.

Sunday, May 12, 2019

Internetworking Technology Paper Essay Example | Topics and Well Written Essays - 750 words

Internetworking engineering Paper - Essay ExampleIn order to connect the workstations of these employees, switches argon terminated on to each one department. However, thither is a possibility that more than one switch is required to cover up either the nodes. As mentioned earlier, star topology is implemented for centralized administration and configuration of the network, the diagram demonstrates Microsoft Active directory that attached with a domain controller. Active directory is an advanced directory service that is a built in feature for Windows horde that is utilized for access management for network resources. Moreover, it is a domain based network similar to the welkin Naming System (DNS) (Active directory.2011). Protocols that are used include LDAP and Kerberos for security purposes. The selection of switches is essential, and compatible routers must be considered, as cisco supports active directory in its IOS router (Active directory.2011). Each switch supports gigabi t full duplex Ethernet capability that exit operate on a CAT 5 1000 base-t cables. The company does not want flutter in the local area network and it must be available for all times. For this reason, all the switches are powered by PoE (Power over Ethernet) that is a distributed power mechanism on a CAT 5 Ethernet cable (Poe.2011). Likewise, PoE enables a secondary channel for power distribution and continues to provide power to networked devices even if the basal power link goes down. As shown in the Fig 1.1, the blue link shows PoE connectivity between networked devices for ensuring network continuity. Moreover, there are two routers aggregating entropy channels and configured to backup each other. In case of a primary router failure due to malfunctioning hardware or configuration, secondary router will make itself available up to the task. Furthermore, to keep in line redundancy in software infrastructure, primary and secondary domain controllers are installed for alloy ba lancing and backup procedures. In addition, for security purposes, Virtual LAN can be configured for distributing data channels associated with highly sensitive data. For addressing security, Fig 1.1, demonstrates a firewall that is installed after the router and in between the Internet to ensure the filtration of inbound and outbound network. References Active directory.(2011). Computer Desktop Encyclopedia, , 1. Poe.(2011). Computer

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.