• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24

Computer networks: Operation and application

Extracts from this document...


Computer networks: Operation and application Abstract In the definition of he coursework the iTekx Company Plc has basically five different departments with the number of computers. The computers of the different departments have to be connected with the computers with their own departments. For that I have define a LAN for each departments so the computers of each departments are connected with the one common switch. Each department is having its own switch. Secondly each departments should be connected with other departments because to share the business information with the other departments as the information of the one department can be used by some another department. To solve this problem I have put one router and connect each switch of different department with it. So the information can be pass out via router to another department. I have defined IP addresses to each department and subnets and subnets mask of different departments. I have used different books and used many websites to solve out this definition of the coursework. Introduction Subnetting Scheme Firstly, iTekx company has the IP address Basically it shows it is the class c address. In the IP address format is 32 bit in length and it has two parts: the network number or address and the host number or address. Normally IP addresses are binary in nature, but they are expressed in a format that can be read by the human eye. This 3 bit address are divided into four section of 8 bits. It is known as octets. Each of this octets is then converted into decimal format and separated by dots. ...read more.


So the remaining 30 network address within this network can be assign to the hosts in the network. Like the above diagram all the departments have this kind if IP addresses and the host addresses. . . . . . . Training Dept 1 Training Dept 2 The iTekx company has the two training department called Training department 1 and training department 2, T1 is having 14 host in its network and T2 has 12 hosts in its network. . . . . . . MMC R'n'D On the first floor of the iTekx company there are two departments called MMC and R'n'D department having 16 and 24 hosts in each department. ` The above diagram shows the basic network diagram of the Administration department, training department 1 and the training department 2. The network address are given to the each host of the network. All the host are connected to the switch via Ethernet. The network address is also given too the switches are 192,168.10.33 (Admin Dept), (Training 1), (Training 2), (MMC),'n'D). This network connection enables the host of each department to connect the other host of the same department. As we have already assign the Network address to all the hosts of the each departments. We need to assign the network address to each switch of the departments. After establish the network within the different departments, we need to establish the connection between the all the departments because may the information of the different department can be used by the another departments. ...read more.


The advantages of this mechanism are that every incoming packet must transits two filters and one application gateway to go in or out. Conclusion and further work: The network design which I have used in my coursework, I think it is the quality solution of the given application of the iTekx company Plc. Firstly I have thought it is a small company, and the design of the network is smaller too. There are mainly five departments each department is having minimum of 10 and maximum of 24 computers or hosts. I have use the quality of equipments which are really cheaper then other costly available networking devices. This can be very easily efforts by the small company like iTekx Company Plc. In the conclusion of my coursework I feel that the network part like subnetting, routing, cabling, switching, which is represented in the diagrams are the good solution for the iTekx company Plc with the proper security solutions. But I can implement more security on this network bye using NAT technology. Which are mostly used by the private networks to prevent the unauthorized access and internet threats. Reference and supporting materials I have used merely two books to understand the concepts and the definitions of the network and the network devices. These books are - Interconnecting Cisco Network Devices - CISCO Systems - Computer Networks - Andrew S. Tanenbaum Even I have got some useful information from the internet websites too. These websites are. - http://www.sethenol.com/subnetex.htm - http://www.rhyshaden.com/ipadd.htm - http://www.ralphb.net/IPSubnet/subnet.html Introduction:- The iTekx company Plc has mainly five departments with the number of Computers. The company has two floors with 100 meters in height and 130 meter of weight. The administration department is the main remote department, and the other departments are Training 1 and 2, multimedia centre and R'n'D department. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Do you have an overdue fee system in place for late rentals? 19. What type of information would you like to be extracted from the new system? 20. How long would you like the system to hold records before they are deleted?

  2. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    There is only one person in the company who has experience of using and maintain a blog; this is a Mr. Andrew Dufrain. He cannot take part in this task though as he is head of marketing and this doesn?t affect his area of work.

  1. Peer reviewed

    Networking Systems. Network Cabling, Network Interface Cards,Network Connectivity

    3 star(s)

    stored on a main server then accessed by the client (Doctors and Nurses) * What security requirements must be in place? There should be a few fundamental requirements in place as the database would include very fragile details of many patients.

  2. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    Each separate provider is accountable for "posting" messages from its members. Incoming messages are "flooded" through the system until all the providers have completely their jobs. Newsgroups are divided into particular topics, which provide the focus fro the newsgroup's discussion.

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    Principle 2 The drawbacks of this will be people get annoyed when you keep asking who they are. Unless you employ sneaky tactics, you are not going to get people to sign up for marketing information. The ones that do are probably email addresses they have set up and never

  2. Selecting a suitable computer system

    The Mac OS snow leopard is a far more efficient OS when compared to Windows due to the fact that it's not susceptible to viruses and its stunning user interface. Every button has a glassy feel and all applications are organised very well.

  1. ict as level coursework

    I will had to double click the command button i.e. the exit button. A dialogue will appear on the screen. This is what links each user form together via the command buttons. The exit button is command button 5 therefore I will fill in the relevant caption there.

  2. Database Analysis & Design

    The non-functional requirements which have been set are also addressed within this section. Within this stage testing is a vital and important ongoing activity. This stage is separated into the following sections; all these must be completed before the next stage can be started.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work