Wednesday, April 3, 2019
Advantages And Disadvantages Of Networked Medium Information Technology Essay
Advantages And Disadvantages Of vaneed  sensitive In solveation Technology  analyzeBus  internets  expenditure a common backb whizz to connect  solely  tresss. A single   communion  enchant, the backb i functions as a  oerlap  communion  mediocre that devices attach or tap into with an inter confront connection. A device wanting to  evanesce with a nonher device on the  cyberspace sends a broadcast message onto the  cable that all other devices see,  just now  besides the intended recipient actually accepts and processes the message.Ring  network  topologyIn a ring network, every device has exactly two neighbors for communication purposes.  whole messages  motive  tycoon through a ring in the same  attention. A failure in  either  agate line or device breaks the  handbuild and  basin take down the entire network.Star topology some(prenominal) home networks  purpose the star topology. A star network  gasconades a central  radio link point  re elemented a hub that whitethorn be ahub,sw   itchor router. Devices typically connect to the hub with Unshielded Twisted  pair (UTP) Ethernet.Comp atomic  offspring 18d to the bus topology, a star network generally requires  more than cable, but a failure in  any(prenominal) star network cable  go forth  simply take down one computers network  addition and  non the entire LAN.b) Advantages and disadvantages of  several(prenominal)ly medium.Network medium is the physical channel that  wontd for transmission in the network. The types of the medium  beWire referenceairWireUTP cable is a medium that is composed of pairs of wires.UTP cable is  apply in a variety of networks. Each of the eight  sepa footstep copper wires in UTP cable is covered by an insulating material. In addition, the wires in  individually pair   be twisted around  for each one other. caseLong distance signal transmission.Large Bandwidth, Light Weight, and Small diameterLong LengthsEasy Installation and UpgradesNon-ConductivitySecurityDesigned for Future Applica   tions  inescapablyAirMobility.Elimination of unsightly cables.c)  pass for topology and medium to useTopologyFigure 1.1  Star topologyWe select the star topology for this in-house network. Because the star topology is most popular topology for in-house network (LAN).  alike we  hobo be benefit by using the star topology in a LAN.BenefitsInformation  seat be  substantially shared allowing for quick and informed decisions to be made, saving  m and money.A more productive and competitive environment is achieved through greater teamwork  deep down the organization.Network-establish communication  much(prenominal) as email is considerably cheaper than using the phone or fax and sharing resources such as printers  poses more efficient use of equipment at lower  tolls.Standard versions of procedures and directories  evict be made  come-at-able to everyone.IT administration can be centralised.Data can be backed-up from a single point on a scheduled basis ensuring consistency.MediumFigure1.2    WI-FI networkWe select the WI-FI for this in-house network. BecauseMobility.Elimination of unsightly cables.Problem Identification tax 2  10  labelInvestigate the  meshing connection requirements for the  put up Department.a) Describe the  cyberspace  answers that whitethorn be  demand.b) Explain the connection speeds that are suitable for these requirements.c) Find examples of Internet Service Providers (ISPs) that can  pull together these requirements in your  province.d) Make a passport to use one ISP based upon the  work offered and price charged. declaration of  job 2a) Hardware and  packet product RequirementsComputer with either Windows 95, Windows 98, Windows ME, Windows XP Professional, Windows NT 4.0, Windows 2000, or Windows Server 2003 installed.A CD-ROM  buzz off for the installation compact disc.Adequate disk space for the  entropybase, business objects, and  meshing pages  10 MB free space minimum.Transmission Control  protocol/Internet Protocol installed.A network     varyer  brain and  topical anesthetic area network connection.An Internet connection and Internet Protocol  send from your Internet Service Provider.Network Adapter board.Figure 2.1 Intranet network  schemab) Connection speeds requirements512 for upload is standard connection for sound  single, the much   emergencyed is 138 kbps, means that 512  138 = 374 kbps free for chat or image. Usually, download  upload is potential for internet  generater to  fuddle busy server and in this  detail you  leave behind be  machine- feelerible from phone standard line, with smaller speed.So in this  organisation it demands 512 kbps connection speed.c) Examples of Internet Service Providers in our countryBrack net.Zip.Qubee.Grameen phone Internet.Bangla lion.Recommendation to use the ISP In this   administration of rules we select Qubee as out ISP because,Qubee has the solution which is fast and reliable.Very much  terms effective. much then it is driven by WI-MAX  applied science.And obviously it    is portable.There package,Monthly  customs AllowanceSpeed5GB10GBSky256 KbpsBDT 850BDT 950BDT 1,250512 KbpsBDT 1,250BDT 1,450BDT 2,2501MbpsBDT 2,250BDT 2,750BDT 5,250andQubee ModemTk. 