StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Basics - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Network Basics After reviewing the current network media, hubs are not the best option. Hubs copy every data packet from one port to the other i.e. host to destination. This functionality creates more traffic as compare to the functionality of a switch…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Network Basics Paper
Read Text Preview

Extract of sample "Network Basics"

Full Paper Network Basics After reviewing the current network media, hubs are not the best option. Hubs copy every data packet from one port to the other i.e. host to destination. This functionality creates more traffic as compare to the functionality of a switch. Likewise, the school has also decided to introduce more services on the Local Area network (LAN), hubs is not a best option as it will create more traffic and degrade network functionality. Therefore, switches instead of hubs are recommended.

As per scenario, only two public IP addresses are available. One public IP address can be configured on a router interface and the other will work as a gateway. Before moving further, we will discuss the functionality of Network address translation, as it is considered as a key component in this scenario. As per network dictionary, it is defined as a process of mapping one group of IP address to another that is transparent to end users. Likewise, the requirement of address translation initiates when the internal or private IP addresses cannot be accessed by the outbound network.

However, NAT can also be considered as a security and privacy control in some cases. If each room has 24 computers, seven rooms require 168 IP addresses. If we use class C IP address scheme, we will have a total of 253 IP addresses. In a class C IP addressing scheme, 3 octets are used up making a total of 24 bits. The remaining octet that comprises of 8 bits supports a total of 255 IP addresses. The summary of this scheme is demonstrated below: Gateway IP Address: 192.168.0.1 Subnet Mask: 255.255.255.

0 Broadcast IP Address: 192.168.0.2 Total Available Hosts: 192.168.0.4 -192.168.0.255 Router WAN IP address: 125.110.85.3 The above mentioned calculation shows the availability of total 252 hosts. As per current scenario requirements, we need 168 IP addresses for computers located in 7 rooms of the school. Likewise, the IP address 125.110.85.3 is a public IP address that will route the schools traffic from the WAN interface of the router and the gateway of a router will also bind a public IP that will work as a gateway.

Moreover, NAT functionality will translate internal private IP addresses and convert them for transmitting via a public IP address. For enabling Internet of specific computers, a proxy server will serve this purpose. Network administration can install Microsoft Internet security and acceleration (ISA) server for defining group policies and add users in a group named as ‘Internet access allowed’. ISA server binds the MAC address and IP address of a specific computer that needs Internet access.

Furthermore, users can be added or deleted from this group as per requirements. A second example includes a creation of a Domain, as it will provide centralized administration with the inclusion of Microsoft Active directory. Network administrators can change user access levels on a single computer that is called a domain controller, and the changes will be applied to all the computers of the school or for a group of users. However, if school administration does not impose Internet restriction any specific group of users, internet connection sharing is also a cost effective option that can implemented without creating a domain or installation of a proxy server.

For future considerations, school is expanding and most probably, number of computers will also be increased due to more enrollments. For addressing this challenge, 32 port switch installation is recommended in every room. Cisco 3750 series switch is capable of being stacked in which multiple switches are considered to be one logical switch (Donahue, n.d) and can be installed in every room so that the remaining 4 ports can be utilized by the newly installed computers. As we have selected class C sub netting scheme, we have total 252 hosts from which 168 are already assigned to the legacy systems.

The remaining 84 IP addresses are still left that can be configured on any new system, network device or printer. In case of a major expansion, IP version 4 can be shifted to different classification schemes. For instance, a range from 1.0.0.0 to 127.255.255.255 provides a total of sixteen million IP addresses that are more than enough for a school. However, these the amount of available IP addresses varies in different classes such as Class A, Class B, Class C, Class, D and Class E. References Network address translation. (2007). Network Dictionary, , 334-334.

