Preview

It Task 2 Social and Ethical Implications of Networking

Powerful Essays
Open Document
Open Document
1503 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It Task 2 Social and Ethical Implications of Networking
Table of contents Page 1: Information page.

Page 2: Table of contents.

Page 3: Why I chose a tree topology. Diagram of tree topology. Page 4: Hardware and software required. Communications mediums and protocols. Page 5: Advantages and disadvantages for staff. Page6: Advantages and disadvantages for learners. Social and ethical implications. Page7: Security of network. Bibliography.

Diagram of a Tree topology layout:

About a Tree topology:

Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only switch devices connect directly to the tree bus, and each switch functions as the "root" of a tree of devices.

I chose this topology because this topology supports future expandability of the network much better than a bus (limited in the number of devices because of the broadcast traffic that it generates) or a star (limited by the number of switch connection points) alone. I chose this because this can be very useful to a school setup for if they wish to improve on the school. It also means that if one switch goes wrong, others can still connect on the other switch although if the central switch fails all the other switches would fail.
This structure gives better performance as the main switch controls the whole network.
Tree topology is used to identify the system on the network, to share information across network and allows users to have many servers on the network. Tree topology is the best topology because the signals that are transmitted by the root nodes are received by all the computers at the same time.

Hardware and Software required:
Computers and devices:
1. Router used to create a wireless network so that extra cables are not needed.
2. Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the network policy.



Bibliography: 1. Douglas.E.Comer (2006), Computer Networks and Internet, Department of Computer Science Purdue University, Westhafayette. 2. Tom.S.ed., 2001. Encyclopedia of Networking and Telecommunications Tate McGraw Hill.http://www.computerhope.com/ 3. http://www.computerhope.com [accessed on the 10 May 2013 at 1030hrs].http://www.google.com/ 4. http://www.google.com [accessed on the 10 2013 at 1234hrs] http://www.novell.com/ 5. http://www.novell.com [accessed on the 10 May 2013 at 1200hrs]

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    ENorm Inc.’s network will be server based with 105 computers attached to the network. With the given availability the best topology would be a physical star topology logical switch topology by means of physical star topology.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The hierarchical star is the most common one used in modern networks. It allows many pieces of equipment to be connected to the network via a hub or more commonly a switch. It allows for one continuous connection from the telecom room to the user end equipment. If the cable fails it means only that piece connected will not be on the network and that only that cable need be replaced, leaving all other components connected to function normally. The biggest disadvantage to this type of network is that there is only a single point where all the cabling is terminated and if that piece, be it hub or switch, goes bad the entire network goes down, however once that piece is replaced it brings the entire network back up.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This mesh type application of switches provides multiple paths for network traffic to flow. What this means is that if one link in the traffic flow or a switch goes down, traffic can continue to flow using an alternate path. This type of mesh interlinked switches uses Spanning Tree Protocol (STP) to detect and prevent loops. A loop occurs when there are multiple active paths to the same switch and this causes the system to crash.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    a. The __bus_____ physical topology consists of a single cable that connects all nodes on a…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IT299 Unit 8 Project

    • 2529 Words
    • 7 Pages

    Network topology refers to the physical layout of a network. The chosen layout directly impacts how each node on a given network communicates with another. There are multiple types of topologies that can be used based on the need of the project. The ultimate goal is to provide multiple lines of data communication which will increase fault tolerance on the network and reduce or eliminate a complete disruption of service.…

    • 2529 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Geographical sites can appear on or in a full-mesh topology; the distribution layer allows the core layer to connect sites that run different protocols while.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    This type of network is commonly used in systems that connect widely dispersed mainframe computers. A ring network allows organizations to engage in distributed data processing system in which computers can share certain resources with other units while keeping control over their own processing functions. However, a failure in any of the linked computers can greatly affect the entire network.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    The logical topologies are generally determined by network protocols as opposed to being determined by the physical layout of cables, wires, and network devices or by the flow of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely match the logical flow of data, hence the convention of using the terms logical topology and signal topology…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This section represents a room, or department within the campus, showing how the Nodes are all connected to a multi-port switch using straight-through cables (Used to connect non-similar devices, such as a PC and a switch). The diagram on the left is a bog standard star topology, whereby a switch is connected to multiple nodes via an RJ45 straight-through cable, thus allowing the transfer of packets to and from the devices on the sub-network; I.E. PC to printer, or laptop to PC and so on. By the connecting the switch to the router(s) at the centre of the college network, you are allowing the sub network above to communicate with other departments and devices around the campus. Such as the Student file server, and the email server, (Which are used for the storage and retrieval of files, and the sending and storing of emails.) both of which are connected to the entire network, allowing access from around the campus, regardless of what device a user chooses to try and access them. The college has also incorporated a server which is used to host the website, and the various services (DNS, ADDS, DHCP)…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is an arrangement of the various elements of a communication network. There are different types of topology as Lowe (2012, p8) said “each type of networking topology (bus, star, expanding star, ring, mesh) offers advantages and disadvantages”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this scenario, I would again recommend a star topology due to its manageability and scalability. In this model, one would need computers, server, cables, and operating systems. The nodes would go through the switch or router and then…

    • 350 Words
    • 2 Pages
    Satisfactory Essays