StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Network and Server Issues - Assignment Example

Cite this document
Summary
The assignment "Computer Network and Server Issues" focuses on the critical, thorough, and multifaceted analysis of the instructions for connecting to the server and computer network. A computer server mainly provides background amenities for client processes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful

Extract of sample "Computer Network and Server Issues"

Server 2008 Assessment 1. A computer server mainly provides background amenities for client processes. 2. a) Print and file services regulate the sharing of files and printers amongst the clients within the network. b) Application services enable the execution of certain programs necessary within an institution's network for instance email servers. c) Gateway services facilitate the points at which networks merge with the other networks hence performing network address translations between dual or more networks. d) Firewall facilities offer sanctuary from unauthorized personnel while proxy services hide interior networks from the internet. 3. The following should be taken into consideration: security, robustness, performance, fault tolerance, scalability, monitoring and management tools. 4. Hot-swappable drives permit a hard drive replacement or installation without the shutdown of a server. 5. The three major benefits of hot-swappable drives are that they are fairly easy to use and offer better speeds and in addition, the system suffers insignificant downtimes. 6. In a networking environment, mirror denotes a set of files or websites that are duplicated to other computer servers in the network such that the files and websites are available in multiple locations thus decreasing network traffic. 7. Elements to contemplate when choosing server CPU include: storing space, computing assets, management, and conductivity. Conductivity signifies the accessible number of ports and speeds of the ports. 8. Centralization-network operating systems facilitate resource and data security, Flexibility- easy integration of new technologies, Interoperability- components work together, Scalability ability to individually replace elements, and Accessibility-remote access through numerous platforms. 9. a) Firewall server-Using distinct sets of rules, it imparts a security system to monitor inbound and outbound traffic. b) Proxy server-hides network internal structures from unauthorized access. c) Database server-holds institutional data for custom applications that are run on workstations. d) Client-server- acts as the central repository for the networks applications and files. e) Application server- run programs on the network for example Oracle. f) Mail server- Depositories for posts that are received and sent. g) File and print server- permits the sharing of files and printers among network clients. h) DNS server-conducts configurations and name resolutions for the NetBIOS i) DHCP server enables the configurations for assigning IP addresses to the network clients 10. SATA drives offer flexibility in terms of the storage systems and increased bandwidth capabilities. 11. Quality power supply offers expendable runtime prioritization and avails the optimum wattage required to operate at peak and off-peak times. 12. A disaster recovery plan identifies the activities that an organization does and the guideline for conducting the activities in the event of a disastrous incidence. 13. Defining where to store backups depends on the type of backup required, the lifespan desired, and the volume of data. 14. Verifying backup connotes the procedure of checking a backup archive’s integrity. 15. Redundancy simply designates the existence of compound replicas of certain data or information while Scalability refers to the system’s ability to undergo an incremental or diminished change in terms of performance with an upsurge or decrease in a number of resources. 16. RAID supplements backups through data distribution across all drives in an array in the form of constantly-sized chunks to realize maximum recovery from hard disk crashes. In order to supplement a backup, RAID array is implemented through levels as zero, one, and five. Level zero represents disk stripping, level one epitomizes disk mirroring, and level five disk stripping with parity. Section 2 –Computer Networks 1. Small networks necessitate computers, Ethernet cables, and a switch. 2. Ability to support multiple operating systems offers higher security like accessibility, and the number computers are not limited to a specific number. 3. Peer to peer network is a network with no dedicated server. The workstations basically share components and data. The main drawbacks of peer to peer network include: low-security levels, requires a limited number of PCs, and difficulty in management as all workstations are managed individually. 4. Security, scalability, and interoperability. 5. Ubuntu, Free NAS, and Amahi 6. Client computer software include: 7. A typical LAN stays limited to distinct buildings while a WAN ranges across multiple geographical locations. 8. a) Ethernet cables are LAN cables used to transmit data based on the CSMA/CD mechanism b) ADSL2 aims at increasing interoperability and performance for new services and applications while ADSL2+ increases data transmission rates and bandwidth c) Dial-up Modem designates the device that permits internet access using dialed telephone service connections. d) Wireless communications refer to the exchange of data or information 9. Scalability refers to the system’s ability to undergo an incremental or diminished change in terms of performance with an upsurge or decrease in the amount of resources. 10. Protocol denotes the homogenous scheme for information processing and transmission concerning various devices 11. A switch forwards data to all connected ports but only to the one where the destination system is connected. 12. A network administrator designs, plans, operates, manages, and ensures security of the network 13. a)LAN connection b) LAN connection c) WAN connection d)WAN connection Section 3 3.1 Ethernet 1. Bus topology, Ring topology, Star topology, Hybrid topology, Wireless topology, and Mesh topology. 2. Three hundred and twenty-five feet in length. 