Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencias de la computación - Aplicada

Protocol of a Project concerning Computer Hardware and Software Architecture

Título: Protocol of a Project concerning Computer Hardware and Software Architecture

Apunte de Clase , 2017 , 17 Páginas , Calificación: 64

Autor:in: Dibya Shrestha (Autor)

Ciencias de la computación - Aplicada
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

This is a log of a project that was worked on over the course of several weeks. As the college follows lecture, tutorial and workshop procedure in teaching process, the chapter followed the procedure. In lecture class, we are introduces about the details of the course, the course was extended and discussed more in tutorial and experimentally handled in the lab in workshop class. The main aim and objectives of this section is to provide information the basics of computer network and networking.

The next week's main aim and objectives are to be familiar about sub-netting process, why sub-netting is important in computer networks. Sub-netting a single network allows you to connect the number of clients by breaking down the broadcast domains.

The last week's main aim and objectives are to learn about network planning and troubleshooting for the better performance of the network. Also, to identify potential safety hazards, to design a network based on the customer's needs, to determine the components for your customer's network, to implement the customer's network, to upgrade the customer's network, to describe preventive maintenance procedures for networks, and to troubleshoot the network.

Extracto


Table of Contents

Week 14: Networking

Introduction

Objectives

Activities

Lecture

Tutorial

Workshop

Findings

Conclusion

Week 5: IPv4 Address sub netting

Introduction

Objectives

Activities

Lecture

Tutorial

Workshop

Findings

Conclusion

Week 6: Network Planning and Trouble Shooting

Introduction

Objectives

Activities

Lecture

Tutorial

Workshop

Findings

Conclusion

Objectives & Topics

The primary aim of this document is to document the practical learning process and laboratory exercises regarding fundamental computer networking, IP addressing, and network management. It serves as a personal logbook to track technical competency in architecture and configuration.

  • Theoretical understanding of the OSI reference model and TCP/IP protocol suite
  • Practical application of IPv4 subnetting to optimize network broadcast domains
  • Network topology construction and DNS server configuration using simulation software
  • Troubleshooting methodologies for enterprise network infrastructure
  • Wireless network security configuration, including SSID and MAC address filtering

Excerpt from the Book

Introduction

The process of breaking down a single big broadcast domain into a bunch of smaller ones is called sub netting. An IP address includes a network segment and a host segment. Subnets are designed by accepting bits from the IP address's host part and using these bits to assign a number of smaller sub-networks inside the original network. Sub netting allows an organization to add sub-networks without the need to acquire a new network number via the Internet service provider (ISP). Sub netting helps to reduce the network traffic and conceals network complexity. Sub netting is essential when a single network number has to be allocated over numerous segments of a local area network (LAN).

Summary of Chapters

Week 14: Networking: Provides an overview of fundamental networking concepts, the OSI reference model, and an introduction to core networking protocols practiced in a virtual environment.

Week 5: IPv4 Address sub netting: Details the theory and practical mathematics behind subnetting IPv4 addresses to segment networks and manage broadcast traffic efficiently.

Week 6: Network Planning and Trouble Shooting: Focuses on advanced network design, component selection, safety measures, and systematic troubleshooting procedures for network maintenance.

Keywords

Computer Networking, OSI model, TCP/IP, IPv4 Subnetting, Network Topology, DNS Server, Gateway, Broadcast Domain, Packet Tracer, Wireless Security, Network Troubleshooting, IP Addressing, LAN, WAN, Data Encapsulation

Frequently Asked Questions

What is the primary purpose of this logbook?

The logbook records the student's progress and learning activities in the "Computer Hardware and Software Architecture" module, focusing on practical laboratory work and theoretical networking concepts.

Which key networking models are discussed in the work?

The document covers the OSI reference model and the TCP/IP protocol suite extensively.

What is the main objective of the subnetting exercises?

The goal is to learn how to divide a single network into smaller sub-networks to reduce traffic and better organize IP address allocation.

Which software is mentioned for network simulation?

The work utilizes CISCO packet software to construct, configure, and test virtual network topologies.

What topics are included in the network planning module?

This includes network design, component upgrades, safety hazards, preventive maintenance, and general troubleshooting techniques.

How is network security addressed in the practical sessions?

Security is addressed by configuring wireless networks and implementing specific controls like MAC address filtering to manage network access.

How does the author calculate the number of host bits for subnetting?

The formula provided is 2^h – 2 = Number of usable hosts, where h represents the number of host bits needed to accommodate the network requirement.

What physical components are typically involved in the virtual lab constructions?

The setups include routers, switches, PCs, servers, wireless routers, tablets, and smartphones.

What is the significance of the DNS server configuration experiment?

It demonstrates how Fully Qualified Domain Names (FQDN) like www.server.com can be mapped to specific server IP addresses to facilitate easier network identification.

Final del extracto de 17 páginas  - subir

Detalles

Título
Protocol of a Project concerning Computer Hardware and Software Architecture
Universidad
London Metropolitan University
Calificación
64
Autor
Dibya Shrestha (Autor)
Año de publicación
2017
Páginas
17
No. de catálogo
V1259332
ISBN (PDF)
9783346700711
Idioma
Inglés
Etiqueta
protocol project computer hardware software architecture
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Dibya Shrestha (Autor), 2017, Protocol of a Project concerning Computer Hardware and Software Architecture, Múnich, GRIN Verlag, https://www.grin.com/document/1259332
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  17  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint