Wednesday, July 17, 2019

Mcsa Networking Basics Essay

sub anatomical structureWhat is a interlock?A earnings chamberpot be defined as two or to a great extent calculators which ar linked unitedly to sh are resources. These resources fire accommodate net profit vex, patsying machines, packet outline product and files. The heart of a net is c alwaysy last(predicate) in bothed the waiter, and its function is to stomach wholly the package product package and services which the vane and its utilisers depend on.Figure 1 standard of a basic electronic netThe inn economiseer is operated by personnel department called Network or System Administrators, and its their responsibility to go each property the smooth discharge of the meshwork so it is running(a) as efficaciously as possible. This is achieved by the physical exercise of a employ operating system called Windows Server 2003 this gives the net profit executive director collar oblige everywhere the intercommunicate functions.Advantages for a web termsBeca commit entanglemented reckoners asshole share the same resources, be disregard be dramatically reduced. For example, if in that respect are ten computing devices in a room severally wanting entranceway to a printer it is far cheaper to route all ten computers to a mavin, shared printer than it is to barter for ten printers one for apiece computer. In this example, the saving would overly include the cost of ink cartridges (you would exactly motivating to purchase one act of cartridges kinda of ten).Software female genitals be purchased and installed in a similar cost potent way. Most popular software is adequate to be bought and installed on a host, and whatsoeverone who requires to use it get out nevertheless need to purchase a license (the legal rights to use it, usually in the form of a certificate). These licenses are far cheaper than buying the software for each user. This method also operator that it isnt necessary for an I.T Techn ician to install the software on every computer only one install on the innkeeper is needed. an otherwise(prenominal) benefit to this approach is when the software requires an modify. If it is waiter based, only the software on the server would need to be updated. entirely the users would benefit from the update as before long as it has been installed. If each user had a copy on their computer, I.T Technicians would need to update each one. This could effect time consuming, dear(predicate) and complicated. The software that this could rehearse to, includes most Microsoft software and Anti-virus software.SecuritySecurity is a brisk element in any business. In a web, shelter is enhanced some(prenominal) internally (security inwardly the net) and externally. Users are given a username and passagewayword to opening their files and all the programs, hardware and so onthat they make water been given access to. When a user saves a file, it is salvage to the server and n ot the computer that he/she is work on. If that user wants to retrieve that file, it bed be done on any computer on the profits, and not rightful(prenominal) on the computer that was originally used. This selective information plunder be accessed, monitored and rear ended up by the Network Administrator at any time.Each department after part feature their own identity on the server, which al first-class honours degrees them to dedicate access to files, applications and resources which would be relevant to their requirements. For example, the Accounts department whitethorn need to vex access to invoicing software (e.g. Sage and Excel), whereas sales whitethorn only require software to monitor and forecast sales over a period of time (e.g. Excel). Accounts may not want other departments accessing their software due to security or confidentiality reasons. meshing security is tighter for two users accessing the internet, and external threats when a network is set up. solel y the computers green goddess share a single access point to the internet, which makes it easier to monitor internet usage, protagonist reduce hacking and other external threats exhausting to access selective information on the network.Another feature which female genital organ be utilise by the system administrator is Encryption. entropy inwardly a f of age(p)/subfolder kindle be encrypted to pr government issue unauthorized access to info if other security measures have been breached. Typically, only system administrators get out be given the retrieval key to be fitted to decrypt info enclose of system failure or other unforeseen daubs.Disadvantages for a network costly to installThe initial cost of telescope up a network contribute be high-ticket(prenominal), with hardware like the server, router, cabling, living equipment, network printers and server software. Also, dedicated personnel moldiness be hired to keep the server running efficiently and to answer an y server/network issues. concentrate DataHaving all of the info in one place means that data could be lost in the event of a system failure. Regular backups of the server are highly recommended (daily, hebdomadally and monthly) to serve well to keep data safe. except if the server goes down in between backups because all the recent data pass on be lost.Reduced PerformanceThe servers surgical procedure scum bag become reduced as the network expands or as its work load increases through the working sidereal day. A server must have as a good deal reminiscence and bear upon power as possible to armed service minimise the reduction in performance. lying-in 2aNetwork topo representic anatomy is the description of how a network is laid out, the devices (server, routers, printers etc) link up to it and the counselling which data flows. A network can be described as each Logical Topo logy (the way data flows in a network) or as a Physical Topology (how a network is physical ly laid out) in that respect are six important topologies, Bus, Ring, Star, leng pasted Star, Hierarchical, and affiance.Bus TopologyThis can be both a Physical and Logical, in a local area network (LAN), each device is committed by a single pipeline. This single line is also referred to as the backbone of the network. A terminator must be on either side of the cable to save the data signal from bouncing back down it. The Bus Topology was widely used in early networks exploitation standard Co-ax cables. It was an economical declaration for networking as only one main cable was needed. The impairment to this was if this cable failed, the whole network would go down.Ring TopologyIn a Ring Topology (also cognize as IBM Ring Token), each computer ( lymph node) is connected to each other in a closed loop. Each computer has its own unique identity on the network. When data is enchantted from one node to the other, the data give include the end points identity and pass on pa ss through each node until it reaches the destination. This image of topology has two main disadvantages only one computer can transmit data on the network at a time and if a computer fails the whole network will go down.thither is a slight transition to this the Duel Ring TopologyThe assist ring within the network provides a backup confederacy, so if there is a failure within the network, the secondary connection will keep the network connected. This is expensive as more cabling is required.Star TopologyThe most common type is called a Star Topology. Each device is connected to a dedicated substitution hub. All the data on the network flows through the network via the central hub. These types of networks tend to be small, as data could be vitiated or lost on a voluminous network. The main advantages to this is that it is liberal to setup and easy to convey new devices to the network. But if the central hub fails, the whole network goes down. all-inclusive StarSimilar to t he Star Topology, provided instead computers are multitudeed together and connected to a local hub, which in turn is connected to a central hub. This is widely used in large networks where the network may be in a large building, and each pigeonholing of computers may represent each department. There are more points of failure on this network, but if a local hub fails, past the rest of the network will not be affected.Hierarchical or channelise TopologyThis is very similar to a Ring Topology, but computers are attached to the central hub in layers. While the structure looks different, this ease has the main disadvantage of network failure if the top device goes down. enlist TopologyAll the above topologies bear out from the same problem. If one device fails on the network, the whole network goes down. The only solution is to connect each device with each other and remove the need for a server. This is the Mesh Topology and has two main advantages If a device fails, the network will still work and the network doesnt need to rely on the process power, bandwidth etc from a server as it is supplied from each computer. The disadvantage to this is the high cost of connecting each device to each other, so this would not be suitable on a large network. This type of topology is also referred to as Peer-to-Peer whereas the other topologies are considered to be Client/Server based.A equal between cost and connectivity would be the partial derivative Connected Topology.Devices are connected to more than one node on the network, so if one fails the network can still work. This is more cost effective than Mesh Topology as less cabling is required. depute 2bRecommendationsAs it stands, the structure of the current network is a Hierarchical or direct Topology. The network uses two different switches to connect the Domain dominance to the 24 computers. These are from two manufacturers CISCO and 3Com and this offers 100Mb and 10Mb drives respectively. This is a disad vantage because one group of computers has a fast data transfer rate than the other.The network does not have a fortuity recovery plan should the Domain dominance fail. This has the potential for putting the whole network at risk from permanent data loss. The network also shares a single printer which is attached to the Domain Controller, 10 of the computers are connected to it through the pokey 3Com 10Mb switch. This means all 24 computers print via the Domain Controller (which is currently overloaded) and 10 computers send data at a slower rate than the rest of the network.My jump recommendation would be to convert both switches with a single CISCO 100Mb 48 port switch (631.99 from MISCO website). This would provide a standard, quicker data transfer speed throughout the network and support for the network to expand. There are a marrow of 24 computers, and this switch would enable a further 24 devices to be added to the network e.g. additional computers, printers etc. This would allow the network to expand whilst maintaining a fast data transfer speed.With the new switch in place, my coterminous recommendation would be to replace the HP Laserjet III (USB connection only) with a newer, network-ready printer like the HP Laserjet 2055DN or P2030 which costs 319 and 160 from HP website. By replacing it with a newer model, printing could be completed quicker, quieter and more cost effectively e.g. more reliable printing, more strength efficient, lower consumable costs etc. Also, sharing the workload throughout a faster network is more efficient than channelling all the printing requirements of the network to an older single printer on a slow 10Mb switch via the Domain Controller. This will also process reduce the workload to the Domain Controller.While the Domain Controllers workload can be reduced by the addition of a network-ready printer, other options could be to increase the specifications (e.g greater hard drive lacuna, more memory etc). Ensurin g the controller has the latest software updates will date both the running cap magnate and increase the network security. This will sponsor prevent unauthorized access (hacking) to the network.My final examination recommendation is add disaster recovery and conflicting working within the network, By regularly backing up data on a daily/weekly/monthly basis, this will delay the network can be restored in slip of paper of original data loss. To assist learn or to prevent students from accidentally causation errors/problems within the network, remote working should be enabled.User accounts can be easy spend a pennyd in active agent Directory though the use of a standard template. Templates could be set up for both students and tutors, so all of the common properties of the accounts are already established. When a new user account is required, the administrator will only need to complete the fields that require unique determine (eg, name, address, telephone number, occup ation details etc). at once the users have been created within the Active Directory, they can be placed into Organisational Units (OUs). This will group together users, so in this situation students could be placed in OUs which represent their course.When the OUs are established, the users sort settings can be applied through the convention Policy Management condole with (GPMC). It give ways hundreds of user configuration settings, security options and user event logs, all which can be applied as required by the college administrators.Figure 2 recitation of the Group Policy Management storage locker (GPMC)By exploitation Group Policies effectively, the administrator can control and manage exactly what users can and cannot do whilst logged onto the domain. Administrators are able to control how the desktop appears, the icons that are available and the ability to configure the task bar etc by applying the Desktop setting found within the User var. in the GPMC. This could be u seful if the college policy states that all users must have the Llandrillo College logo as their wallpaper, and various required icons are in place and users to have access to various programs via the show up menu.To improve parole security, administrators are able to increase the effectiveness of the passwords that users apply to treasure their identity on the network. The password options can be found within the countersignature Policy within the Computer Configuration section of the GPMC. These options include the ability to employ old passwords, to apply complexed passwords (eg. more than 6 characters, using upper, lower case garner and digits 0-9). In the example, a programmer has created a random word generator to create passwords. Group policy could be put together so when they log on for the first-year time, users input the randomly generated password and then they must input their own password using a complexed password. If the user ever forgets the password at any time, administrators are able to reset it through the Active Directory Users & Computers mechanism.Figure 3 Example of watchword Policy within GPMCTo prevent users from using too more disk space on the network, administrators are able to allocate limited disk space to users and by applying prompts when this space is nearly used up. By putting this in place, administrators can account how many users will be on the system multiplied by how much hard disk space each user will be allocated. This get along will be the minimum criterion of disk space required for all users in each new academic year. Administrators will be able to ensure the server can physically hold all the users data without completely running out or running low of disk space.To achieve this, administrators will need to locate the allocated hard drive and apply a quota, limiting users on how much space they can use. Individual users can have separate entries in the quota, allowing them to have a lesser or a grea ter share of disk space. This would be useful for tutors who may need greater disk space to store course material etc.When the network is running, administrators may be required to monitor the networks resources to ensure it exceeds the users demands. The tool required is called the Performance Console which is found under Administrative Tools. This tool appears in the form of a graph although it has three counters as a fail (MemoryPages/Second, PhysicalDisk Average Disk Queue space and Processor % Processor Time), additional counters can be easily added or outside accordingly. A college administrator may add counters to monitor network bandwidth, server engagement (memory, cpu performance, disk performance etc).To help administrators monitor the server, counter logs and alerts can be applied. This can enable administrators to proactively identify when system resources run too low or to identify possible hardware failures/malfunctions. whatsoever one of these problems could res ult in a degraded performance or total server failure.Figure 5 Example of the Performance ConsoleThe college network may be required to support remote users, allowing them to access the college network whilst being in a different location eg working from home, from another campus etc. This can be achieved through the use of a practical(prenominal) Private Network (VPN). The user will be able to access the colleges network through the use of the internet whilst achieving the required security and data encryption. The networks firewall must have exceptions to allow authenticated users to access the network whilst preventing unauthorised access.Once the network is running effectively, the conterminous challenge administrators will face is maintaining the security and the efficiency of the network. This can be achieved by deploying server updates and hotfixes as provided by Microsoft. The server can be updated with the use of reflex(a) Updates, which can be found within the All Progr ams menu under the alternate button. Updates can be downloaded either slap-up away or scheduled to download at a certain day/time. This could be configured to download when the network is at its quietest time (eg 10pm). This would ensure that the update would not effect the overall performance during busy periods.Also, updates for the users computers may be required. kind of of administrators physically installation them on every computer on the network, this could be downloaded on the server as an *msi file and automatically installed via a group policy. So the next time users within the network log onto the network, they will automatically be downloaded & installing the updates from the server with no intervention required.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.