3. A waiting mode by which computers in the network pause for a quantified amount of time before trying to convey data in the result of a collision discovery. 4. By using CSMA/CD access technique in the network. 3.2 Network Adapters 1. A modem converts digital signals to analog before use while the NIC translated data to electronic signals before use. Additionally, NIC is capable of performing data conversions, unlike the modem. 2. NIC communicates with hosts in the network using antennas and microwaves. The NIC is connected to the USB port or the PCI port. 3. Some companies place an OUI digit on the MAC address. The OUI number is frequently in front of the address. 3.3 Network Topologies 1. A logical topology states the manner in which nodes converse in the network and the organization of the modules in the network. 2. Physical topology represents the wire connections while logical topology denotes how the network nodes cooperate with one another. 3. The multiple pathways amongst all CPUs are redundant hence impractical. 4. The logical star topology is scalable, additional and deduction configurations are easily achieved with no disturbance to the network. Additionally, the star topology presents a central management method as opposed to the bus topology. 3.4 Wireless concepts 1. In the line of sight propagation, the transmitter and receiver point towards each other while in the diffuse mode the transmitter and receiver are not necessarily facing one another hence the multiple reflections. 2. The 802.11a functions in the 5GHz frequency band with up to 54Mbps while 802.11g runs within the 2.4GHz variety using the OFDM technology with less than 54Mbps. 3. SSID denotes a service set identifier that are unique typescripts making up a wireless LAN name. 4. WPA has dual mechanisms (authentication and encryption) to ensure security, unlike WEP. 5. Gadgets that exchange data over short expanses. 3.5 The OSI Model 1. Open System Interconnection embodies a standard structure for sub-dividing communication system services and functionalities into distinct layers. Thus the OSI aids in comprehending the backbone of network communications. 2. A theoretical model enables easier troubleshooting, enables easy understanding of networking as the network is broken into manageable pieces, and it also permits vendor interoperability. 3. Layer three is the network layer while five is the session layer. 3.6 IP Addresses 1. The vital characteristic of IP address range is the self-encoding key that divides the network prefix plus the host number. Class A has 8 prefixes, class B 16 prefixes, and class C 24 prefixes. 2. The preceding 21 bits epitomize the network figure, and the subsequent 8 bits are the host digits. 3. By means of subnetting. 3.7 WAN Concepts 1. In a packet-switched network data are transmitted as packets with unique destination addresses and are thus transmitted to various destinations. On the other hand, circuit switched networks, nodes first verify dedicated circuit channels to complete a transmission exercise. 2. By use of CSMA/CD. Every host in the WAN has equivalent access rights to the wire. However, when a signal is already accessing the wire, the host waits until the wire is unoccupied then continue with the transmission. In the result of multiple transmissions, priority is engaged on a first come basis. 3.8 Network Threats 1. The minimum recommended number of characters is 8, and the complexity should contain at least a single lower case alphabet, two upper case alphabets, three number characters, and four special characters. Additionally, it is commendable to use passphrases, and password managers. 2. A disabled account signifies that the owner cannot log into the account while an account lockout means that the account is inactive for a specified amount of time due to the administrator locking it. 3. Social engineering typically means accessing a secure system to obtain sensitive data for instance through phishing. 4. User awareness 5. A worm replicates self-functional copies and does not necessitate hosts to propagate. Boot sector virus mainly affects storage device’s master boot records of gadgets such as hard disks and floppy drives. Trojan horse is also malware that duplicate. However, Trojans generate backdoors to permit malicious people access to systems. To ensure defense from modern virus variants, one must keep an up to date anti-virus software and enable high-level user authentication levels for all personnel categories. Multiple Choice Questions Lab 1.1 Review Questions 1. B 2. A 3. B 4. B,C,D 5. A,B,D 6. False 7. C 8. Each unique address ensures the packets arrive at the intended destination. 9. A,B,D Lab 1.2 Review Questions 1. A,C 2. B,C 3. B,D 4. Peer to peer architecture do not have one central server system 5. True Lab 1.3 Review Questions 1. B,C 2. True 3. B 4. C 5. B 6. B Lab 1.4 Review Questions 1. A,D 2. D,B 3. B,C 4. B 5. D Chapter 14 Review Questions Lab 14.1 Review Question 1. B 2. D 3. D 4. A 5. D 6. C Lab 14.2 Review Question 1. C 2. C 3. C 4. D 5. D 6. D 7. C Lab 14.3 Review Question 1. B 2. A 3. B 4. D 5. B 6. A Lab 14.4 Review Question 1. A 2. B 3. A,C 4. C 5. A Lab 14.5 Review Question 1. B 2. A 3. A 4. A,B,D 5. C Lab 11.1 Review Questions 1. A 2. B 3. D Lab 11.2 Review Questions 1. C 2. A 3. D Lab 11.3 Review Questions 1. B 2. True Lab 11.4 Review Questions 1. D 2. D 3. True References ODOM, W. (2004). Computer networking first-step. Indianapolis, Ind, Cisco.  PETERSON, L. L., & DAVIE, B. S. (2011). Computer networks a systems approach. Burlington, Elsevier Science. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Network and Server Issues Assignment Example | Topics and Well Written Essays - 1750 words, n.d.)
Computer Network and Server Issues Assignment Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/2091430-computer-network-and-server-issues
(Computer Network and Server Issues Assignment Example | Topics and Well Written Essays - 1750 Words)
Computer Network and Server Issues Assignment Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/2091430-computer-network-and-server-issues.
“Computer Network and Server Issues Assignment Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/2091430-computer-network-and-server-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Network and Server Issues

