Tuesday, April 2, 2019
Advantages And Disadvantages Using Computer Networking Facility Computer Science Essay
Advantages And Disadvantages Using Computer Ne 2rking Facility Computer Science EssayThe advantages of admit geting processing dodging meshing facility in spite of appearance the metalworker Solicitor officeThey digest expenditure intranet facility for internal conference in the officeThey behind sh atomic number 18 resources uniform printing machine so that they house use two newspapermans for the whole office.Video Conference weed be done which makes it easier for the employer to hitting with the employee. And meetings tramp be done online.File and data sharing advise be done which helps them sh atomic number 18 data among the reckoners.Folders provide be password hold de ard to limit entranceway to unauthorized drug substance ab drug exploiters.A unity internet connection in horde figurer each(prenominal)ows the entire thickening computer to shargon internet.The disadvantage of prevail computer interneting facility within the smith Solicito r officeSkilled IT executive should be chartered for c ar.Training should be getn to the employer and employee to use the computer which in meshwork. good web aegis should be given to the horde computer. profit maintenance should be done magazine to time.Network Inst completelyation charges would be expensive.Networking fate like router, switch and c fit would be expensive to buy.All the computers in an office building might become completely useless if a wizard cyberspace ingredient fails.If a single computer is virus infected then(prenominal) the entire computer in vane whitethorn soon get carry oned.Evaluate the various costs, achieveance, tribute measure de routinement measure and utility(prenominal) mildew associated with the tack togetheration of your communicate design for smith Solicitor. (P2)The various cost, performance, hostage and utility values associated with the inst tout ensembleation of the earnings design for Smith Solicitorserver Computer Brand prognosticate HP Pro Liant DL380 G7 Rack master of ceremoniesThe HP Pro Liant DL380 G7 Server continues to deliver on its heritage of engineer excellence with increased flexibility and performance, enterprise-class uptime and HP Insight realize doability, 2 sockets Intel Xeon performance, and 2U density for a variety of applications.FeaturesIntel Xeon E5620 (4 core, 2.40 GHz, 12MB L3, 80W)6GB PC3-10600R (DDR3-1333) Registered DIMMsRack-mountable3 years warrantySpecifications crossroad DescriptionHP Pro Liant DL380 G7ProcessorIntel Xeon E5620 (4 core, 2.40 GHz, 12MB L3, 80W)Form FactorRack-mountable 2U amass Memory12 MB L3Chip restrainIntel 5520 Chip quite a littleHard trendNoneNetworking(2) 1GbE NC382i Multi lam 2 PortsRAM6GB PC3-10600R (DDR3-1333) Registered DIMMsStorage restraint(1) Smart Array P410i/256MBGraphics ControllerATI ES1000MonitorHP*Windows server 2003 forget be inst bothed as an operate schema in server computer as it is exploiter friendly. It has d issimilar security features. (1)Client ComputerHP Pavilion selected HPE-490uk knowing for computing tasks in equal good measure, the HPPavilion Elite HPE-490ukdesktop PC is powered by the potent quad-core Intel Core i7-870 Processor. full general InformationProcessorIntel Core i7-870 Processor2.93 GHz (up to 3.6GHz with turbo Boost)8 MB Smart CacheRAM8GB installed RAM4 DIMM slotsmaximum 16GB support memoryHard Drive1.5 TB SATA 3G Hard Disk Drive (5400 rpm)USB10 x USB 2.0 portsMemory Card Reader15-in-1 memory measure readerAccessories IncludedKeyboard, mouse, power cord, documentationWindows XP lead be installed in this client computer as its substance abusers friendly. It has got option like plug and play. Its got facilities likefast user switching which affects applications that advance hardw atomic number 18 or that lavatory alone tolerate one instance of their application running on a machine at both one time. We freighter alike spend a penny fourfold users and protect the users putting the password. Networking and communication features ar similarly very good in windows xp. So Windows xp would be the or so suited and appropriate as a client computer. (2)Connectivity DeviceThe Network port card (NIC)The hubThe switchThe bridgeTransceiversWireless advance be signsThe routerThe gateway course (UTP cat 5)RJ45CostThe server computer and client computer atomic number 18 as required by The Smith Solicitor Office. Its very low-cost and the components argon very good. The total price of the entire computer would be about 16 thousand. credentialsThe security features of windows 2003 be as listed on a lower floorAuthentication Most basic level is requiring a user id and password to log on to some governing personate.Access aver Access correspond is utilize to secure resources such as blames, folders, and printers.Encryption Confidential files can be encrypted development the Encrypting File agreement (EFS) for local files stash awayd o n NTFS volumes protection policies Security policies gibe a range of security settings.The security features of windows XP are as listed on a lower floorFirewallAutomatic updatesRemote Assistance / Remote screen background local anaesthetic Security PolicyJustificationOverall selected hardware component are suitable for the selected Operating administration and the computer software system and hardware are at affordable price.Provide an overview of a interlocking direct system (NOS) and illustrate how NOS works with in computer network. (P3)Network Operating System (NOS) helps the server computer to control Client computer and distribute the extend to the entire client computer. Therefore it helps to manage the computers which are connected in the network.Features of Network Operating SystemIt has a pop off to allow multiple users to chafe shared resource at same time.It provides file, print, web services, back-up services.NOS distributes the function to all the computer in networkIt helps to manage multiple user and support for logon and logoff, outback(a) irritate system wariness, administration toolsClient systems look into specialized software that allows them to request shared resources that are controlled by server systems responding to a client request.NOS supports multiple user report cards at the same time and enables gateway to shared resources by multiple clients at same time.It has security features like authentication, potence, logon restrictions and entre controlI suggest windows operate system for smith solicitor office because it is comm alone use on computers and currently, the most widely used meter reading of the Windows family isWINDOWS XP for client computer and WINDOWS SERVER 2003for servers. It has features listed belowSecurityWindows provide frequently updated security features such as firewalls, pop-up blockers, antivirus and antispyware software and more. It has resumeitional security and administrator tools for server.NetworkingThese OS offer administration tools and security for computer networking.Ease of UseWindows OS are straightforward and user friendly.Technical Help/SupportThese OS performs numerous functions, above median(a) support is filled. Generally, Microsoft offers more support to its customers onlineand alike self-guided support.Design a local bowl network for a Smith Solicitor or assess an existing network (if whatever) for fitness of purpose. (P4) Learner lacks to design a LAN on the idea for their LAN selection.last.jpgIdentify the various parts (software and hardware) of a network system for Smith Solicitor and relates it to the 7- classed model. (P5)The various parts of a network system for smith solicitor which is related with 7 shapees model arePhysical LayerThis layer explains the physical properties of the various communications media and coordinates the function required to transmit Example It explains the size of Ethernet coaxial cable, layout of pins. Th e physical layer uses hubs and repeaters.Data Link Layer This layer explains the logical cheek of data bits transmitted on a particular medium. Example this layer gives addressing and hindrances summing of Ethernet packets.Network Layer This layer helps to describe the exchanges of packets between any(prenominal) two nodes in a network. Ex It defines the addressing and routing structure of the net income.Transport Layer In impartation layer it describes the class, quality and grapheme of the data delivered. This layer makes sure if and how retransmissions will be used to batten data delivery.Session Layer In this layer the crowd of data sequences whoppingr than the packets handled by lower layers. So it is handles synchronization regale. Example It shows the details of request and reply packets are paired in a remote procedure call.Presentation Layer This layer works to translate, encrypt and com squash data. Ex this layer describes how floating point numbers can be excha nged within hosts with different mathematics formatsApplication Layer This layer gives services to the user by allowing the accession to network resources Ex this layer would implement file system trading operationsDifferentiate between different kinds of network, network topologies and network operating systems. (P6) Discuss different network topologiesThe different kinds of network areAlocal theatre of operations network also knows as LANis a kind of network where the networked computers are in short distance still. Example a network within a building of school. LANs Usually owned, controlled, and managed by a single person or organization. They use Token ring or Ethernet applied scienceMetropolitan area network also known as firearm is a network spanning a physical area astronomicr than a LAN but low-pitcheder than a wide area network, such as a city. Example it is commonly owned by a single body like as a government body or large company.Wide area network also known as WAN is a geographically single collection of LANs. It generally covers wide area of computer networks. A router connects different LAN to WAN. For example- mostly WANs (like the Internet) arent owned by any organization or group but it works under the joint or distributive possessorship and management.The different types of network topologies areStar regional anatomy and tree regional anatomyAll eddys connect to a central device, called hub. All data transferred from one computer to an opposite passes through and through hub Popular in LAN because its inexpensive and easy to install. Whereas tree regional anatomy is the extended form of star topographic anatomy which is used in large networks .This kind of network significally reduces the traffic on wires by sending packets only to the wires of the destination hostRing topologyIn this kind of topology cables are formed in closed ring or a loop form where the devices are arranged along the ring. Data communication is d one in this topology by device to device around entire ring in one direction only but if we use dual ring then communication can be done by both direction Mainly this topology is used in LAN network but it is also used in WAN network.Mesh topologyIn this kind of topology all computer are connected to each other so that theres a fault tolerance in this kind of topology. It is expensive as well as difficult to create this type of topology. Here all the nodes are connected to each other and forms complete network. This kind of network topology is mostly use in financial sector.3.1 Set up a software network environment, for some departments in a Smith Solicitor organization. (P7) Configure Active directoryTo configure an bustling directory for smith solicitor organization following process in positn. come home start and type dcpromo and enter. so a dialogue box will appear. thence we need to press next. subsequently that we will see a dry land control type wizard where we need to select t he force field controller for a revolutionary scope and select next option. Then we need to select the human race in modern forest and press next as show in picture below.4.png later on that on theNew human beings scorepage, in theFull DNS name for sweet domainbox, we need to give some domain name .For example we can give domain name like SmithSolicitiorFirm.com. After that we need to give name for NetBIOS domain name