Donahue, n.d. G.Network warrior O'Reilly Media. Jang, M. H., & Downes, n.d. J.Mastering fedora core 5 Sybex.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Basics Paper Research Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1442489-network-basics
(Network Basics Paper Research Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1442489-network-basics.
“Network Basics Paper Research Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1442489-network-basics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Basics Paper

Network Security

This paper will present a detailed overview of network security, network security policy, importance of network security policy, its implementation and design considerations for network security.... How to utilize computers as well as internet technology in a safe way How to suitably exploit the business communication infrastructure On the whole, the prime causes following the formation of a safety policy is to set a business's sensitive data and information security basics....
13 Pages (3250 words) Research Paper

Basic Network Technology, Structure, and Protocols

BASIC network TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic network Technology, Structure, and Protocols Author Author Affiliation Date Networking is the way of linking two or more computer systems, devices or even networks jointly with the intention of distributing and sharing useful information and data.... One technique is to define the kind of network according to the massive area it covers.... Moreover, the Internet is known as the world's biggest public WAN and it is too a type of network (Mitchell, 2011) and (FREETECHEXAMS, 2011)....
3 Pages (750 words) Research Paper

Iphone Network and Technology

iPhone Network and Technology Harris Kamran Telecommunication Outline Note: Each bullet point represents a paragraph in the paper.... Introduction: Background of the iPhone technology Aim of the paper and thesis statement Network classification: General discussion of network classification Discussion of wireless network The family of Wi-Fi network Introduction to operational mechanisms of Wi-Fi Steps involved in transmission of signals to a device Steps involved in capturing of signals by a device Basis of devices Benefits of wireless network systems Physical scope of the network: General discussion of the physical scope of the network The network scope of the iPhone Discussion of the global are… a network Components of the global area network Introduction to 3G A detailed discussion of 3G Network architecture: General discussion of network architecture The network architecture of iPhone Advantages of the network architecture of iPhone Basic hardware components: Background Components, and their roles Role of switches Network security: Reasons of network security Challenges The network security protocols of iPhone Conclusion and recommendations: General discussion Summary of the layout of the paper Recommendations Harris Kamran Telecommunications Term paper 24 July 2011 iPhone Network and Technology Introduction: In the world of cellular industry and telecommunications, the iPhone has become the force to reckon with....
12 Pages (3000 words) Research Paper

Extent to Which Social Network Network Affect Academic Perfomance

Name Instructor Task Date Extent to Which Social network Affect Academic Performance Introduction Social networking is presently being utilized on a regular basis by many people.... Social network websites have the following effects to individuals: they create a public outline within a bordered system and provide a list of other people that they are able and willing to communicate with.... After spending some time in the social network individuals are able to engage with new friends, thus it becomes more interesting....
5 Pages (1250 words) Research Paper

Adaptive Social Networks

They described an adaptive social network for information access that is intended to be an accurate, dynamic and evolving multi agent system that can achieve the effect of informal social networks that exist in an organization or community.... Conventional means of seeking information from the Internet, such as use of search engines like Google, Yahoo, and Bing among others or by getting information from databases are slower and often result in unreliable information....
5 Pages (1250 words) Research Paper

Computer networking

This network among computing devices may be established via either local area networks or Wide Area Networks.... The computing devices that are part of a network are said to be its units.... The most suitable and feasible of networks is the Local Area network.... It is this type of a hard wired connection which is referred to as a Local Area network.... “Universal components consist of the physical media that connect devices, interfaces on the individual devices that connect to the media, protocols that transmit data across the network, and software that negotiates, interprets, and administers the network and its services....
4 Pages (1000 words) Research Paper

Device Hardening and Secure Network Design

This paper presents the hardening and secure network design analysis.... The objective of this research is to present a detailed analysis of the secure network design.... Access control lists (ACLs) could be configured to authorize or refute UDP and TCP network traffic.... Additionally, the firewalls are implemented for additional in-depth examination; tactically positioned router ACLs thus they augment network security.... At present, network security has become the most important subject of discussion....
12 Pages (3000 words) Term Paper

Creating Real Time Connections - Application of Scale Free and Random Networks

This paper, Creating Real-Time Connections, will examine and define these two theories of networking and communication.... This paper will examine the effectiveness of these two theories as well as the practical applications which apply to the concept of building networks.... nbsp;    The representation of a network is one which is defined through several methodologies and theories, all which are able to create an understanding of how social patterns work....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us