Читать реферат по английскому: "How To Design A Network Essay Research" Страница 3
up to eight PCs and workstations.
Each PC or work station can be up from two thousand feet from the active hub. Each port of the
active hub will be electrically isolated and will not need terminators for unused ports.
Typically a LAN has a server node to provide certain services to the LAN users. In this case of
a small scale PC LAN, the server is attached to a laser printer, so that all users can share that
printer through the server. Another use of the server is that if the LAN users need to get some
updated files. Instead of copying to all the nodes each of them can copy / share from the server,
where only once those files can be loaded or updated.
The Network security structure would not be a very complicated. The Supervisor would be
granted full access to all the resources in the CIS program. Students who are a CIS major will
have read, copy and write capabilities for the classes they will attend. The Public accounts will
only have the right to be able to access the rights to Word Perfect, Excel, Power Point, etc. The
Faculty will also have rights to the classes with read, copy, write and send.
Networks are subject to hacking, or illegal access, so shared files and resources must be
protected. A network intruder could easedrop on packets being sent across network or send
fictitious messages. For important information, data encryption (scrambling data using
mathematical equations) renders captured packets unreadable to an intruder. This server will use
an authentication scheme to ensure that a request to read or write files or to use resources is from
a legitimate client (faculty or CIS majors) and not from an intruder. The system will have a
security measure of telling whether or not the user is a CIS major or not by given each CIS major
and faculty a code or password.. The CIS majors will be given a code in which they will have to
enter in every time he or she gets to the computer and wants information from a CIS class. Every
time the student enters in the code the computer will keep it in memory so if the same password
is entered somewhere else the person wil!
l not be allowed in. This station restricitions will keep students from going in and messing around
with the students information while that CIS student is working. There will be disk restrictions to
assure that storage space is evenly allocated. The CIS users will also have to change the
password every now and then to keep confidentiality of his or her passwords. This will put an
account to have an expiration date to it so that the user will have to change his or her password
as the semester goes on to insure the security of their account.
Under no circumstance should an administrator put an entire system at risk for the
convenience of a few users. Certain measures and precautions should be implemented to ensure
that the network will operate effectively and effeciently.
Another major concern when designing a system is to anticipate the addition of more
workstations and eventually more users. By considering this now many problems can be solved
even before they exist. If there is room allotted for expansion in the beginning, then actually
implementing the new ideas and hardware should be simple. Assumptions about how large
the system will actually get and how many users it will accomadate are very serious issues that
need to be addressed in the utmost fashion. These questions require serious answers that if not
dealt with could destroy a system.
Another key issue that needs to be addressed is who will be issued an account on the system.
Certainly each CIS faculty member will have his or her own personal account. In these accounts
some items such as personal research materials and grades will reside. Then there is the matter of
the individual CIS classes and individual CIS students. Logically each class will have a separate
account because the information in each account will be different (applications etc.). The main
point of concern is the applications involved with each class. Using Visual Basic and Visual/IFPS
Plus, having a COBOL compiler to run your programs on and so on.
CIS students will have their own personal account. A space will reserved for them to
execute e-mail and other personal things. They will need to have a good understanding of the
network to be able change their
directory to the class that they need to locate and do their work in. Each faculty member will
have their own account as well. They will be able to send e-mail to students and also put
homework in the accounts of the classes that they teach. Other faculty members will not have
access to the server. As stated before the main purpose of the server is to deliver CIS
information only and for the CIS discipline only.
The main points of concern when dealing with the printer configuration are reliability and
accessibility. Reliability is centered around quality and effeciency. Top quality network printers
are expensive but sometimes are not the best choice. Speed of output, such as papers per
minute, play a big role in choosing a network printer. Printers that are easy to get to and easy to
service are a key to a successful network. I personally can not stand to walk into a lab and have
to hunt where the printers are and have to wait for someone to remove a jammed paper. The lab
on the second floor of the Belk building is a good example. An excellent example of a good
configuration is in Forsyth. The
Похожие работы
| Тема: Contemporary Design Essay Research Paper Contemporary design |
| Предмет/Тип: Английский (Реферат) |
| Тема: Design Essay Research Paper The good design |
| Предмет/Тип: Английский (Реферат) |
| Тема: Graphic Design Essay Research Paper Any paper |
| Предмет/Тип: Английский (Реферат) |
| Тема: Balsawood Structure Design Essay Research Paper 1 |
| Предмет/Тип: Английский (Реферат) |
| Тема: Text Design Essay Research Paper Tag Description |
| Предмет/Тип: Английский (Реферат) |
Интересная статья: Быстрое написание курсовой работы

(Назад)
(Cкачать работу)