Wednesday, March 6, 2019
Mcsa Networking Basics Essay
IntroductionWhat is a vane?A mesh tin be defined as two or more(prenominal) computers which argon linked together to divvy up resources. These resources ass include internet feeler, newspapermans, bundle and accuses. The heart of a electronic interlock is called the host, and its function is to contain all the softw atomic number 18 and services which the internet and its exploiters suppose on.Figure 1 Example of a basic mesh topologyThe legion is operated by personnel called Network or System Administrators, and its their province to ensure the smooth course of the engagement so it is workings as efficiently as viable. This is achieved through the use of a dedicated operational trunk called Windows Server 2003 this gives the network administrator complete accountant all over the network functions.Advantages for a networkCostBecause networked computers back sh be the said(prenominal) resources, approachs can be dramatically reduced. For example, if ther e atomic number 18 decennary computers in a room for from all(prenominal) wiz bingle wishinging admission charge to a correspondent it is far cheaper to route all ten computers to a private, sh ard marker than it is to purchase ten printers maven for separately computer. In this example, the saving would to a fault include the constitute of ink cartridges (you would wholly compulsion to purchase one round of cartridges instead of ten).Software can be purchased and installed in a similar cost effective way. Most popular software is sufficient to be bought and installed on a emcee, and anyone who aims to use it go away all need to purchase a license (the legal rights to use it, usually in the form of a certificate). These licenses are far cheaper than buying the software for each drug user. This method as well means that it isnt necessary for an I.T Technician to install the software on both computer only one install on the server is needed. An former(a)(a) emolument to this approach is when the software requires an update. If it is server based, only the software on the server would need to be updated. in all the users would benefit from the update as soon as it has been installed. If each user had a copy on their computer, I.T Technicians would need to update each one. This could become magazine consuming, expensive and complicated. The software that this could apply to, includes most Microsoft software and Anti-virus software. gageSecurity is a vital element in any business. In a network, security measure is enhanced both internally (security indoors the network) and externally. Users are addicted a username and unravel say to access their files and all the programs, hardware and so forththat they dumbfound been devoted access to. When a user saves a file, it is saved to the server and not the computer that he/she is working on. If that user wants to retrieve that file, it can be done on any computer on the network, and no t honor qualified on the computer that was originally used. This selective information can be accessed, monitored and endorse up by the Network Administrator at any prison term. for each one department can require their own identity on the server, which allows them to give birth access to files, applications and resources which would be relevant to their requirements. For example, the Accounts department may need to set about access to invoicing software (e.g. Sage and Excel), whereas Sales may only require software to monitor and forecast sales over a consequence of time (e.g. Excel). Accounts may not want other departments accessing their software referable to security or confidentiality reasons.Internet security is tighter for both users accessing the internet, and external threats when a network is set up. All the computers can share a single access point to the internet, which makes it easier to monitor internet usage, help reduce hacking and other external threats try ing to access info on the network.Another blow which can be applied by the dodging administrator is Encryption. info within a folder/subfolder can be encrypted to prevent unaccredited access to entropy if other security measures carry been breached. Typically, only system administrators will be given the recovery key to be able to decrypt entropy in cocktail dress of system failure or other unforeseen situations.Disadvantages for a networkExpensive to installThe initial cost of setting up a network can be expensive, with hardware like the server, router, cabling, canup equipment, network printers and server software. Also, dedicated personnel essential be hired to keep the server running efficiently and to recess any server/network issues.Centralised DataHaving all of the entropy in one prat means that data could be broken in the event of a system failure. Regular backups of the server are highly recommended (daily, weekly and monthly) to help to keep data safe. But if the server goes down in between backups indeed all the recent data will be lost.Reduced PerformanceThe servers exercise can become reduced as the network embellishs or as its workload increases through the working day. A server must have as much memory and process power as possible to help minimise the reduction in performance.Task 2aNetwork network topology is the description of how a network is laid out, the subterfuges (server, routers, printers etc) attached to it and the direction which data flows. A network can be described as each Logical analysis situs (the way data flows in a network) or as a Physical topographic anatomy (how a network is physically laid out) There are six im port wineant topologies, coach, Ring, Star, Extended Star, Hierarchical, and Mesh.Bus analysis situsThis can be both a Physical and Logical, in a local area network (LAN), each device is committed by a single cable. This single cable is also referred to as the backbone of the network. A term inator must be on either side of the cable to prevent the data signal from bouncing back down it. The Bus Topology was widely