StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Common Use IP Networks: Should They Be Implemented in a Mall - Coursework Example

Cite this document
Summary
"Common Use IP Networks: Should They Be Implemented in a Mall" paper is about the detailed analysis of the IP network implementation at Mall. This report provides a comprehensive overview of the main implementation overview of the IP Network at Mall…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Common Use IP Networks: Should They Be Implemented in a Mall
Read Text Preview

Extract of sample "Common Use IP Networks: Should They Be Implemented in a Mall"

Running head: Common use ip networks: should they be implemented in a mall Common Use IP Networks: Should they be implemented in a Mall Affiliation August 18, 2009 Table of Contents Table of Contents 2 Abstract 3 Networking and IP Addressing 4 Existing System 8 Proposed System 9 Implementation areas 9 Basic technology structure 10 Implementing network 11 Data at Shopping Mall Network 11 Conclusion 12 References 13 Abstract The present age is considered as the era of information technology. It provides facilities in every walk of life. With the advent of networking computers in information technology has made over the methods of communication easier and flexible. This research is about the detailed analysis of the IP network implementation at Mall. This report will provide comprehensive overview of the main implementation overview of the IP Network at Mall. This paper presents the main overview of the technology incorporation for the establishment of the better network structure. Networking and IP Addressing Computers are commanding tools that facilitate users to accumulate and carry out operations on huge amounts of data swiftly. Basically every organization, regardless of its size (it can be large or small), makes use of computers to deal with bookkeeping, keeping the record of transactions, and store the documents. At the same time as organizations develop, they frequently require numerous people to input and process data at the same time. In this situation to be beneficial, those people must be capable to share the data each person enters. Networking computers turns out to be valuable in these circumstances. Networks are basically a collection of computers linked by cables or other media so they can retrieve and distribute information. Networks made sharing of data much straightforward and more resourceful for users (Nash, 2000, p. 5). The technical information that formulates the Internet work is merely element of the story. The basis that numerous people make use of the Internet has more to do with content instead of connectivity. An enormous amount of information is accessible at the moment with the help of the Internet. As a business tool, the Internet can be utilized in diverse ways. Electronic mail is a well-organized and economical method to send and get messages and documents all over the world within minutes. The World Wide Web is turning out both an imperative advertising means and a channel for sharing software, documents, and information services. As channels for business research, the databases and other information archives that are available online are mostly enhanced and modern than any library. The Internet has also developed hundreds of “virtual communities" comprised people who contribute an interest in a technical order, hobby, or political or communal society (Norton, 2001, p. 344). To make use of any of these facilities, you have need of a computer that is linked to the Internet in some way. Most individual users connect their computers modem to a telephone line and set up an account with an Internet service provider (ISP), which presents limited or regional access to the Internet backbone. Several additional users link to the internet by means of a school or business LAN (Norton, 2001, p. 344). The particular most significant truth to recognize about the Internet is that it can resourcefully connect your computer to any other computer. Any person with the facility to the Internet can swap over text, data files, and programs with any other user. For all realistic reasons, approximately everything that takes places across the Internet is a difference of one of these actions. The Internet itself is the pipeline that brings data and information among computers (Norton, 2001, p. 342). A large number of computers are not linked straightforwardly to the Internet. To a certain extent, they are linked to smaller networks that link to the Internet backbone through gateways. That reality is why the Internet is often acknowledged as "a network of networks." The foundation of the Internet is the collection of backbone links that bind the local and regional networks jointly and the routing method that organizes the means each part of data gets its target. In networking illustrations, the Internet backbone is sometimes described as a full-size cloud for the reason that the routing details are not as much significant than the reality that the data passes through the Internet between the source and the target (Norton, 2001). An explanation of the fundamental model for most Internet tools follows a client application on a users computer requests data through the network from a server. A server is a commanding computer, normally comprising a huge hard disk that operates as a collective storage resource. As well as holding stored files, a server may also work as a gatekeeper for authorization to programs or data from other computers. The Internet encompasses numerous thousands servers, each with its own exclusive address. These servers, in tandem with routers and bridges, carry out the activities of storing and distributing information all the way through the network. Since the Internet develops an imminent link between any two computers, on the other hand, the data may be forced to take a long, indirect route to arrive at its target. It can be better understood with this example, that you ask for data from a server in another state: (Norton, 2001, p. 343) 1. Your request must be divided into packets. 2. The packets are transferred through your local network, and probably through one or more successive networks, to the Internet backbone. 3. After that, the packets are transferred through one or more networks until they get to the suitable server and are reassembled into the entire request. 4. Once the target server gets your request, it starts transferring you the requested data, which winds its way back to you probably over a dissimilar way. Between the target server and your PC, the request and data may go through a number of diverse servers, each serving to forward the packets to their ultimate target (Norton, 2001). The Internet carries out its functionality for the reason that every computer linked to it makes use of the same sequence of rules and methods (acknowledged as protocols) to control timing and data format. The protocols utilized by the Internet are acknowledged as transmission Control Protocol/Internet Protocol, commonly shortened as TCP/IP (Norton, 2001, p. 342). The internet depends on an addressing method which is like a postal service to send data to a computer at a definite location. An IP address, abbreviated for internet protocol address, is a figure that distinctively recognizes each computer or device connected to the internet. The IP address typically comprises four groups’ figures, each separated by a period. The figure in each collection is between 0 and 255. For instance, the figures 61.132.33.191 are an IP address. As a general rule the first segment of each IP address outlines the network and the preceding portion outlines the definite number (Shelly, Cashman, & Vermaat, 2005, p. 74) The Transmission Control Protocol/internet Protocol (TCP/IP) method was established by U.S. Department of defense in 1972 and is utilized in the internet. Its intention was to help out scientists’ connect different computers (Laudon & Laudon, 1999, p. 276). The internet protocol is a connectionless protocol that sits in the network layer level of the OSI (Open System Interconnectivity) model. The function of IP is to address and direct the packets accordingly all the way through the network (Nash, 2000, p. 173). The TCP/IP protocols consist of the conditions, rules and regulations that recognize individual computers and that swap over data between computers. They also consist of rules for a number of groups of application programs; as a result programs that run on diverse kinds of computers can talk to one another. For instance, someone making use of a Macintosh computer can exchange information with a UNIX computer on the Internet. TCP/IP software appears diverse on diverse kinds of computers; however it always offers the identical appearance to the network. It does not create an issue if the system at the other and of a connection is a supercomputer, a pocket size-personal communications device, or whatever thing between; on condition that it identifies TCP/IP protocols; it can distribute and get data through the Internet (Norton, 2001, p. 342). This modern and up-to-date digital technology facilitates diverse areas like that data, telecom, radio as well as television, to be combined jointly. This happening, usually recognized as convergence of information technology, is occurring on a worldwide scale as well as is radically altering the method in which together people as well as devices commune. At the middle of this development, establishing a backbone as well as producing the convergence probable, through the implementation of IP-based networks. There are huge amount of services as well as incorporated customer strategies for functions like that entertainment, telephony, safety or individual computing are continuously being urbanized, intended as well as joined towards a contact standard that is self-governing from the fundamental physical link. The establishment of cable network, for example, primary planned for broadcasting television to the customer, is able to now as well be employed for surfing the Web, transferring e-mail, or else yet checking a network camera transferring live pictures from one place to other. In addition, these characteristic are as well obtainable over additional objective networks, like that cell phone, telephone, computer networks and satellite (Axis Communications, 2009). Existing System We want to renovate the existing system that is working presently in a MALL. Old working system is manual. Here we have manual ways for the information transfer and communication. There is no network support for the management and handling of the selling, production, and dealing information. Proposed System We are going to implement an IP based network in a Mall. This network will be completely automatic and provide the better facility regarding the management and handling of the Mall data and information. This new network structure will also reduce the information technology implementation cost and effect regarding the management of the individual working and information structures. Implementation areas This IP based network in the shopping Mall can be implemented at following areas: Inner Department Communication Security management Order management system Sales support system Products Support system Employs management system Internet system availability Centralized commutation Telephony Inter-departmental Email Scope Here IP Network system has a great feasibility regarding the management and handling of the overall network inside the Mall. Here I have accessed the following scope of project: Effective Performance Reduced Cost Easy to maintain Centralized management for all tasks Easy way for transferring and receiving data Internet facility Data Sharing Online ordering and dealing Connection among Different departments Better support for security Data security Reduced cost of human resource as well as physical recourse for individual networks handling Basic technology structure In our IP based Network structure we will have two basic elements the links and the nodes. Here we have node that is a network device of any type it can be a terminal or client computer. These network nodes are capable to commune by means of additional nodes in the course of links, similar to cables. There are mainly 2 dissimilar types of the networking methods intended for creating communication among nodes on our proposed network: these are packet switching network and circuit switching network. We will use the packet switching network for our proposed network structure (Axis Communications, 2009). Our IP-based network for the Mall will use a packet switching network technique that employs obtainable capability a great deal additional proficiently as well as diminishes the risk of potential troubles, like that disconnection. In our network system for the Mall the intended messages sent through the packet switching network are initially separated into different packets holding the target address. After that, every data packet is launched above the Mall’s network by means of all middle node plus router in the system formative wherever the data packet transfers subsequently. A data packet does not require to be routed in excess of the similar network links as preceding connected data packets. Therefore, packets launched among 2 network devices would able to be broadcasted in excess of diverse routes in the occasion of a connection collapse or node break down. Implementing network The proposed IP based network for Mall provides a better solution together for elastic as well as efficient replacements for resolutions that utilized old network machineries. The different characteristic among these tools consequence from how data and information are symbolized, broadcasted as well as directed. Information is basically prearranged group of data, as well as takes its sense from the understanding we provide it. There are two basic kinds of data that will transmit overall the IP network we have proposed for the Mall, analog and digital, plus both hold diverse behaviors as well as characteristics (TCP-IP-Guide, 2005). Data at Shopping Mall Network Here we will be able to transmit different kinds of data at IP network of the shopping mall. This is digital and analog. The further details are: The Analog data for the shopping mall can the voice or/and video. This data can be: Video of security cameras in Mall Communication among different departments Internet based voice and video data The Digital data at shopping mall can be: Sales data Order for production Order for supply New products details Current status report Sales data Employs records Etc. Conclusion In this research report I have presented a detailed analysis of the IP network implementation at Mall. Here I have outlined the main working and handling areas those can be handled through this system. This report has outlined the main and positional advantages regarding this system. In this report I have also presented the brief but comprehensive overview of the IP based network implementation support, technology, overview, and data types at network. IP based network should be implemented in Mall. References Axis Communications. (2009). IP-based Networks:Basics. Retrieved 08 17, 2009, from http://www.axis.com/documentation/whitepaper/ip_networks_basics.htm Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition. New Jersey: Prentice Hall . Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Norton, P. (2001). Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. TCP-IP-Guide. (2005). Usenet (Network News) and the TCP/IP Network News Transfer Protocol (NNTP). Retrieved 08 17, 2009, from http://www.tcpipguide.com/free/t_UsenetNetworkNewsandtheTCPIPNetworkNewsTransferPro.htm Wes. (2009, 05 20). Enhance your Shopping Mall Security Surveillance with IP Cameras. Retrieved 08 17, 2009, from http://www.ipcameraguru.com/manufacturers/axis/enhance-your-shopping-mall-security-surveillance-with-ip-cameras/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Common Use IP Networks: Should They Be Implemented in a Mall Coursework, n.d.)
Common Use IP Networks: Should They Be Implemented in a Mall Coursework. https://studentshare.org/information-technology/1726550-common-use-ip-networks-should-they-be-implemented-in-a-mall
(Common Use IP Networks: Should They Be Implemented in a Mall Coursework)
Common Use IP Networks: Should They Be Implemented in a Mall Coursework. https://studentshare.org/information-technology/1726550-common-use-ip-networks-should-they-be-implemented-in-a-mall.
“Common Use IP Networks: Should They Be Implemented in a Mall Coursework”. https://studentshare.org/information-technology/1726550-common-use-ip-networks-should-they-be-implemented-in-a-mall.
  • Cited: 1 times

CHECK THESE SAMPLES OF Common Use IP Networks: Should They Be Implemented in a Mall

Ethical Hacking Issues

The Information System of the firm should be able to process this task by taking the external (technology functionality) and internal (business environment) entities into account.... Apart from investing in the most effective security practices, companies should contract third party ethical hacking teams with reputation to test (penetration testing) the existing IT infrastructure and identify any loopholes and promptly patch them up.... The most crucial question each upcoming programmer must ask himself is, "Which hat should I choose" ReferencesE....
4 Pages (1000 words) Essay

New Perspective on OS Design

Conventionally all these functionalities of the OS are implemented in the kernel.... The OS needs to have effective memory protection and allocation; scheduling and it should co-ordinate the usage of the various peripherals attached to the system.... Almost all systems use a system language or command to program the kernel.... Though Lisp Machine and Smalltalk managed to bring this user modifiable functionality in an easy to use language they failed to separate the user from the program....
9 Pages (2250 words) Essay

Web Server Hacking

In order to understand the need for security in one's computer system, he or she should realize the risks involved.... It is hence clear that web server hacking is an important topic that should be evaluated in detail and understood by users of computer systems.... 'Hacker' and 'attacker' are the two terms that are used in describing a person who tries to get into networks and systems.... hen one tries to break into or use a computer system wrongly, he or she is considered an intruder....
8 Pages (2000 words) Essay

Network Security Fundamentals

Many of credit card transactions need verification by the users to reduce high crime rate thus with the case of the medium ed start-up company, the Chief Information Security Officer (CISO) should be well equipped to handle a myriad of challenges and security threats posed by using online transactions.... Companies like American Express, Visa, Discover, JCB, and MasterCard among others have experienced information security threats thus the new company should employ mechanisms that should protect information from both internal and external threats....
5 Pages (1250 words) Essay

Characteristics of LAN Networks

The LAN networks The family I will recommend that they subscribe to a cable internet service provider and buy a wireless Concurrent dual band 802.... The modem is connected to the router so that the router access the internet through the ISP assigned ip address.... This dynamically assigns each of the devices ip addresses thus enabling the m to access the internet.... They will use the Ethernet cables to connect all the computers, DVR, VoIP phone, and game console to the network....
2 Pages (500 words) Coursework

The Basic Architecture of a Secured Network

Since these systems serve a number of networks, they create a bridge bypassing the firewalls and network segments.... In an event of breach, if the attacker gets past the security of one of the DMZ servers, he has a perfect path to the internal networks.... The paper "The Basic Architecture of a Secured Network" highlights that each component of the entire network can be simulated using a model and the theoretical values of Overall Security Values can be determined....
10 Pages (2500 words) Case Study

Communications Mechanisms and Methodologies within the Unix

UNIX communication capabilities have also contributed in High-performance computing sector as a company named Computer Associated International implemented a powerful system “Advantage Gen (release 6.... (E- Week, 2001)The Client-server model of UNIX was the core components for the growth of the Internet and reshaping of the distributed systems networks....
6 Pages (1500 words) Research Paper

Source Code Components Architectural Characterization

In this example, the interface “My” contains two abstract methods, which need to be implemented in order to have the “My” type object at runtime.... ow based on these existing types, where the client program knows the method signatures of interface “My” and the method signatures of class “A”, the client program is developed and implemented in the desired business area.... fter being developed and implemented into the project, where the new component is being accessed by many other client components, what issues would arise if there is a need to make some changes in the code of the new component?...
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us