and clink next where we get to seelect the location where we would like to store and save the database and log files. On theShared System Volumepage, stand the thoughtlessness in theFolder locationbox, and then clicknext.On theDNS Registration Diagnosticspage, clickInstall and configure the DNS server on this computer and set this computer to use this DNS server as its favored DNS Server, and then clicknext as shown in the picture below.CUsersjaikishanshresthaDesktop9.pngOn thePermissionspage, clickPermissions compatible only with Windows2000 or Windows Serv er2003 operating systems, and then clicknext. After that on theDirectory Services Restore path Administrator Passwordpage, we need to enter a password in theRestore Mode Passwordbox and again retype the password to corroborate it in theConfirm passwordbox, and then clicknext. Finally in last we just need to confirm that the given randomness are correct and click nextand When prompted to restart the computer, clickRestart now. This is the roaring chassis of active directory for smith solicitors server computer.3.2 Install a bit of network software on to a server to be used by different selected users in a created group on Smith Solicitor Network.(P8) configure print serverWe can configure a print server in smith solicitor network by the following process given below.Installation process Firstly connect the printer to the computer .Then the printer will be detected automatically. After that we need to install driver which we normally get with printer. Else we can do it manually by the following process as shown below.Click on Start Settings Control Panel Printer and Faxes. Then Click on the File fare Add printer side by side(p) Local Printer attached to this computer.After that it Checks automatically detect and Install My Plug and Play Printer. Then Click Next.After that a wizard will automatically detect any attached printer and install the driver for it. If the system doesnt find the driver then it will be prompted to provide the drivers location.After successfully place the printer driver, it will show new printer name in the Printer and Faxes in the control panel.Server Configurations If the printer needs to be shared by a server computer, firstly we need to click the printer namepropertiessharingshare this printer. Then we need to provide name for the shared printer which will be used by client computer on the network. We can also set the colour management, priorities, printing preferences, font s in the properties tab of the printer.Client C omputer Configuration To apparatus printer at the client computer we can just give the dominatecomputernameprintername (printer name is the shared name of the printer which we create while configuring server)3.3 ornament how you configure user workstations on the network? (P9) Steps of user configuration on Active directoryTo configure user workstation on the network firstly we need to have one active directory domain, where we need to create a user account in that domain to use as an administrator account. Then after adding the user to the exact security group we can use that account to add computer to domain. To configure user on active directory following process should be completed.CUsersjaikishanshresthaDesktopAdd new user in Exchange 2003.PNGFirstly click start and then point the pointer towards administrator Tool. Then Click Active Directory Users and Computersto start the Active Directory Users and Computers console. After that we need to click the domain name that had b een created, and then expand the contents. Where we need to right wing- click UsersNewUserType the first name, last name, and user logon name of the new user, and then clickNext. Where we get other wizard to type a password and confirm it by typing again and click the check box as required by user. Then click Next .After that just check the details and enter to Finish. Finally a new user will be created under the active directory.In wooing of adding a computer to the domain, following the steps Log on to the computer that needs to be added to the domain. Then right click on MY ComputerPropertiesComputer Name TabClick change. In the computer Name change dialogue box, click Domain under member of and type the domain name. After that click OK.When you are prompted, type the user name and password of the account that you previously created, and then clickOK. Then a welcome message appears in a dialogue box where we need to click OK and restart.4.1 Write a report on the rights and respo nsibilities of the network manager and the network user for Smith Solicitor (P10) Discuss role of Network admin- user rights, sharing etc. and network user password, maintain file etc.Network administrator need to setup and configure all the devices, hardware, software, connection between the computers. They should be able to add the user and delete the user as the requirement of the company or manage the password and access control as the requirement and ensure that there is a proper security in the network to protect it from hackers and viruses. They are deeply involved in making sure that the software are updated and applications, and monitoring the performance of the network, checking for security breaches, poor data management practices and more. So scheduled check up should be done. Administrator should be able to manage user account such as file access privileges and passwords. Administrator should also train user to utilize the networks resources and also train users to wor k under the server network environment.Administrators keep records of all users problems and errors as well as the steps taken to solve the problems. This information is used to help solve future problems. Administrators also control user access to the network. The administrator must also create a firewall-a set of security measures designed to make sure that no one can gain unauthorized access to the system. Administrator should use Active directory for centralize management and manage user environment. Admin should respond to the needs and question of clients concerning their access to resources and create backup in different