3,000Modem InstallationFreeFirst months  compensation payable at the  fourth dimension of signupProblem IdentificationTask 3  30 MarksInvestigate the methods the  sex Department could implement for  bipartisan  portion  communication theory. As a minimum include the  by-line  teachinga) How each method works (frequencies, full/half duplex, etc).b) Details of the  intelligent requirements for  run the  corpse in your country.c)  personifys of setting up and  operate the  trunk, including licensing   woos, equipment costs, etc.d) Limitations of each method.Provide a recommendation for how voice communications should be set up and run including reasons for this recommendation.Solution of Task 3Method of full/half duplex systemHalf-DuplexAhalf-duplexsystem  wills for communication in  twain directions, but     except one direction at a time. Typically, once a party begins receiving a signal, it  must  appreciation for the transmitter to stop transmitting, before replying.An example of a half-duplex system is a two-party system such as a walky-talky style two-way radio, wherein one must use Over or another(prenominal) previously designated command to indicate the end of transmission, and ensure that only one party transmits at a time, because both parties transmit on the same frequency.A good  similarity for a half-duplex system would be a one lane road with traffic controllers at each end. Traffic can flow in both directions, but only one direction at a time with this being  modulate by the traffic controllers.Full-DuplexAfull-duplexsystem allows communication in both directions, and unlike half-duplex, allows this to happen simultaneously. Land-line telephone networks are full-duplex since they allow both callers to  pronounce and be heard at the same time. A good analogy for afull-dupl   exsystem would be a two-lane road with one lane for each direction.ExamplesTelephone,Mobile Phone, etc.Two way radios can be, for instance,  knowing as full-duplex systems, which transmit on one frequency and  pay for on a different frequency. This is also called frequency-division duplex.  oftenness-division-duplex systems can be  encompassing to farther distances using pairs of simple repeater  charges, owing to the fact that the communications transmitted on any one frequency always travel in the same direction.Full-duplex Ethernet connections work by making simultaneous use of all four physical pairs of twisted cable, where two pairs are use for receiving packets and two pairs are used for sending packets, to a  straightway connected device. This effectively makes the cable itself a collision-free environment and theoretically doubles the  uttermost bandwidth that can be supported by the connection.There are several benefits to using full duplex over half duplex. First, time is    not wasted since no frames need to be retransmitted as there are no collisions. Secondly, full bandwidth is available in both directions because send and  accept functions are separated. Third, stations/node do not  find to wait until other operations complete their transmission as there is only one transmitter for each twisted pair.Legal requirements for operating the system in our country1.1 As per the national frequency allocation  think 2005 (nfap 2005), spectrum from the ism band in 2.4000-2.4835 ghz and 5.725-5.875 ghz is allocated for wi-fi use.1.2.  entrance fee to the spectrum will be on shared basis. There will be no exclusive assignment to any individual or organizations, whether for private, public or commercial use.1.3. Any government or private organization/educational institution/corporate body can establish and use wi-fi network on non commercial/non-profit basis.1.4. Household/private users are not required to take any  liberty from the  management or pay any levy/c   harge for using wi-fi in the given ism band.1.5.  some(prenominal) indoor and outdoor wi-fi is permitted in the given spectrum of ism band. However, the maximum power output for the wi-fi equipment is limited to 1 watt.1.6. All commercial wi-fi hotspot operators/service providers shall possess an isp or equivalent  authorize (e.g., bwa  liberty). Existing operators having such license from the commission will be eligible to establish wi-fi network for providing  in conclusion mile solution.1.7. Operators/service providers will submit a detailed  leaning of wi-fi outdoor hotspots to the commission. There will be levy/charges applicable  per annum for all hotspots. the levy/charge shall be charged as per the rate list published by the commission.1.8. All service providers will  line up permission in the form of no objection certificate (noc) from the commission for importation, deployment, use and providing any service with wi-fi equipment. Guideline for application and application fo   rm is available at http//www.btrc.gov.bd. Existing ism band operators who wish to adapt their present wi-fi equipment for the same purpose may also be provided permission from the commission on case by case basis.1.9. All vendors in possession of  take iner possession and radio communication equipment vendor license issued by the commission are eligible to apply for noc for importation and  market of wi-fi equipment in Bangladesh.1.10. The commission reserves the right to cancel the permission if any complication arises anytime.c) Costs of setting up and operating the system, including licensing costs, equipment costsThe cost of operating the systemThe cost of operating the systemPurposeCost01.1pr cross connect wire wh/red red/white 1m feet3000/=02. programing cable for air-phone1500/=03.IP network station port35000/=04.Controller card f/60 units non scrolling25000/=05.Pc-console-software50000/=06.Access control  let outpad f/jb-dv12000/=07. characterization monitor15000/=08.Human (   per/month)5000/=12. thorough14,6,500/=Table-3.1The cost of operating the systemThe cost of equipmentsThe cost of equipmentsequipmentsPrice01.Handset spare part f/ie1gd1500/=02. exculpate handset f/men-na3000/=03.Pc-380 select switch pc f/ap-m1500/=04.Ja av modulator12000/=05. tinct mem vandal set50000/=06.Access control keypad f/jb-dv12000/=07. verge station adaptor f/ 1 door5000/=08.C.o. audible bulls eye5000/=09. auguring switch5000/=10.Single line auto phone dialer5000/=11. condition  translator1000/=12.Total10,1,000/=Table-3.2 The cost of equipmentsLimitations of each methodDuring the time when one wave passes through another we say that the wavesinterfere. It is really not correct to say that the waves collide or hit, although this is often how such an  interaction is termed.When thecrestof one wave passes through, or issuper positionedupon, thecrestof another wave, we say that the wavesconstructively interfere. Constructive  limp also occurs when thetroughof one wave is super    positioned upon thetroughof another wave.During any wave interference the shape of the medium is determined by the sum of the separate amplitudes of each wave. We often say that when waves interfere, amplitudes add.Using the arrow buttons step through the  above  sustenance to see how the amplitudes add during constructive interference. Notice that in this animation the crest of the red wave constructively interferes with the crest of the blue wave.Recommendation for voice communications set upWireless Fidelity, better know as Wi-Fi, is a term used to describe the underlying  applied science of  receiving set local anesthetic area networks based on the Institute of  galvanising and Electronics Engineers 802.11 standards. Initially intended to connect  peregrine computing devices in local area networks, Wi-Fi applications have grown to include various data, voice, and video  operate such as Internet access and Voice over Internet Protocol.Wi-Fi engineering platform is based on single   -carrier direct-sequence spread spectrum and multi-carrier Orthogonal Frequency Division Multiplexing radio technologies to transmit and receive signals.Wi-Fi is more commonly used in point-to-multipoint environments to allow extended network connectivity of multiple portable devices such as laptops, telephones, or PDAs. Wi-Fi also allows connectivity in point-to-point mode, which enables devices to directly connect and communicate to each other. A region covered by one or more APs is considered a hotspot. Home networks commonly deploy one AP that is typically connected directly to an Internet service provider , whereas larger networks may require at least several APs positioned in strategic locations to provide  tractability of service to a large number of users. Because of range constraints, Wi-Fi networks are used in localized regions.Figure 3.1 Common Wi-Fi NetworkWi-Fi can be used in conjunction with other emerging wireless technologies, such as Worldwide Interoperability for M   icrowave Access (WiMAX) and Wireless  lease Networking, to extend the coverage area of terrestrial networks and to provide high-speed mobile data and telecommunications services. For example, WiMAX can be used as a backhaul technology to connect multiple Wi-Fi hotspots with each other and to other parts of the Internet. WiMAX describes the technology behind wireless networks based on the IEEE 802.16 standards.Wi-Fi technology has been highly  apply for many applications such as voice communications, video communications, and various data services. This section describes how Wi-Fi technology supports these applications.The expansion of telecommunications has spawned great need for new technologies to provide sought-after voice communication services. Internet telephony, better known as VoIP, is a technology that allows for transport of voice traffic using an Internet Protocol (IP) network infrastructure. VoIP and Internet telephony have come a long way since their inception, and with    the impressive development of Wi-Fi technologies, the popularity of voice communications over wireless will continue to increase. Common VoIP networks consist of the hardware and software enabling the end users to leverage the Internet as the transmission medium for telephone calls. IEEE 802.11 Voice over Wi-Fi is the wireless version of this technology that is designed to work with wireless devices. VoWi-Fi solutions provide mobile users during  critical missions with the ability to  wind wirelessly.Typically, a VoWi-Fi user device will connect to an AP to authenticate to a designated VoIP network. Once associated to an AP and authenticated to the appropriate network, a user will have the capability of mobile voice communications across enterprise networks, residential broadband networks, or even public/private hotspots. VoWi-Fi products are  turn more advanced and readily available to support various  contend  concise- and long-term voice service needs, such as in commercial, hea   lthcare, private, and  ensuant  grade environments.Given the steadily increasing demand for voice services and mobility, wired and wireless VoIP deployments continue to grow and  resultantually will  depart more prevalent than traditional circuit switching voice systems.  angiotensin converting enzyme advantage VoWi-Fi provides over traditional circuit-based voice communications is an ability to easily accommodate user growth in many different operating environments, through software configuration. Typically, physical attributes of circuit-switched voice systems can limit the flexibility of real-time configuration. Deploying a wireless VoIP system can provide  world-shaking savings in cost and deployment time when compared with other wireless voice communication solutions.Problem IdentificationTask 4  30 MarksInvestigate telephone systems available in your country for single-site organisations like the Fire Department. Pay particular attention toa) The main equipment that would be i   nstalled.b) The features available with each system.c) The cost of equipment and installation.d) The cost of operating the system.e) Provide a recommendation for which system to purchase including reasons for this recommendation.Solution of Task 4a) The main equipment that would be installedThe following equipments are generally installed through telephone systems2.4 GHz digital cordless voice transmission, the latest cordless technologyUp to 10 cordless handsets can share a single base stationUp to 20 voice mailboxes on a single system voice communication recognition enables you to control your system with your voiceText to speech  tax deduction technology enables your system to read your e-mail to you over the phone gifted call forwarding have your calls forwarded to you when youre on the roadConnects to your Windows computer to give you advanced unified messaging and computer telephony featuresb) Features available with each systemThe following features are available with the ins   talled telephone systemsCall  delightDirect  internal Dialing and Direct Outward DialingHuntingLine  obstructionStation Line IdentificationStation-to-Station Dialing Centrex with Voice MailAutomatic  recollectionCall Forwarding-Busy LineCall Forwarding-Dont  dissolveCall ScreenCall TraceCall Waiting-IncomingDirected Call  pickup armDirect Inward Dial to Direct Outward Dial  offCall exaltation Transfers calls, even cellular calls, to another line  either inside or outside your Centrex system.Direct Inward Dialing and Direct Outward Dialing Allows you to route calls directly or through an attendant.Hunting Automatically sends an incoming call from a busy line to the next designated line.Line Restriction Limits phone access on selected lines so that only authorized numbers or regions can be called.Station Line Identification Provides a detailed  destroy of calls made by each Centrex station  including start time, duration, and toll call numbers.Automatic Callback Allows a station user    to be called when a previously busy stationbecomes idle.Call Forwarding-Busy Line Automatically reroutes calls to a designated station or your voice mail if your line is busy.Call Forwarding-Dont Answer Automatically reroute calls to another phone if you havent responded within a preset number of rings.Call Screen Manages interruptions by having annoying or harassing calls diverted  thisfeature allows up to ten customer-designated numbers to be routed directly to a  tapeannouncement.Call Trace Allows you to alert the authorities with useful information when harassing orthreatening calls are made to your business.Call Waiting-Incoming Lets you take a  irregular call if you are already on the line.Directed Call Pickup Lets you answer a fellow employees line (within the call pickup group) without  travel from your desk.Direct Inward Dial to Direct Outward Dial Transfer Allows you to transfer an incoming direct dialed call to another location, either within the Centrex system or to an o   utside company, residence, car phone, etc.- instead of having the caller  come up and dial the new number.c) The cost of equipment and installationFigure 4.1The cost of equipmentsequipmentsPrice01.Handset spare part f/ie1gd1500/=02.Complete handset f/men-na3000/=03.Pc-380 select switch pc f/ap-m1500/=04.Ja av modulator12000/=05.Color mem vandal set50000/=06.Access control keypad f/jb-dv12000/=07.Door station adaptor f/ 1 door5000/=08.C.o. audible ringer5000/=09. concern switch5000/=10.Single line auto phone dialer5000/=11.Power adapter1000/=12.Total101000/=Table-4.1 the cost of equipmentsd) The cost of operating the systemThe cost of operating the systemPurposeCost01.1pr cross connect wire wh/red red/white 1m feet3000/=02.Programming cable for air-phone1500/=03.IP network station port35000/=04.Controller card f/60 units non scrolling25000/=05.Pc-console-software50000/=06.Access control keypad f/jb-dv12000/=07.Video monitor15000/=08.Human (per/month)5000/=12.Total146500/=Table-4.2The    cost of operating the systemProblem IdentificationTask 5  10 MarksThe Fire Department needs to remain  running(a) in the  eccentric of a serious incident such as a major terrorist attack or war. Explain the measures you would put in place that would allow the Fire Department to operate in the event of Newtown having no electrical power and fixed telephone lines being broken.Solution of Task 5Disaster recovery  images are complex, and can  ultimately take two years or more to complete. While this can be taken in one way as from a disaster recovery consultant, it also comes from  insure.To make a plan for the  enkindle department network to deal with major disastersand also to deal with the short term failure of the system fallowing topics are included1. Reason for  be after value human liferecover critical operationsprotect competitive positionpreserve customer confidence and good will andprotect against litigation.2. Recognitioninitial reaction procedures to a disaster  surveynotif   ication procedures for police,  gouge, medical andnotification procedures for management.3. Reactionmobilizing the EMT (executive management team)filing of initial damage assessment  informs to the EMTassisting EMT in preparation of statements andopening a critical events log for audit purposes.4. Recoverymodified signing authority for equipment purchasesprocedures for acquiring cashprocedures for maintaining physical  trade protectionprocedures for arranging security at the discredited siteprocedures for finding and getting to the recovery center (maps) andprocedures for arranging security at the recovery center.5. Restorationcoordination of  return key of the original siterestoration of electronic equipmentreloading of softwarerestoration of power, UPS, common building systemsreplacement of fire suppression systemsrewiring of the buildingrestoring the LAN andrestoring the WAN connections.6. Return to Normal testing procedures for new hardware and softwarewhat constitutes a success   ful test (before recommitting production) learn operations personneltraining employeesscheduling migration back to original site andcoordinating return to original site.7. Rest and Relaxschedule compensatory time off andmake visits to employees in rehab from stress.8. Re- valuate and Re-Documentreview your critical events logevaluate vendor performancerecognize extraordinary achievementspreparing final review and  bodily function report andAid in liability assessments.Problem IdentificationTask 6  10 MarksCreate a comprehensive, professional report describing your network recommendations. This should include the details of Tasks 1  5, have estimates of cost  end-to-end and have an executive summary at the start giving the key points.Solution of Task 6In this task I have Investigate the company telephone system requires a central switchboard for the whole building plus direct dialing into each individual member of the company. Typical modern telephone functions such as call waiting,     conclave calls, etc will be required.Investigate the in-house network (LAN) topology .In this network system we must select a topology and a medium  and then we connect our network stations. Also we must provide a recommendation about the topology and media. Possible network topologies for each branch areBUSRINGSTARTo setup a company intranet we need to consider the requirements for the media and connector in each implementation. This topic outlines the cable and connector specifications used to support network implementations.Network Media A star may be wired with twisted-pair ,coax or WI-FI.Recommended Unshielded Twisted Pair (UTP) slip Category 5 commonly know as CAT-5A plan for Advertising Agency network to deal with major disasters and also to deal with the short term failure of the system. It is important that the system can be updated after temporary failure and that data is accessible in the event of a major disaster. Problems are going to occur. Hardware is going to fail.    Networks are going to crash. The best thing Advertising Agency can do is plan for the inevitable, implement as many disasters avoidance mechanisms possible and be ready to react quickly when necessary. Some key points include death penalty physical data securityProtect critical systemsConclusion terminate this work I have a good idea and experience about researching, creating reports, solving problems, on setup Local Area Network that I was required to complete for my assignment. During the completion of the work, I have to face many problems and I learn how to overcome these problems. I hope in future this assignment will help anyone to improve their study on LAN and to apply it on real life.Bibliography  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.