StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Role of Network Topologies in Designing a Network - Essay Example

Cite this document
Summary
The paper "The Role of Network Topologies in Designing a Network" explains that understating the main topologies used in networks, - bus, tree, star, and ring equips a person with basic networking knowledge of how devices used in networks such as hubs, routers, and broadcasts…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful

Extract of sample "The Role of Network Topologies in Designing a Network"

Introduction A computer network can be explained as a set of interconnected computers and other peripheral like printers used for communication purposes that permits sharing of data n and resources. When classifying networks, it is necessary to put in mind various aspects like, topology, how data is transmitted, communication protocol used and the level of organizational (Simmonds and Ekert 2004, 320). Communication protocols characterize rules and ways for exchanging information and data in a computer network. One of the widely used protocols is the Ethernet, which is commonly applied in the local area networks. Today, computer networks have become an important aspect in present day communication. A lot of activities and processes are controlled by computer networks. Advancement made in computer network has highly improved the level of communication. However, for effective operations, computers have to be connected to each other and other peripheral devices (Bhunia, 2006, 99). This research paper is about standard office software, file sharing and printing capabilities in a computer network for all employees working in an organization. The paper will examine a bespoke client server application accessing a locally stored database with sensitive data accessible by only 20 employees. It will as well outline a proposal to upgrade an intranet accessible to each employee of the organization and an extranet accessible by trusted clients and an internet site for carrying out clients’ orders. Limitations of old network technologies Using ADSL for internet connectivity posses a security problem that brought about by its use, those using this kind of internet lack security since it is are very easy for hackers to hack the data on transit since there is no software to block hackers from reaching sensitive information (Shashi, 2007, 141). The use of Ethernet in LAN cause insecurity to data they transmit because it is a broadcast system. This implies that while transmitting information in this system, there are different segments that transferred data must move through towards the receiving computer. The hackers can use some sniffing programs to out data as it moves from the host towards the receiver (Simmonds and Ekert 2004, 320). Further, adoption of peer-to-peer technology to reduce the expense of coaxial cables in Ethernet LAN, at the same gives an unsecured networking because it bases its operation on sharing of information. Other computers in the group can access sensitive information that they share on the network. The network infrastructures like hubs and switches as well as network protocols that are means of accessing remote hosts for exchange of information poses a great risk on the network. This is because they are not secure and hackers can easily interrupt and alter signals. However, there is no accountability to allow a sender to spoof the origin of packets (Proulx, et al 2005, 348). These technologies only use one disk in the system, and hence when a fault occurs in the system, the entire system collapses since there are no back up files in secondary drives. Solution to challenges that face old network technologies The use of RAID technology: this is a method of combining a number of hard disk drives into one logical unit. They developed this technology in order to address fault tolerance and limitation performances of conventional disk storage (Bicsi, 2002, 98). The use cryptographic solutions can assist in maintaining the confidentiality and integrity of application data on the network. In addition, the use of security enhancements to BGP protects against insertion of counterfeit routes and filtering at the network boundary to protect against packet spoofing by hackers (Bicsi, 2002, 103). To resolve the insecurity problem in ADSL, it is ideal for developers to come up with different types of network securing software and applications like different types of antivirus and WEP among many others to maintain the position and the performance of ADSL in the market (Steven 2009, 4). Further, to overcome security challenges of Ethernet LAN, the technology developers must consider both hardware solutions as well as software solutions. Hardware technologies The switched network that designers subdivide into different segment focus to prevent sniffing or snooping. In addition, the management can use a different kind of filters that are electronic in nature such as routers and bridges. Lastly, one protects Ethernet LAN by use of LAN security Architecture to prevent all incoming messages of the operator. Software technologies Development of software that encrypts data in order to provide the privacy with regard to data while in transit. Further, there is authentication process by use of user name and passwords to authenticate. This prevents unauthorized access to vital information in an organization. A fault tolerant system is designed in such a way that it continues to run even after a fault has occurred. According to Bhunia (2006, 99) the initial network operating software applied mirrored disk, whereby the disks were used to read and write similar information. In case one disk failed, the other disk continued to work and the normal processes were not interfered with. Printer and file sharing by workers in a company An administrator operating the network ensures that the printers are successful shared by workers through network application software like the use of Windows NT 2000 server. Such software have file server application used to store confidential files and offers a single backup for confidential and non-confidential files. Windows NT 2000 server has new features that allows better file sharing within a network, it also comes with NTFS’ file feature (Bhunia 2006, 99). Windows NT 2000 server also supports various on-disk file system formats. As explained by Bhunia (2006, 99) Network administrators usually install network systems that mainly provide file service as a member server instead of as domain controllers. The server of a printer in any organization can be any computer that runs Windows 2000 Server. This server manages printers and it can be specialized print server unit. When connecting a printer on the network, there is software, on the print server, that makes the printer to be visible in the network. This enables it to accept and print jobs from client computers. Using servers, administrators normally install print servers as member servers instead of domain controllers to evade administrative overhead that is associated with log in and security roles that this software plays. Shashi (2007) cites that in most cases one-server acts as both file and printer server. The use of Windows 2000 server enables organizations to share printing resources in the entire network. Workers on a variety of platforms can channel print jobs to locally attached printers. The company to enable only twenty employees to access sensitive information from the database, the network administrators sets the system to have the password and users those workers who can gain to access that database. When other users try to log in the system, it automatically rejects their access. Intranets and extranets An intranet is a set of networks that the organization builds by use of the internet protocol and IP-based tools like web browsers. The file move applications under the management of a single administrative entity. The application of this technology is common in the internal network of an organization (Steven 2009, 5). By use of this service, workers will gain access to secure information both on the side and remotely. The organization comes up with organization library central web pages that allow all users to start their search for information. Further, there must be links to various departments within an organization like human resources and other departments that publish their own documents. An extranet is a network that has a limited scope to a single organization or entity and has limited connections to the network of one or more of trusted organizations or entities. However, some customers may get a chance to access some parts of its intranet while the organization allow trusted customers to access the intranet due to security reasons (Simmonds and Ekert 2004, 320). This is a closed network and only specific people use it but not everybody. It has a password protection and special permission accounts nature allow gain to the website by those who have an authority to view contents of the website. It has differing levels of access and features to every user. Internet The internet is a world wide system comprising of interconnected computer networks. The internet is developed using the Internet Protocol Suite. Through the internet, users can get information by requesting the information stored on the WebPages. The resources requested by the user are availed by a wizard that stores information through XML Wrapper methods. Network Topologies As noted by Bhunia (2006, 99). A network topology is a practical structure used when creating a network. However, the structure does not actual to similar to the real physical network system developed on the ground. For example, it is possible to have a workstation used in an office that have ring topology but not necessarily circular in physical appearance. Below are some main network topologies. Bus Topology The developers connect all nodes through one linear cable that they share in a medium. Every node on a cable segment gets transmission from another station on the same section. At every end of the bus, a terminator absorbs any signal from the bus. Any device that wants to communicate with another device on the network transmits a broadcast message onto the wire that other devices see (Bicsi 2002, 107). The intended recipient actually accepts and processes the message from the sender. Ring Topology In this network, every device has exactly two neighbors to communicate with to convey the message. The signals move through a ring in the same way. A breakdown in a cable or device results in disconnection of the loop and this can close the whole network. As pointed out by Shashi (2007, 141) to create a ring network, network technicians employ SONET, FDDI, they could as well use token ring technology is used. Star topology In star topology, a hub is used as a central connecting point. More devices are connected the connected to hub through the Unshielded Twisted Pair (UTP) Ethernet. According to Proulx, et al, (2005, 351) more cables are used in this star topology, a breakdown in a star topology only affects section of the network, and not the whole LAN. Tree topology A tree topology combines several star topologies into a bus. Here, the hub is directly connected to the tree bus, each hub that then is used as a root of the tree bus. The combination of the tree bus and the star structure supports possible extension of the network in a more effective manner, than when the bus or star topologies were used alone. Communication protocols As mention by Proulx, et al (2005, 353) communication protocols guides rules and formats used in passing information through a network. Generally, it entails of an entire protocol suite that describing the protocols applied at different usage levels. These protocols consist of different properties, for example, if they are connect-oriented when used in wireless or if they apply circuit mode, or whether they should use packet switching. Ethernet As explained by Simmonds and Ekert (2004, 320) this is a set of wireless protocols applied in LANS, the Institute of Electrical, and Electronics Engineers have published standards referred to as IEEE 802 that explains this protocol. Presently home users use a set of these standards known as IEEE 802.11 Internet Protocol set This is a TCP/IP and is the foundation that guides all modern when it comes to internetworking. The protocol applies wireless and connection centered services over an essentially unpredictable network that datagram communication traverse at the internet protocol level. As noted by Bhunia (2006, 99) internet protocol suite is used to explain identification of the computer, the address and routing requirement in the internet protocol version four. Conclusion As discussed above, network topologies are vital in designing of a network. Understating the main topologies used in networks, equips a person with basic networking knowledge of how devices used in networks such as hubs, routes and broadcasts. As already pointed out, some of the main topologies include, bus, tree, star, and ring. In a network, quick file and printer distribution are important services offered by the network that users on an internal network can access. Using Windows 2000 Server operating system results in better sharing and print services, since Windows 2000 server comes with an upgrade of these features and more advanced features. Windows 2000 server is designed with open architecture facilitating efforts of a third party to offer extra functionality in response to changing business needs. Whereas it may seem as developing and maintaining of an intranet is expensive and a futile exercise, the services offered by a network are far much important in meeting the goals and objectives of a company. Bibliography Bhunia, T. 2006, Information Technology Network and Internet: New Age International Publishers. Bicsi, B. 2002, Network Design Basics for Cabling Professionals: City: McGraw-Hill professional. Proulx, S et al. 2005, Networking thinking in ecology and evolution: Trends in Ecology and Evolution 20 (6): 345-353 Shashi, B. 2007, Data and Computer Network Communication: Firewall Media Publishers: Simmonds, A. and Ekert, L. 2004, Ontology for Network Security Attacks: Lecture Notes in Computer Science. Steven, K .2009, Networks: Design and management: Orchard publication Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking technologies Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Networking technologies Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1581845-networking-technologies
(Networking Technologies Essay Example | Topics and Well Written Essays - 2000 Words)
Networking Technologies Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1581845-networking-technologies.
“Networking Technologies Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1581845-networking-technologies.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Role of Network Topologies in Designing a Network

Local Area Network Design

The packet switching network is directly connected to the Internet Service Provider similar to a network device i.... After discussing these two type of networks, cell switching is the third type of network.... … The paper tells that encryption must also be incorporated within the network for transmitting highly confidential data.... Topology is the network structure which can be connected to multiple networks structured on different topologies....
12 Pages (3000 words) Assignment

Information Technology Infrastructure Library

The business objectives for this scenario after implementing ITIL are: Recognizing and documenting the scope of support services along with dependencies and interfaces interlinked with the suppliers Document the accountabilities and roles of sub-contractors and imperative suppliers Implementing change management process within the organization for updating contracts Evaluating, monitoring and generating reports on the performance of the suppliers to identify improvements Incorporating system auditing Risk assessment for calculating risks associated with all trading partners and contractsEvaluating the value as well as profits of trading partners and contracts Implementing and maintaining a database including all the records for trading partners and contractors Deliver Value to the customer Ensure product delivery on time Question 3 The goal of designing service for one solution is to ensure stability and incorporation within all activities and processes of all IT functions providing end-to-end business alignment by supporting functionality and quality....
12 Pages (3000 words) Assignment

Business Models and Planning

Business model designing forms a part of the business strategy.... Business Models and Planning Name: Instructor: Course: Date: Business Models and Planning Introduction Business planning is the act of defining all the goals, actions and the strategies – which a business is to take or put into account, so as to ensure that the venture survives and grows....
4 Pages (1000 words) Essay

Network Management Tools

In the paper “network management tools” the author provides the three scenarios in which the network managers would benefit from network management tools.... When any network component fails, the network manager can use network management tools to detect the failed component....
22 Pages (5500 words) Scholarship Essay

The Becoming Company

The bus topology (S1), which is the simplest network, is made up of the trunk and segment connecting all computers in the network.... The computer networking is composed of topologies such as bus, star and linear topologies coupled together.... The performance and well-being of these topologies and arrangements are only possible when the staff and management are involved in the operation of computers.... The Becoming Company in its networking utilizes the three topologies; that is the star topology, bus topology, and the linear topology....
6 Pages (1500 words) Case Study

Social Construction of Technology and Actor Network Theory

This paper examines the social construction of technology and actor network theory.... These perspectives also seek to answer questions on how technology has emerged and evolved.... Instrumentalism is such one view and it holds that technology is a mere tool… The instrumental concept of technology also dictates that technological artefacts are neutral....
11 Pages (2750 words) Essay

Opera houset promotion

The paper will focus on bus topology and use of 100BASE-tx technology in designing a computer network for the laboratory.... A bus network is a form of a network design in which the local area network (LAN) in which each device is connected to the link or main cable that is known as a bus.... It is a network technology that supports high data transmission rates of over a hundred megabits per second.... In such network connections, the home office is often given a network router which connects to the internet service providers....
2 Pages (500 words) Assignment

The Athletes Shack Wireless Upgrade

'Access points' transmit and receive radio signals adjacent to a network hub over a limited distance.... When designing a wireless point to point connectivity, the distance is always considered due to limitation of wireless technology.... Cost is also a major factor when implementing and designing a wireless network.... The paper "The Athlete's Shack Wireless Upgrade" discusses that for catering to the needs of the business for TAS, there is a requirement of secure and effective wireless network connectivity for all the 10 stores within the same area....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us