used in to a fault soon networks using standard Co-ax cables. It was an economical solution for networking as only one of import cable was needed. The disadvantage to this was if this cable failed, the satisfying network would go down.Ring TopologyIn a Ring Topology (also cognize as IBM Ring Token), each computer (node) is affiliated to each other in a closed loop. Each computer has its own uncommon identity on the network. When data is transmitted from one node to the other, the data will include the destinations identity and will pass through each node until it reaches the destination. This type of topology has two main disadvantages only one computer can transmit data on the network at a time and if a computer fails the only network will go down.There is a slight variety to this the Duel Ring TopologyThe second ring within the network provides a backup data link, so if there is a failure within the network, the secondary connection will keep the network connected. This is expensive as more cabling is involve.Star TopologyThe most common type is called a Star Topology. Each device is connected to a dedicated scream exchange hub. All the data on the network flows through the network via the substitution hub. These types of networks tend to be small, as data could be degraded or lost on a ample network. The main advantages to this is that it is easy to apparatus and easy to add new devices to the network. But if the central hub fails, the whole network goes down.Extended StarSimilar to the Star Topology, but instead computers are grouped together and connected to a local hub, which in vacate is connected to a central hub. This is widely used in large networks where the network may be in a large building, and each group of computers may represent each department. There are more points of failure on this network, but if a local hub fails, then the symmetry of the network will not be affected.Hierarchical or manoeuvre TopologyThis is very similar to a Ring Topology, but computers are attached to the central hub in layers. While the structure looks variant, this calm has the main disadvantage of network failure if the top device goes down.Mesh TopologyAll the above topologies suffer from the same problem. If one device fails on the network, the whole network goes down. The only solution is to connect each device with each other and remove the need for a server. This is the Mesh Topology and has two main advantages If a device fails, the network will still work and the network doesnt need to rely on the processing power, bandwidth etc from a server as it is supplied from each computer. The disadvantage to this is the high cost of connecting each device to each other, so this would not be suitable on a large network. This type of topology is also referred to as Peer-to-Peer whereas the other topolo gies are considered to be Client/Server based.A institute between cost and connectivity would be the Partial Connected Topology.Devices are connected to more than one node on the network, so if one fails the network can still work. This is more cost effective than Mesh Topology as less cabling is required.Task 2bRecommendationsAs it stands, the structure of the current network is a Hierarchical or Tree Topology. The network uses two different switches to connect the Domain Controller to the 24 computers. These are from two manufacturers lake herring and 3Com and this offers 100Mb and 10Mb stimulates respectively. This is a disadvantage because one group of computers has a quicker data transfer rate than the other.The network does not have a calamity recovery plan should the Domain Controller fail. This has the potential for putting the whole network at risk from permanent data loss. The network also shares a single printer which is attached to the Domain Controller, 10 of the co mputers are connected to it through the sulkyer 3Com 10Mb switch. This means all 24 computers print via the Domain Controller (which is currently overloaded) and 10 computers send data at a slower rate than the rest of the network.My first recommendation would be to replace both switches with a single CISCO 100Mb 48 port switch (631.99 from MISCO website). This would provide a standard, quicker data transfer speed throughout the network and allow for the network to expand. There are a rack up of 24 computers, and this switch would enable a further 24 devices to be added to the network e.g. additional computers, printers etc. This would allow the network to expand whilst maintaining a fast data transfer speed.With the new switch in place, my next recommendation would be to replace the HP Laserjet III (USB connection only) with a newer, network-ready printer like the HP Laserjet 2055DN or P2030 which costs 319 and one hundred sixty from HP website. By replacing it with a newer mod el, notion could be spotless quicker, quieter and more cost effectively e.g. more reliable printing, more slide fastener efficient, lower consumable costs etc. Also, sharing the workload throughout a faster network is more efficient than channelling all the printing requirements of the network to an older single printer on a slow 10Mb switch via the Domain Controller. This will also help reduce the workload to the Domain Controller.While the Domain Controllers workload can be reduced by the addition of a network-ready printer, other options could be to increase the specifications (e.g greater hard drive lay, more memory etc). Ensuring the restrainer has the latest software updates will ensure both the running ability and increase the network security. This will help prevent unauthorised access (hacking) to the network.My final recommendation is add disaster recovery and outback(a) working within the network, By regularly backing up data on a daily/weekly/monthly basis, this w ill ensure the network can be restored in case of total data loss. To answer learning or to prevent students from accidentally causing errors/problems within the network, remote working should be enabled.User accounts can be easy created in Active