ways to recover any lost data. They are responsible to manage, assign and maintain the list of network addresses.4.2 Apply control mechanisms in a Smith Solicitor network for managing users. (P11) Discuss group constitution, user authentication, authorization etc.Control in a smith solicitor network for managing users can be done by using centralized manage ment system in active directory. Active Directory enables the administrator to centrally manage resources and to easily find the information location. It also enables to group the users according to the users limitation because user group policy helps to makes different policy for the user by the administrator. Active directory user authorization secures resources from the unauthorized user and unauthorized access.Managing Authorization and Access ControlPublished November 03, 2005The Microsoft Windows XP Professional operating system includes a number of features that you can use to protect selected files, applications, and other resources from unauthorized use. These features, which include access control lists, security groups, and Group Policy, along with the tools that allow you to configure and manage these features, provide a powerful further flexible access control infrastructure for your local resources and network. Understanding what these features are, wherefore they ar e necessary, and how they function will help you to manage rights and licences on network and local resources more effectively.Security principalIn Windows XP Professional, any entity that can be authenticated. A user, group, computer, or service can be a security principal. Security principals have accounts. Local accounts are managed by the Local Security Accounts Manager (SAM) on the computer. If the account is in a Microsoft Windows 2000 or Windows Server 2003 domain, it is managed by Active Directory. If the account is in a Microsoft Windows NT version 4.0 domain, it is managed by a SAM database on the primary domain controller. inheritanceA mechanism for propagating access control information down through a tree of objects. In Microsoft Windows NT, an object (such as a file) inherits access control information from its parent object (such as a folder) only when the object is first created. In Windows XP Professional, objects inherit access control information not only when t hey are created, but also when the parent objects access control list changes.OwnerThe only security principal who has an ingrained right to allow or deny permission to access an object. An objects owner can give another security principal permission to take ownership. By default, the built-in Administrators group on a computer is charge a user right that allows this group to take ownership of all objects on the computer.Security groupsGroups that can be used to organize users and domain objects, thus simplifying administration. Security groups allow you to assign the same security permissions to a large numbers of users, such as employees in a single department or in a single location, ensuring that security permissions are consistent crossways all members of a group.Security physiqueA data structure containing the security information associated with a securable object. A security descriptor identifies an objects owner by SID. If permissions are set up for the object, its sec urity descriptor contains a discretionary access control list (DACL) with SIDs for the users and groups that are allowed or denied access. If auditing is configured for the object, its security descriptor also contains a system access control list (SACL) that controls how the security subsystem audits attempts to access the object.Access control list (ACL)An ordered list of access control entries (ACEs) that define the permissions that apply to an object and its properties. Each ACE identifies a security principal and specifies a set of access rights allowed, denied, or audited for that security principal.Security settingsSecurity configuration settings that can be applied to individual computers. These settings can be configured locally on the computer by using the Local Security Policy administration tool, the Microsoft Management Console (MMC) Security Configuration and epitome snap-in, or, if the computer is a member of an Active Directory domain, through the Security Settings appendage to Group Policy.Auditing of system eventsYou can use the auditing feature to detect attempts to circumvent protections on resources or to create an audit trail of administrative actions on the system. For example, you can audit failed attempts to open a file. You can also set security policy so that failed logon attempts are recorded in the security event log. If another administrator changes the auditing policy so that failed logon attempts are no longer audited, the log can record this event as well. In an Active Directory environment, you can use Group Policy to centrally control who is allowed to manage security logs on computers joined to a domain.user or group is stored as part of an ACE in a DACL that is part of the objects security descriptor.Rights and PermissionsAccess control involves the configuration of rights and permissions, which apply to both the objects on the local computer or network and the potential users (including individuals, computers, and servi ces) of those objects.Arightis authorization to perform an operation. From an administrators point of view, there are two types of rights privileges and logon rights. In Windows XP Professional, only one user right is inherent-the right to allow or deny access to resources that you own. All other user rights must be granted, which means that they can also be withdrawn.Apermissionis authorization to perform an operation on a specific object, such as opening a file. Permissions are granted by owners. If you own an object, you can grant any user or security group permission to do whatever you are authorized to do with it.When permission to perform an operation is not explicitly granted, it is implicitly denied. For example, if Alice allows the trade group, and only the merchandising group, permission to read her