Computer Networking and Management - Case Study Example

Comments (0) Cite this document
This document demonstrates the understanding of some major aspects of computer networking, over three distinct sections. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Computer Networking and Management
Read TextPreview

Extract of sample "Computer Networking and Management"

Download file to see previous pages figurations at the data center core switch enable functional areas within each department to operate as independent LANs regardless of their physical locations.
Internet-enabled Client Applications
The following typical applications are allowed by the security management team to access the Internet:
1. Web browsers (IE 7).
2. Email client (Outlook 2007).
3. Skype client; used for voice chat, instant messaging, video conferencing, and low-cost Internet telephony. These applications were found essential to facilitate immediate contact and collaboration across to other universities and research institutions.
No other network applications are allowed access to the Internet. The above Internet clients operate at designated TCP ports, which are open but monitored and occasionally audited though the firewall, to ensure compliance with security and IT access policy set forth by the campus network management. Any other applications requiring access to university wide intranet resources achieve that through a web interface and therefore do not require having arbitrary ports open.
Figure : screen shot of web browser, email client, and IM/IPT clients
Servers, central security appliances, and edge network appliances are all housed in a secure one-level data center, located within the same campus area. Servers are connected to the main access router via a 10Gbps optical Ethernet. Table 2 illustrates the server distribution, platforms, and functionality.
Web server (Linux)
1 central server
Hosts the intranet portals and internal applications
Mail server (Exchange over Windows 2003)
1 central server
Hosts all email accounts and archives
Domain Controller (Windows 2003)
1 central server
Manages DNS, DHCP, and Active Directory
Antivirus server (Linux)
1 central server
This document demonstrates the understanding of some major aspects of computer networking, over three distinct sections. Section 1 considered the internal network of the College of Engineering and presented detailed high level description of user, server, network, and security designs of the network and how it connects to the Internet and to the university core intranet. Section 2 examined the important topic of data encryption. Symmetric and asymmetric ciphers have been described and contrasted. Examples of each have been provided. Also, the use of encryption for message authentication in the form of digital signature and/or message authentication code was discussed and the two schemes were compared. Section 3 considered the topic of congestion control and avoidance for TCP/IP networks, which make the overall transport infrastructure of almost all today’s public and private data networks. Congestion control algorithms were discussed at a topical level and a comparative description of three algorithms (Tahoe, Reno and Vegas) was provided. Section 3 concluded with describing the role of an HTTP proxy and the performance penalty it encounters due to the common use of database driven dynamic web content.

...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Networking and Management Case Study Example | Topics and Well Written Essays - 4500 words”, n.d.)
Retrieved de
(Computer Networking and Management Case Study Example | Topics and Well Written Essays - 4500 Words)
“Computer Networking and Management Case Study Example | Topics and Well Written Essays - 4500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Networking and Management

Police Officers' Problems in the 21st Century

6 Pages(1500 words)Research Paper

Computer Networking Management

...COMPUTER NETWORKING AND MANAGEMENT In a computer network management system, there should be a method for getting computer programs ready for execution, in relation to particular network devices. Every device in the network is associated with a device type value, and must have an associated device mapper. These device mappers are arranged in a hierarchical structure to show a family or functional relationship between the devices. Functions that will be executed by given devices are expressed as multiple executable program components. In reality, each organization is different and different...
22 Pages(5500 words)Essay

Computer Networking

..., in that they will aid in the management, tracking, accountability of use and misuse detection. The logging will especially assist with user monitoring and debugging of the IT systems. Logs can also help to identify and track the intruder if one does get through and provide additional data for other research processes. The Policy will also state the regular frequency of log review and evaluation. The Policy will explicitly state how to logically and physically secure the LANDP. As such, it will detail which uses have authority to connect to, and to administer the network. The company will use a single firewall program on all its workstations as well as the same version of anti-virus...
9 Pages(2250 words)Essay

Computer networking and management

...COMPUTER NETWORKING AND MANAGEMENT and/or ID # Teacher Task In the context of network management: A) How would a network manager benefit from having network management tools? Describe THREE scenarios using your own networking environment. (6marks) Constant changes to the network environment and the incredible traffic load from various sources of data request and exchange are challenging and sometime overwhelming to the network manager. From the various platforms that interact within a network such as the...
20 Pages(5000 words)Essay

Computer networking and management

...B I R M I N G H A M I N T E R N A T I O N A L C O L L E G E P G D S B I T Computer Networking and Management Feb Contents 1.Task 1 3 1.1 Network Diagrams for TLS and IPSec 3 TLS Record Protocol 4 TLS Handshake Protocol 4 Netgear (2005) explained some of the properties of TLS Handshake: 5 IPSec 6 1.2 Advantages of TLS and IPSec 7 2.Task 2 8 2.1Multicast using IGMP 8 2.2 PIM Dense Mode and Sparse Mode 11 3.Task 3 13 3.1Internet Hosts 13 3.2Internet Protocols 15 SMTP Protocol: This protocol is used to deliver messages to the recipient’s mail server. 15 3.3 Format of Sending Message 15 3.4 Format of Received Message 16 4.Task 4 17 4.1IPv4 versus IPv6 17 5.Task 5 23 5.1Types...
26 Pages(6500 words)Essay

Computer networking

...and then written down onto another computer’s software. The earlier methods of file transfer onto retractable flash drives has now become obsolete as the establishment of computer networking has made file transfer no issue at all. Data management efficiently at run time is one of the basic advantages of file transfer Streaming of Media Digital media files such as image files, videos or audio files are easily transferred over a network. This becomes particularly useful when the units of an organization are present at varied physical locations. Each unit may transfer their interactive digital media files to other units thus maintaining follow-up of tasks...
4 Pages(1000 words)Research Paper


2 Pages(500 words)Assignment

Computer Networking

...Technologies in Wireless Networking Ahmad Alnafea Department of Computer Science and Technology of Bedfordshire Wireless network is a type of computer network that has become vital for modern existence. Some of benefits of wireless network can be convenience, flexibility, productivity, easy setup, maintainable, expandable, robust security protection and cost. The wireless networks are continuously growing but there still have some of the key challenges in wireless networks that are security, radio signal interference, system interoperability and many other bases. Now many improved standards are introduced...
1 Pages(250 words)Essay

Computer Networking

...of the network. Computer networks facilitate the sharing of files among other modes of communication. The type of a network depends on its uses and may include intranets such as Local Area Networks and Wide Area Network both of which permit communication within organization and the internet, which connects an organization to other users throughout the world. Regardless of the network type, communication through the networks is multi layered thereby permitting specific levels of access to the organizations’ databases (Simmonds, Sandilands & Van, 2004). This ensures that a manager for...
5 Pages(1250 words)Research Paper

Computer Networking and Management

...Computer Networking and Management Task 1 Part A How would a network manager take from having network management tools? Some of the Network Management tools are WAN (Wide Area Network), LAN (Local Area Network), Routers, Switches, Servers, Apps. Here these are few network management tools are given below: 1. GroundWork Monitor Professional Launched in 2004, it’s one of the initial enterprise-scale open source network management offerings. Monitor Professional offers centralized...
21 Pages(5250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Computer Networking and Management for FREE!

Contact Us