Network Security

There are to kinds of networks: synchronous network and data networks.... hellip; The rapid growth of networking has also come with its own challenges, mainly in the area of network security.... He also defines a network as an interlinked system.... Therefore, network security can be defined as the safety of interlinked systems.... The rapid growth of networking has also come with its own challenges, mainly in the area of network security....
7 Pages (1750 words) Term Paper

Dynamic Host Configuration Protocol

In most cases, new devices are connected to a network as time goes and DHCP allows this in a systematic and orderly manner without necessarily overwhelming the network.... his report makes a conclusion that dynamic host configuration protocol has served its purpose of being the mainstay in the normal functioning of the computer networks so essential to modern life today....
10 Pages (2500 words) Research Paper

Network Infrastructure Assignment

This paper ''network Infrastructure Assignment'' tells that The top management of the company is not sure about all the networking functionality they might need either now or in the future.... The existing network infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations.... he purpose of the needs analysis is to analyze the business objectives and produce requirements for a network infrastructure to be used in the proposed network infrastructure solution....
12 Pages (3000 words) Assignment

The Issue of Network Security

It is common for hackers to target the computer network of a company; this may have significant negative impacts on the company Server Server Introduction With technological advancements, the issue of network security has become of significant concern.... This stems from the fact that unauthorized users may gain access to an organization's computer network or system.... It is common for hackers to target the computer network of a company; this may have significant negative impacts on the company (Gollmann, 2011)....
2 Pages (500 words) Essay

A Network Solution for Alpha Omega Technical Industries

This essay analyzes that the network will serve millions of users with the desire to access any of the file systems related to storage affairs.... Business customers will also have the opportunity to use the network as a gadget for storing and even retrieving information regarding company products.... hellip; This essay demonstrates that the new system will give room to the user to apply knowledge regarding versatility of the network with limited inquiries from all the people accessing the system....
4 Pages (1000 words) Case Study

LAN Computer Platform

It explains how a LAN computer network can be organized and execute.... Personal cable runs are made from centralized dynamic hubs to every workstation, network printer, server, or router  The crucial individuality of LANs, in distinction to Wide Area Networks (WANs), comprise there greatly superior data transfer rates, lesser geographic range, and a shortage of require for telecommunication lines.... The paper analyzes the various aspects of the LAN and it compares various operating systems that can be implemented on the LAN … Everybody engaged with local area networking has a fundamental considerate of network wiring and cabling....
15 Pages (3750 words) Essay

Building a Business Network

This essay discusses a computer network, which is simply a system of interconnected computers.... hellip; This essay analyzes that a computer network is a collection of autonomous computers interconnected by a single technology, plus peripherals (printers, CD-ROM drives, scanners, and so on) so that all computers can communicate and share resources with each other.... local area network (LAN) is a collection of computers and other devices connected to each other to enable communication and sharing of resources....
16 Pages (4000 words) Essay

Network Operating Systems Past and Present

A network operating system is a program that is executed in server machine and also able to take care of the users, facts and figures, security, groups, applications and other networking operations.... Some of the network operating systems which have been developed include Microsoft Windows NT and Windows server 2000, 2003 and 2008, the Novell Netware, the UNIX, Linux, Novell Linux, and Mac OS X server (Hunter, 1995).... A network is basically made up of the client who requests for services and the server that will respond to the requested services....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us