file, users who are not members of the Marketing group are implicitly denied access. The operating system will not allow users who are not members of the Marketing group to re ad the file.Permissions can also be explicitly denied. For example, Alice might not want Bob to be able to read her file, even though he is a member of the Marketing group. She can exclude Bob by explicitly denying him permission to read the file. In fact, this is exactly how explicit denials are best used-to exclude a subset (such as Bob) from a larger group (such as Marketing) that has been given permission to do something.Each permission that an objects owner grants to a particular user or group is stored as part of an ACE in a DACL that is part of the objects security descriptor.User-Based AuthorizationEvery application that a user starts runs in the security context of that user.When a user logs on, an access token is created. The access token contains key security-related information, including the users SID, the SIDs of the groups to which the user belongs, and other information about the users security context. This access token is then attached to every process that the use r runs during that logon session.An application runs as a process with travel of carrying out. When an application performs an operation on a users behalf, one of the threads performs the operation. For example, when Alice opens a Word document, Microsoft Word, and not Alice, actually opens the file. More precisely, one of the threads of execution performs the operation.For a thread to gain access to an object such as a file, it must identify itself to the operating systems security subsystem. Threads and applications do not have a security identity, so they must latch on one from a security principal, such as Alice. When Alice starts an application, it runs as a process within her logon session. When one of the applications threads needs to open a file, the thread identifies itself as Alices agent by presenting her access token. Alice is therefore in the end responsible for anything that the thread does to the file or system on her behalf. sooner allowing the thread of executio n to proceed, the operating system performs an access check to determine whether the security principal associated with the thread has the degree of access that the thread has requested. This access check involves the following stepsThe security subsystem checks the file objects DACL, looking for ACEs that apply to the user and group SIDs referenced in the threads access token.If a DACL does not exist, access is granted. Otherwise, the security subsystem steps through the DACL until it finds any ACEs that either allow or deny access to the user or one of the users groups.If a deny is found at the user or group level, the access is denied.If the security subsystem comes to the end of the DACL and the threads desired access is still not explicitly allowed or denied, the security subsystem denies access to the object. Therefore, if a DACL exists but is empty, access is by definition denied.At the conclusion of this process, access is either allowed and the file is opened or access is d enied, in which cheek the file remains closed and an Access Denied message is generated.Creating and deleting user accounts and defining and using security groups are important security tasks. Defining the security restrictions or permissions that might apply to different groups of users and resources in your network will help to simplify the implementation and management of the permissions and restrictions in your organization. For example, you can create a Printer Operators group and give it precisely delineated administrative control over a finite group of printers.For you to effectively manage security groups in your organization, you need to be old(prenominal) with the relationship between accounts, security groups, and built-in security principals. It is also important for you to become familiar with the techniques and tools available for managing group membership.Built-in security principals apply to any account that is using the computer in a specified way. Built-in secur ity principals allow you to configure security based on the manner in which a resource is being accessedn increasing number of Windows XP Professional-based systems are connected directly to the Internet and participate in home or small business networks rather than in domains. To simplify the sharing and security model used in these nondomain environments, network logons performed against unjoined Windows XP Professional-based computers are automatically mapped to the thickening account by default. This simplifies the sharing of resources in home or small business networks by eliminating the need to synchronize user names and passwords across all computers in the network. Authenticating users logging on to the network as knob can provide an additional measure of security for computers connected to the Internet by eliminating the ability to access the computer remotely by using administrative credentials.Forcing network logons to authenticate as Guest does not affect the following Interactive logons.In addition to console logons, this also includes remote access sessions using Terminal Services or Telnet, which are basically remote occurrences of interactive logon sessions.Computers that are joined to a domain.This is not the default for Windows XP Professional-based computers that are joined to a domain because the domain provides single sign-on capabilities for all computers that are in the domain.Outbound connections.The authentication and access control settings of the computer that you are attempting to access govern outbound connections.4.3 Discuss how you control printer queues and other forms of resource usage in the Smith Solicitor network. (P12) autocratic in printer queues in smith solicitor can be done by changing the printer job setting by setting a priority and to notify the person when the print is done. As well as pause, cancel or resume can be done. To manage print queue firstly, we need to go to st
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment