This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
With a network there are a lot of computers connected with each other. The network collection allow the computers to share data, transfer data and share resources and information
Based on their quantity networks can be classified as Local Area Network (LAN), Wide Area Network (WAN)
In this report I am going to look at different types of network technologies and chose a suitable network technology for my client (MRB engineering co) I am going to talk about the advantages and disadvantages of different types of network technology and the chosen network technology for my client (MRB engineering co).
Local Area Network
A local area network is a computer network which is covering a small area of computers like home, offices and such as schools and also airports uses a local area network.
A local area network is a network which is used by the schools because where ever you are in the school building you could access your information from any computer with a network connection.
A local area network is also used for connecting printers and scanners to computers. If there was no network used for the computers a printer would be required for all the individual computers and which does cost a lot of money so a network connection only requires one printer and scanner which is linked with all the computers in a building and allows individuals to print or scan
Wide Area Network
A wide area network is a network which covers a wide area for example around the worlds which allows someone to access data from any where in the world.
The internet is a Wide area network which allows people from around the world to access any information where ever they are.
A wide area network is a network used to connect local area network together so that all the computers could communicate with each other telephone companies often use a wide area network to communicate with one country to another country one city to another city.
Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g. Client-server and Peer-to-peer.
A client server is a network which allows individuals to access information form a server. A server is used to store all the information and data of people for example a server is used in schools which allows students and teachers to access they information from any computer because the data is stored on to the server.
All the data is stored on the servers, which is safe and secured
Only the particular person can access the data and no other person can access the data without the permission of the administrator.
If a computer is damaged the saved data wont get lost of damaged because all of your work will be stored on the server.
If you wonted to install an software on to the network you only would have to install it on to the server once which would be accessible from any computer within the organisation.
If you wanted to back-up any work you wouldn't have to go to the individual computers to back-up the date you only would have to back up the server because it contains all the work.
If the server is down or not working you won't be able to access any of your work which may waste your time.
If the server is down you might not be able to log in to the computer systems.
If the server is used a lot it will start to run slower than normal which may be time wasting until it starts to work as normal.
A Peer-to-peer networking eliminates the need for central servers allowing all computers to communicate and share resources as equal such as sharing Music file, instant messaging and other popular network applications.
This type of networking has been popular with smaller businesses and home users for several years.
A Peer-to-peer networking is a way to connect several computers so that they can communicate with each other without using a main server.
The cost of a peer-to-peer network costs less and is a perfect simplicity
Experts used to recommend peer-to-peer if you had 10 computers or less. That criterion is not as meaningful today since newer technology has expanded the number of computers that can be connected using this configuration.
The system is not centralised making difficult for administration
With the network there is Lack of security and no computer in the network are reliable.
Wireless is a network which is designed to connect wirelessly with a network devise for example a wireless network is used in an airport which allows the workers to access basic data from their PDA. This network allows different types of hardware to connect without a use of a wire.
No wires required to connect to the internet/network
Connection could be slow
Hackers could hack in to your files using the wireless connection, security required.
After looking at all the network types I am going to choose a client server network because this network requires a server and it will allow the staff at (MRB engineering co) to share resources and data. Also this type of network will store all the data on a server which will be safe. By using this network there is an advantage if one of the computers is damaged it will not affect any other computer which is important for my client (MRB engineering co). If you wanted to back-up any work you wouldn't have to go to the individual computers to back-up the data you only would have to back up the server because it contains all the work.
There are some dis advantages about this network which I have to consider-in-mind. The main disadvantage is if the server is down or not working you won't be able to access any of your work which may waste your time. To overcome this problem I would recommend my client a backup server which will also back up all the data on the server and also work as a backup server if the main server is down or not working.
I am now going to talk about the tropology's used in a network and I will also choose a suitable tropology for my client.
The type of network topology in which each of the nodes of the network is connected to two other nodes in the network and with the first and last nodes being connected to each other, forming a ring - all data that is transmitted between nodes in the network travels from one node to the next node in a circular manner and the data generally flows in a single direction only.
A network is connected to two other nodes in the network
All the files and data is transmitted between nodes in the network
The network travels from one node to another in order
Expansion of the system has a small impact on performance
All the stations give a equal access for users
If one computer is broken down all the other computers won't work
A bus topology is a network signal which travels from one end of the network to the other like a bus.
Signals are broadcasted to all work stations
Only one computer can connect to the network at a time
Easy to implement and extend
If one computer is broken it won't affect the other computers
Data flows back and forth
Difficult to control/ troubleshoot
Service charge may be high in the long term
A mesh network is a local area network (LAN) that employs one of two connection arrangements, full mesh topology or partial mesh topology. In the full mesh topology, each node (workstation or other device) is connected directly to each of the others. In the partial mesh topology, some nodes are connected to all the others, but some of the nodes are connected only to those other nodes with which they exchange the most data.
A star network is a local area network (LAN) in which all nodes are directly connected to a common central computer. Every workstation is indirectly connected to every other through the central computer. In some star networks, the central computer can also operate as a workstation.
If one computer brakes down or has a fault it won't affect any other computer in the organisation.
You could back-up all of the data from the server.
If the server is not working the entire computers linked to the network will stop working.
If the server has no space left to save any work you would have to buy another one which does cost a lot of money
All the computers are connected to a hub
All the data must pass the hub
Data travels back and forth
After looking at the topologies I am going to choose a star network tropology for my client this network topologies will be suitable for my client because this network is a like a star which all the computers are connected to a server. If one of the computers is damages it will not affect any other computers also all the staff at the company will be able to share data between them.
Hardware required for the network
For the network you require some hardware's which will allow the network to work properly.
There are some physical components which the network will require to work correctly
These are the security measures that would be carried to ensure that the network would be secure.
Looking at my clients requirements I think they need to have a good security tool to prevent any unauthorised person to access the network. They will require security to prevent hackers to access the network system. Also for the network the company would require a backup server to backup all files which are stored on the main server this will be beneficial if the main server is damaged or corrupted I would recommend my client to back-up all the files on the main server every week this will prevent data loss. Each staff working at the company will require a user name and a password which will allow them to access the network. Also on the network i would have a firewall system set up which will protect the network for any unauthorised information to access the network. The firewall will also prevent any harmful data to enter the system.
Make sure that all the equipment, components and devices are correctly connected
Not allowing users to install/uninstall programs and application on the computer and network
Install Virtual hard drive to the network for all users
Attach Security Devices to the computers systems. If someone did try to steal the equipment they can not. You can use computer cages
No other devices can be used and installed on the network without the network manager being informed such as pen drives, cd, and floppy
Users have there own log in and password. The user be able to access there own data. Network administrator can reset the password if the user has forgotten
Make sure that the anti virus is always enabled and never disabled. Most importantly updated whenever there is an update available
Set access and privileges levels depending on the user.
Cable and components
Cat 5 RJ45 network cable- this cable is require linking up all the network points which will allow the user to access information from the server. The RJ46 cables will be installed all around the building where ever there is a network point.
Network point's outlet- these hardware's are the outlet points which will allow the user to connects the patch cable which will be connected to the computers and the printers. These outlets will be placed all around the building wherever there is a computer or a printer all together the building will require 10 network points for the computers and printers. Each network point will connect two devices for example a computer and a printer.
Patch cables- patch cables are cables which are used to connect the computers and printers to the network point outlet. The amount of the patch cables require depends on the amount of computers and printers required in the company.
The patch cables need to be compatible with the RJ45 cable the connecter's need to be compatible with the RJ45 cable.
Network interface card- A network interface card is hardware which is required in all of the computers in SIC this hardware component is used to connect the patch cable to the computer. The patch cable is connected to the network interface card which is connected to the computer.
RJ45 Patch panel- this piece of equipment will be needed to connect all the network points to the server. The RJ45 Patch Panel is used to link up all the network points which will allow the user to access data from the server.
Switch/Hub-a switch is required for my client to connect the Server to the router which will allow my client to have internet access.
Servers- my client requires a file server which will allow the member of staff to connect to the network. They require one file server which will hold all the data files in the company.
Router- A router is a hardware which is provided by the ISP (internet service provider) which allows the network to access the internet (World Wide Web) a router transfer's data and receives data which allows the user to connect to the internet. This devise is required for the SIC company because they need to have access to the internet.
Ethernet Card- A Ethernet card is used to connect the patch cables to the network points. An Ethernet card is a hardware which is installed on each computer in the company.
Back-up server- A back-up server is a server which is used as a data back-up for the file server.
Software for network
Network operating system - A network operating system is a software which controls the operation of the entire network in in an organisation. My client could use Microsoft server 2008 because this server is easy to use and maintain.
Server operating system- A server operating system controls operations and communication of all the servers. You could also use Microsoft server 2008 for this.
Ethernet Card software-All the computers in the company will require an Ethernet Card software to allow the computer to connect to the network. Without the software the Ethernet card on all the computers won't work.
Network Drivers- A network Driver software is software which allows the internet cards to work without the network driver the computers in the company won't have access to the internet.
Back-up software- The back-up software is a software which is designed to backup data for the purpose of having a second copy of an original source in case of damage to the file server.
The different protocols that will be used within my clients network and the role that each one will performs.
Layer 7 Application Protocols
TCP/IP - Transmission Control Protocol and Internet Protocol. This will create a communication between my client's computer and the network if their want to require access any data from the internet or the network.
HTTP - Hypertext Transfer Protocol. This is the protocol which will allow the communication to the web server.
FTP - File Transfer Protocol. This protocol will copy files from another host or a server using a TCP/IP network. This protocol is built on client server that will allow my clients to make a data connection through clear text sign in protocol for authentication.
Layer 5 Session Layer
NetWare Core Protocol / NCP- used for directory system
Network File System / NFS- will allow my users to access files over the network
Server Message Block / SMB - will provide my clients to share resources such as files, printers.
Layer 3 Network Layer
The following protocols will facilitate my clients for internet networking:
Internet Control Message Protocol / ICMP
Internet Group Management Protocol / IGMP
Interior Gateway Routing Protocol / IGRP
Internet Protocol version 4 / IPv4
Layer 2 Data Link Layer
The following protocols are used for networking and internet:
Layer 2 Forwarding Protocol / L2F
Layer 2 Tunneling Protocol / L2TP
Link Access Procedures on the D channel / LAPD
Point-to-Point Tunneling Protocol / PPTP
IEEE 802.11 protocol will also be available for wireless local area network connectivity within the office premises. This is in the data link layer 2.
Layer 1 Physical Layer
Ethernet - This protocol is used for networking.