Network installation Essay Example
February 21, 2021
Analyze and evaluate the network and hardware requirements
It requires later version of windows than Windows 88 with 1024 x 768 minimum screen resolutions. There should be minimum of 1GB Ram, 140 MB free hard disk space and Network Interface Card. The other hardware required include regenerators, mobile phones, switches, servers, routers, modems, Hubs, laptops, computers networking service models, PDAs and Add-Drop Multiplexers. The other category is more concerned with the connectivity referred to as remote connection.). This is about all the technologies that allow one to connect to their computers from a remote location allowing the remote logger to work on the computer as though they were in the same place with the computer physically. The client to some extent is currently employing the other instance of mobile computing where they are using the VMware on NT to process. This is the desktop virtualization aspect in cloud computing.
The company should operate open source operating system with an equivalent structured query language like MySQL would suffice. Since Linux is a variant of UNIX, concurs with the VP technology use Linux is most viable. In addition, due to the fact that Linux is attracting a larger market share, Linux is likely to reduce staff training costs as compared to power systems’ AIX which. Linux is available on x86 and many other hardware types while AIX runs only on power system. Though AIX may provide an upper hand in terms of scalability and perhaps patch management, Linux would still be a better consideration to manage storage area network (SAN). The cluster ware from Oracle within Linux will work well with a relational database management system (RDBMS).
There is need to explore high speed, high capacity backbone networks probably using the fiber optic media to interconnect the various sites within the storage area network. This is the most preferable option due to large capacities of bandwidth that can be supported coupled with the high speeds of transmission. However, a cost versus benefit analysis must be established before deciding the magnitude of implementation for this setup. The desktops and laptops may be physically connected through the backbone especially for the desktops while the laptops can exploit the available remote connectivity options as well as the wireless technologies. This will ensure that while the personnel are dispersed around the various sites they have access to the storage area network from where they can access the relevant data or information when required.
Some of the typical infrastructure technologies that support the setup at company would consists of the wide area network technologies. The commonest of these are the circuit switching and packet switching techniques. The former requires a dedicated path to be established before transmission can commence while the latter is not dependant on the availability of a dedicated path. Data is packaged into packets and routed through available nodes on the network. Another of the techniques available for exploitation is the frame relay which takes advantage of high data rates , low error rates to deliver up to 2Mbps as compared to packet switching which can only manage 64Kbps. Asynchronous transfer mode (ATM) also called cell relay may also be exploited in this setup. ATM makes use of fixed length packets called cells providing little overheard for error control. With this approach, higher speeds of transmission even in gigabytes per second can be achieved. The client could also use such infrastructure as the synchronous optical network (SONET) or Asynchronous digital subscriber line (ADSL) or synchronous digital hierarchy (SDH) which expected to take advantage of the high-speed optical fiber digital transmission capabilities.
Evaluation of 3 deployment software
Deployment involve she distribution, updating and installing of applications for the network. In this case software deployment will be done using land as option in the systems. Software storage will be done in repositories and then re-installed when required. The deployment software that will be used will include a desk central window which has the ability to create storage for re-use in future as well as install and uninstaller EXE and MSI applications. Operating system deployed is also critical in deploying operating system.
Developers will then implement the applications and it is deployed into the environment as stipulated by the model. Rather than compromise with the efficiency of the system and accept unnecessary risks into the system, the datacenter model will apply the microkernel architecture to develop Hypervisor. This hypervisor will offer basic partitioning ability that leverages virtualization extensions towards the processor. In this case, the Guest operating systems will use their own original drivers. This eliminates the possibility of a risk from the third-party code. In addition, the micro-kernel hypervisor supports more hardware than the monolithic one and thus there’s no need of coming up with different hypervisor drivers. The size of the TCB is significantly minimized when a guest has its own drivers since guests are not routed via the parent partitioning. Modern processors are usually equipped with virtualization extensions that normally allow the hypervisor to be a far much thin layer.
Appropriate sources to obtain the technical specifications and licensing requirements
Some applications offered through the web to clients by an application provider. The APIs may be developed with existing software applications on the server of the service provider. The software application used in these cases mostly would be a GPL’ed application and again there would be no violation of the reciprocal clause as in this case, the GPL compliant application may have been downloaded by the service provider and since he is not developing the application but offering it has a tool to the application provider there is no violation of the reciprocal clause. The application provider on his part would use the GPL compliant software on the server of the service provider to develop his application and then sell the application to others on the web. Here again the application provider is not violating the reciprocal clause, since it his not him who is bound by the GPL license agreement instead it is the service provider. Circumvention like this is quiet rampant in the cloud computing space especially with respect to software applications that require the user to agree to the GPL license agreement.
The design of a network is crucial to its security. Network security should really begin with the network design and use of security-capable technologies. Forming the foundation of the security of the network, an appropriate network design can resist attacks with help from network technologies such as subnetting, convergence planning, virtual LANs, and the creation of demilitarized zones (Ciampa, 2008, p. 155).
The network security element of subnetting improves security by way of splitting an Internet Protocol or IP address anywhere within its 4-byte (or 32-bit) address. Also called subnet addressing, this technology can fundamentally allow for the division of networks into three components—the network, subnet address, and host. There are several advantages offered by subnetting. It can cut down on network traffic because broadcasting to hosts becomes restrained to individual subnets. It affords flexibility by way of allowing the customization of the number of hosts and subnets for every organization. Subnets improve address utilization, minimally impacts on externally located routers, and also reflects the physical network. A drawback, however, is that network administrators would need to fully comprehend the creation and management of subnetting.
The securities features have been introduced largely by means of two consistent extension headers avoid any inconsistencies: the Encrypted Security Payload , and the Authentication Header (AH) with corresponding qualities. The AH header was meant to ensure genuineness and reliability of the information relayed by the IP. Its presence protects two kinds of threats: the spoofing packets and unauthorized adjustment of the fixed fields. On its part, the ESP header supports the encapsulation of data with encryption to guarantee only the client computer the right to access the information transmitted by the IP packet.
Briere, Danny, & Pat Hurley. Wireless Home Networking For Dummies. New York: For Dummies, 2010.Print.
Douligeris, Christos & Dimitrios Serpanos. Network security: current status and future directions. New York: John Wiley and Sons, 2007. Print
Geier, Jim. Designing and Deploying 802.11 Wireless Networks: A Practical Guide to Implementing 802.11n and 802.11ac Wireless Networks For Enterprise-Based Applications. New York: Cisco Press, 2015. Print
Miller, Michael. Wireless Networking Absolute Beginner’s Guide. New York: Que Publishing, 2013. Print
Ross, John & John Ross. The Book of Wi-Fi: Install, Configure, and Use 802.11B Wireless Networking. San Francisco: No Starch Press, 2003.Print
More Important Things