
HI6006 Competitive Strategy Editing Service
Delivery in day(s): 4
This report provides the information about the implementation of the network system in the library. In the library, there is need to add the systems for the staff members, and the router system is required to provide the WIFI to the visitor who has come to the library for reading. So, this report provides the information about the implementing the networking system in the library. All the system is password protected and only the staff member and the volunteer can access that protected systems. The visitor can access the WIFI network because it is open to all. This report provides the all the hardware details that are required for the development of the system.
There are various hardware components that are required to complete the development of the project. Some of them are listed below:
Computer systems
Routers
Switches
Wireless devices
Cables (Saleh, 2016)
Refers to the servers, then these are the part of the computer program, that accepts and responds to the all the request that is developed by another program, that we called a client. In other words, the servers are used to help in managing the network resources. The IP address is defining the configuration of the system network at which the system using the internet services. Refers to the TCP/IP, then it defines as the transmission control protocol and internet protocol. This is the part of the system and used to provides the details like file transferring over the network system. This system is used for the public domain because it provides the secure connection over the public domain (Sanika, 2015).
There are various types of the servers are present and all have the different use, below shows the some of the server details.
File server:this is used to store the data.
Application server:this is used to share the data among the different places.
Communications server:this is used to handle different types of the communication.
Print server:this is used to manage the printer server.
Domain server:this provides the security to the server and provides the authentication into the server and computers.
Database server:this is used to manage the database that is present in the system.
Refers to the library system, then there are need to add the application server so that they can able to use the mailing server.
There are different types of the protocols are listed below:
Internet protocol
Wireless network protocol
Network routing protocol
Among all the network protocol there are using the network routing protocol for the library system (Mitchell, 2015).
Refers to the operating system, then for the computers there is need to use the Windows operating system and for the router, there is need to use any type of network operating system. There are various options for the network operating system, but in this case, the best one is Airsoft LANtastic.
Refers to the server then this is used for the send and receive the mail and use the internal services. TCP/IP network protocol is used in this case. With the use of this, it is easy to manage the network system in the library system.
Details of the IP configuration and DHCP configuration of the systems:
1. IP configuration for the employee: 130.19.6.2/29 to 130.19.6.6.29.
2. IP configuration for the visitors: 192.168.1.6/24 to 192.168.1.12/24
3. DHCP configuration for the Volunteers: 192.168.1.2/24 to 192.168.1.6/24
4. Configurationof router 1: 130.19.6.1/29
5. Configurationof router 2: 192.168.0.1/24
6. Configurationof router 3: 192.168.1.1/24
Refers to the IP address then, it is defining as a representation of the network details with the help of numbers. The numbers are defining as a binary number. For example, the typical IP address is 192.168.1.1. Refers to the allocation of the IP address then it is done by interNIC. Refers to the types of the network corresponding to the IP address. Types are class A, Class B, and Class C.
a. ClassA is used for the mega monster network system.
b. Class B is used for the smaller networks.
c. Class C is used for the baby network systems (Sharma, 2015).
The subnet masks are defining as the dividing the same network into different systems. In other words, the subnetting is the techniques that are used to dividing the single physical network into more than one smaller logical subnetworks.
This is the system that is used to split the computer network. Refers to the library system, then the system is divided into different parts. One is for the employee, one is for the Volunteers and last is divided for the into two parts for the visitor and for the WIFI. All the network system is divided from the server. Then the network reaches to the routers. Routers are providing the networks to the systems of the library. For the visitor, the router divides the network into two parts. One is for the user who is using the library system and other is for the user who is using the wireless devices.
Refers to the security system into the networking, then it is defining as to apply some password to the network system. In the given case scenario then, there is need to add the password into the system who are using the employee of the library. Below show the Syntax of the development of the password into the system.
Enable password [level level] {password| [encryption-type]encrypted- password}
No enables password [level]
There is various type of the networking hardware are to be added to the network system. With the help of them, it is easy to configure the system for the library system. The router is used to provide the internet services to more than one computer. The design is developed in the Cisco packet tracer. Some of the components that are used in the system are listed below:
Router: 3
Server: 1
Computer: 14 and 2 wireless devices like laptop, mobile etc.
Wire devices: 1
Switches: 3
The network is designed as per the requirement of the library. As there are four computers are added for the employees of the library. There are six computers are attached to the volunteer of the library. In the end, 4 computers are added for the visitors or reader that comes into the library. One wireless device is added to the system so that, the visitor can use the WIFI in the library. There are three routers are added to the system one is for the employee, 2nd is for the volunteer and third is for the reader or visitors. One firewall is added to provides the security to the employee systems. Server and the cloud are added to the system, the cloud is added to store the data and server are used to provide the connection to the systems and routers (Arena, 2016).
Arena (2016). Network Design Arena | Blog. [online] Netdesignarena.com. Available at: http://netdesignarena.com/blog/ [Accessed 23 Feb. 2018].
Saleh, A. (2016). HARDWARE & NETWORKING – EVERGREEN CAREER OPTION! | Blog IIHT. [online] Blog.iiht.com. Available at: http://blog.iiht.com/hardware-networking-an-evergreen-career-option/ [Accessed 23 Feb. 2018].
Sanika, N. (2015). Connection Security Protocols In Workflow Mailer. [online] Blogs.oracle.com. Available at: https://blogs.oracle.com/oracleworkflow/connection-security-protocols-in-workflow-mailer [Accessed 23 Feb. 2018].
Sharma, D. (2015). Understanding IP Address and Subnet Mask (A Historical Perspective). [online] Dinesh Sharma's Blog. Available at: http://www.dscentral.in/2011/07/14/understanding-ip-address-and-subnet-mask/ [Accessed 23 Feb. 2018].
Mitchell, B. (2015). A Brief Explanation of Computer Network Protocols. [online] Lifewire. Available at: https://www.lifewire.com/definition-of-protocol-network-817949 [Accessed 6 Mar. 2018].