Directory though the use of a standard template. Templates could be set up for both students and tutors, so all of the common properties of the accounts are already established. When a new user account is required, the administrator will only need to complete the fields that require unique values (eg, name, address, telephone number, course details etc). Once the users have been created within the Active Directory, they can be placed into Organisational Units (OUs). This will group together users, so in this situation students could be placed in OUs which represent their course.When the OUs are established, the users configuration settings can be applied through the host polity commission Console (GPMC). It holds hundreds of user confi guration settings, security options and user event logs, all which can be applied as required by the college administrators.Figure 2 Example of the Group insurance Management Console (GPMC)By using Group Policies effectively, the administrator can take hold and manage exactly what users can and cannot do whilst logged onto the domain. Administrators are able to control how the desktop appears, the icons that are available and the ability to configure the task contain etc by applying the Desktop setting found within the User mannikin in the GPMC. This could be useful if the college policy states that all users must have the Llandrillo College logo as their wallpaper, and various required icons are in place and users to have access to various programs via the start menu.To improve password security, administrators are able to increase the effectiveness of the passwords that users apply to protect their identity on the network. The password options can be found within the Password P olicy within the Computer Configuration section of the GPMC. These options include the ability to employ old passwords, to apply complexed passwords (eg. more than 6 characters, using upper, lower case letters and digits 0-9). In the example, a programmer has created a random word generator to create passwords. Group policy could be configured so when they log on for the first time, users input the randomly generated password and then they must input their own password using a complexed password. If the user ever forgets the password at any time, administrators are able to set it through the Active Directory Users & Computers dig.Figure 3 Example of Password Policy within GPMCTo prevent users from using too much disk quadriceps on the network, administrators are able to allocate limited disk space to users and by applying prompts when this space is nearly used up. By putting this in place, administrators can calculate how many users will be on the system multiplied by how much h ard disk space each user will be allocated. This total will be the borderline amount of disk space required for all users in each new academic year. Administrators will be able to ensure the server can physically hold all the users data without completely running out or running low of disk space.To achieve this, administrators will need to locate the allocated hard drive and apply a quota, constraining users on how much space they can use. Individual users can have separate entries in the quota, allowing them to have a lesser or a greater share of disk space. This would be useful for tutors who may need greater disk space to store course material etc.When the network is running, administrators may be required to monitor the networks resources to ensure it exceeds the users demands. The rotating shaft required is called the Performance Console which is found under Administrative Tools. This tool appears in the form of a graph although it has three counters as a default (MemoryPage s/Second, PhysicalDisk Average Disk Queue Length and central processor % Processor Time), additional counters can be easily added or removed accordingly. A college administrator may add counters to monitor network bandwidth, server exercise (memory, cpu performance, disk performance etc).To help administrators monitor the server, counter logs and alerts can be applied. This can enable administrators to proactively identify when system resources run too low or to identify possible hardware failures/malfunctions. Any one of these problems could result in a degraded performance or total server failure.Figure 5 Example of the Performance ConsoleThe college network may be required to support remote users, allowing them to access the college network whilst being in a different location eg working from home, from another(prenominal) campus etc. This can be achieved through the use of a virtual(prenominal) Private Network (VPN). The user will be able to access the colleges network through the use of the internet whilst achieving the required security and data encryption. The networks firewall must have exceptions to allow evidence users to access the network whilst preventing unauthorised access.Once the network is running effectively, the next challenge administrators will face is maintaining the security and the efficiency of the network. This can be achieved by deploying server updates and hotfixes as provided by Microsoft. The server can be updated with the use of Automatic Updates, which can be found within the All Programs menu under the start button. Updates can be downloaded either smashing away or scheduled to download at a trustworthy day/time. This could be configured to download when the network is at its quietest time (eg 10pm). This would ensure that the update would not effect the overall performance during cross periods.Also, updates for the users computers may be required. Instead of administrators physically installing them on every computer on the network, this could be downloaded on the server as an *msi file and automatically installed via a group policy. So the next time users within the network log onto the network, they will automatically be downloaded & installing the updates from the server with no intervention required.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment