StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Internetworking Technology Paper - Essay Example

Cite this document
Summary
Full Paper Title Name University Internetworking Before constructing the network, star topology is considered for the design of the network, as it provides centralized administration and management with the integration of Microsoft’s directory services and domain controllers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Internetworking Technology Paper
Read Text Preview

Extract of sample "Internetworking Technology Paper"

Download file to see previous pages

In order to connect the workstations of these employees, switches are terminated on each department. However, there is a possibility that more than one switch is required to cover up all the nodes. As mentioned earlier, star topology is implemented for centralized administration and configuration of the network, the diagram demonstrates Microsoft Active directory that connected with a domain controller. Active directory is an advanced directory service that is a built in feature for Windows server that is utilized for access management for network resources.

Moreover, it is a domain based network similar to the Domain Naming System (DNS) (Active directory.2011). Protocols that are used include LDAP and Kerberos for security purposes. The selection of switches is essential, and compatible routers must be considered, as cisco supports active directory in its IOS router (Active directory.2011). Each switch supports gigabit full duplex Ethernet capability that will operate on a CAT 5 1000 base-t cables. The company does not want interruption in the local area network and it must be available for all times.

For this reason, all the switches are powered by PoE (Power over Ethernet) that is a distributed power mechanism on a CAT 5 Ethernet cable (Poe.2011). Likewise, PoE enables a secondary channel for power distribution and continues to provide power to networked devices even if the primary power link goes down. As shown in the Fig 1.1, the blue link shows PoE connectivity between networked devices for ensuring network continuity. Moreover, there are two routers aggregating data channels and configured to backup each other.

In case of a primary router failure due to malfunctioning hardware or configuration, secondary router will make itself available up to the task. Furthermore, to ensure redundancy in software infrastructure, primary and secondary domain controllers are installed for load balancing and backup procedures. In addition, for security purposes, Virtual LAN can be configured for distributing data channels associated with highly sensitive data. For addressing security, Fig 1.1, demonstrates a firewall that is installed after the router and in between the Internet to ensure the filtration of inbound and outbound network.

References Active directory.(2011). Computer Desktop Encyclopedia, , 1. Poe.(2011). Computer

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internetworking Technology Paper Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1442874-internetworking
(Internetworking Technology Paper Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1442874-internetworking.
“Internetworking Technology Paper Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1442874-internetworking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internetworking Technology Paper

Net-centric Computing and Information Systems

paper on Net-centric Computing and Information Systems - By Harish Das Abstract What seemed new-fangled and smart yesterday is eyed as ‘something obvious' today!... paper on Net-centric Computing and Information Systems - By Harish Das What seemed new-fangled and smart yesterday is eyed as ‘something obvious' today!... Management of people, process, technology and content is the key to elevated organizational structures with a firm Information Management....
2 Pages (500 words) Research Paper

Network Security setup

User domain usually entails all the employees of Richman investments, these also includes consultants, contractors and even other third party users.... It is essential to ensure that each of the users who access and use the IT infrastructure of the organization should review and sign acceptable use policy in order to be granted permission to use the resources of the organization....
7 Pages (1750 words) Research Paper

Internetworking Design Issues

Full paper Title Name University Internetworking Design Issues During conducting a security audit of the network to identify vulnerabilities, there is no sole application that will perform the overall task, as the combination of different applications will address specific functions.... Full paper Internetworking Design Issues During conducting a security audit of the network to identify vulnerabilities, thereis no sole application that will perform the overall task, as the combination of different applications will address specific functions....
3 Pages (750 words) Research Paper

Marketing Analysis of Pentax PocketJet 3

Subject: 14 July 2013 MKT Unit 3 Individual Project Abstract: This individual Project will explain Strategic Marketing Plan of Pentax PocketJet 3.... This project mainly focuses on communications and promotion, by an integrated marketing communications (IMC) method.... hellip; Such a method delivers an apparent and reliable message to the customers and is connected to Core Strategy....
7 Pages (1750 words) Research Paper

Company Analysis for Yahoo

Spectators can also scan the entire Yahoo continuum from the 19th century to the 21st or pinpoint, year by year or decade by decade, but the focus of this paper will only be from 1998 to 2003.... Yahoo needs no further introduction as it is one of the world's leading Internet communications, commerce and media companies with over one hundred forty five million users each month and who hasn't visited Yahoo lately According to research, Yahoo retained to complete several successful banner campaigns for key Yahoo clients as well as execute conceptual work on a new global technology ventures for the company and it was said that one of its ion's banner campaigns was even served up … to over a billion impressions over the holiday season....
14 Pages (3500 words) Research Paper

ORGANIZATION COMPLEXITY: CREATE A COMPLEX ADAPTIVE CHANGE PLAN

This paper focuses on discussing the system thinking approach applied by TCS (Tata Consultancy Services) in their CSR (Corporate Social Responsibility) activities by leveraging their technological advances.... This paper describes the present traditional approach of problem solving and its drawbacks.... Further, the paper illustrates the relevant future scope of System Thinking.... technology and media development in the present era has made it feasible to access information worldwide....
8 Pages (2000 words) Term Paper

The IPv-4 and IPv-6 Network Technologies: the Characteristics of Both Addressing Schemes

This paper discusses the issues and opportunities in case of transition of IPv4 to IPv6 network.... This paper will outline the main issues of problems of transition to the new IPv6 technology platform.... This paper presents a detailed analysis of the issues raised in the case of a transition to new IPv6.... This paper will also outline some of the main aspects regarding the implementation of IPv6 networking technology.... But, with the passage of time, these demands on the internet began to grow; then the designers decided to create a modern internet protocol that takes benefit of the current technology....
11 Pages (2750 words) Research Paper

Wireless Ethernet

The paper “Wireless Ethernet” discusses the IEEE 802.... nbsp;… The paper moves on to a discussion on the relationship of the wireless Ethernet standards and implementations to the OSI networking model, with emphasis on situating the standards elements themselves within that OSI framework.... From there the paper discusses the wireless Ethernet standard as it relates to the physical layer.... nbsp; From there the paper discusses the wireless Ethernet standard as it relates to the physical layer, the data link layer, and the application layer of the OSI stack (6test; Defoenet)....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us