• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Use of Big IP in Gamer.TV.

Extracts from this document...


The Use of Big IP in Gamer.TV Introduction: The aim is to find out about a particular piece of software used in a Business and write a report on it. To start this I needed to find out about a company and what piece of software they use so that I can gather some information on what the software is and does, and also be ready to see it in action. I chose a company called Gamer.TV because it's a large multi-national company that uses many different types of software, whilst also making some of the software themselves. Their most important piece of software that the company uses and keeps the company running is their Load Balancing Software called Big IP by F5 Networks. I thought this would be the best software for me to do because it there would be a lot for me to look at and therefore write about. Also I thought it would be the most interesting. Load Balancing is where you have a range of servers and as users make requests the software directs the user through one of the servers, it sends the user through a particular server if that server happens to be quicker than the others at that time. This service depends on the way the software and hardware has been set up. Gamer hosts a large number of different features including, turn based games (TBG), Single player games (SPG), Forums, Private Messaging Buddy List. TBG's are games that two or more players can play and they take turns such as Dinky Bomb. ...read more.


Big IP is also a good piece of software due to the fact that it runs alongside so much other software, such as What's Up Gold and Gamers Lobby system etc. So many of the Load Balance software's I have looked at during this project required certain software to run alongside. This is more complicated for the business and the Administrators. Software Users and User Role: They use XP Pro for their Operating system this is because it is easier to set up a VPN line because XP Pro comes with the VPN line built in. The Software is more of specialised software so there are not many users, plus it pretty much runs itself except for the monitoring part. It has to be monitored by the people in the NOC and he technicians/Systems Administrator, this is because if one of the servers does go down, then one of them can swap it over, and the software will e-mail the technicians to say that the server is down and needs repairing. Once this e-mail has gone out and the technicians have repaired the fault it will generally stay as the redundant server until the Systems Administrator decides to have the working server in for maintenance. This usually happens at Gamer about every 6 months where the working server gets swapped with the redundant. Gamer.TV have one database and if it went down then all of their system would go down. Everything that Gamer has on their Website is in the database so nothing would work. This means that every week the database needs to be backed up, they do this by having two different arrays. ...read more.


He would act as a Systems Administrator, so basically it hasn't taken jobs away it's just taken some of their job description away, however as ICT grows, so does their work. Data Protection Act The data protection act doesn't really count in this case because it's about servers not about information that could be used in a harmful way, obviously inside the company there would be things set in place so that the privacy act is kept. Security The security is high at gamer, they have plenty of security guards and also to get into the building you have to have a special electronic pass. To get on to the computers or the network you need a special user name and password this is set up by the network specialist which means he deals with any problems with the privacy and the users who use the network. How Big IP was brought into the company Big IP was brought into the company after it was researched and found out to suite their system best. They installed the software onto their servers and they had some minor faults such as it was giving improper readings via their monitoring system, but they sorted out the bugs by going to F5 Networks and asking what they could do and they responded by sending an special upgraded version to them that would clear the problems that they were having. Backing Up It would be very difficult to back up Big IP but they do back up the days events and all the print screens of the monitoring system which would then incorporate some of Big IP's information. 1 05-12-2003 David Mckeown ICT Coursework Mrs Dickenson Administration Module ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    Also it is difficult to see a pattern in cybercrimes. Cybercrime is still developing, there are more viruses every day, it is the fastest moving type of crime. This may be because many people may be committing cyber crime without knowing it, for example people may not know when they are downloading music illegally.

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Describe the countermeasures available to an organisation that will reduce the risk of damage to physical systems - P4 - Task 2 The physical side of computing may not seem that important at all but it is. Teign and Tow really need to maintain their physical systems in order for the systems to run with distinction.

  1. The Sullivan's matrix report

    (Ward & Peppard, 2002 p470) There are four types of information culture defined by Marchand (1995): Functional Culture Within this culture it is the managers prerogative regarding which information is made available to the staff. It also follows a hierarchical structure regarding information sharing.

  2. implementation of an ITC system

    The accounts will be based on a POP3/SMTP server. The connection will be encrypted with 256bit encryption. (Encryption is a way of coding the information in a file or e-mail message so that if it is intercepted by a third party as it travels over a network it cannot be read.

  1. Building Local Area Networks

    sutable PCMCIA wireless cards that will allow the laptops to integrate with the WLAN efficiently brought a number of different products to my attention. Through careful consideration and a comparison of the main characteristics of each product, the most appropriate wireless card to install is the D-LINK DWL G650.

  2. The new era of Offshore IT Outsourcing.

    The high paying salary and trips to the US enable engineers there to maintain a comfortable lifestyle. A typical day at work is filled with meetings, writing code and emailing his clients in the US (Pink 1). Indian investors have a different perspective on outsourcing. Take the example of Mr.

  1. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    The synchronization of the databases is done through the exchange of Database Summary (DS) packets. These describe the PNNI Topology State Elements (PTSEs) that a node has in its database. In response to these packets a node requests the PTSEs that it does not have from its neighbors.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    No terminators required Disadvantages o Failure of one computer can affect the whole network o Adding and removing the nodes can disrupts network o Costly Wiring o Expensive Adaptor Cards o Lost of token means cant communicate Details of Token Ring Topology Topology Cable Connector Hardware Software Protocol Single Point

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work