quality of equipments which are really cheaper then other costly available networking devices. This can be very easily efforts by the small company like iTekx Company Plc. In the conclusion of my coursework I feel that the network part like subnetting, routing, cabling, switching, which is represented in the diagrams are the good solution for the iTekx company Plc with the proper security solutions. But I can implement more security on this network bye using NAT technology. Which are mostly used by the private networks to prevent the unauthorized access and internet threats. Reference and supporting materials I have used merely two books to understand the concepts and the definitions of the network and the network devices. These books are - Interconnecting Cisco Network Devices - CISCO Systems - Computer Networks - Andrew S. Tanenbaum Even I have got some useful information from the internet websites too. These websites are. - http://www.sethenol.com/subnetex.htm - http://www.rhyshaden.com/ipadd.htm - http://www.ralphb.net/IPSubnet/subnet.html Introduction:- The iTekx company Plc has mainly five departments with the number of Computers. The company has two floors with 100 meters in height and 130 meter of weight. The administration department is the main remote department, and the other departments are Training 1 and 2, multimedia centre and R'n'D department. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    Failing this I may need to offer some level of literature which can educate them with the blog aspect of the website. As EVDOP Live would like a database for their company booking system, it can be said that there will be some level of training required with the software which will be sued: Microsoft Access.

  2. Peer reviewed

    Networking Systems. Network Cabling, Network Interface Cards,Network Connectivity

    3 star(s)

    Passwords should be priority, then start to think about hacking, so for piece of mind a firewall too. * How will the users access the internet? This would be accessed by a shared connection. * Will the users have to be network experts?

  1. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    Together TCP/IP governs the connection of computer systems to the Internet. 1984 - Domain Name Addressing System Implemented by ARPANET in 1984, the Domain Name System, or DNS, is an internet service that translates domain names into IP addresses. Initially when the Internet had just begun, systems were identified by

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    JavaScript or also known as ECMAScript is as follows:- JavaScript is the world's most popular scripting language invented by Netscape to add interactivity to web pages. It supports all major browsers, eg., IE, FireFox, Chrome, etc. JavaScript has read and write capability of HTML and can dynamically change text.

  1. Selecting a suitable computer system

    The finder application searches through the hard drive at incredible speeds to look for a document or another application. It has a futuristic feel that Windows Vista and 7 have recently tried to emulate, however, the original is always the best.

  2. Database Analysis & Design

    The main key within this methodology is the user involvement. This helps keep an effective and efficient project, this allows both the users and the developers to share the workplace in which the project is being created. The advantage of this allows decisions to be made more accurately.

  1. Website Design, Creation and Evaluation

    This can cause compatibility problems with different browsers. HTML is also static, and offers no dynamic qualities. XML Extensible Markup Language (XML) is a specification for the creation of custom markup languages. It allows the user to define the markup elements themselves. Although very similar in syntax to HTML, XML is different in that it separates structure and display, making XML more portable.

  2. HCI is known for Human Computer Interaction, and basically it interacts with user and ...

    as it has computer chip installed, for example, Mobile Phone, washing machine, ATM (cash machine), parking ticket machine, etc. Here is an example of where HCI is used; Mobile Phone is the obvious tool that contains a computer chip, and HCI is highly involved during the transactions made by the users.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work