StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology - Coursework Example

Cite this document
Summary
The paper "Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology" describes that before concluding for a broadband connection, there are two important concepts to be considered in bandwidth distribution: those are upstream and downstream of traffic respectively…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology
Read Text Preview

Extract of sample "Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology"

Computer Systems Computer Systems Executive Summary The purpose of this report is to present a economical set of recommendations to LDA for implementing suitable logical topology, PCs, printers and internet connection in the new expansion of CSL for using Cloud Based Service. This report shall also briefly explain the concept of Cloud Computing, its services and structure. Cloud Computing It is the future step in the development of IT products and services. To a broader scope cloud computing would be completely based on virtualized sources. Basic idea behind the cloud computing is established on key principal of `reusing the capabilities of Information Technology`. The change that cloud computing offers compared to conventional models of autonomic computing, utility computing, or distributed computing is to expand possibilities beyond the boundaries of an organization. Although many cloud computing infrastructures and its deployments are working on conventional models like grid, support autonomic features and used on the basis of billing utilities, but the idea of a cloud is comparatively different and opposite to the features of grid, for example SaaS, Utility Computing etc. Cloud promises the availability of all the required architecture including application, hardware, platform, software and required amount of storages through an ownership of a suitable internet connection. Enables people to access the required information through any device that has an internet connection-instead of being attached to the desktop. It is also cost effective as it doesn’t require installing hardware or software. Ideas Behind Cloud Computing Powerful idea behind cloud computing is computing by service-oriented architectures (SOA) – transferring of an incorporated and organized collection of functions to users by mean of both freely and firmly coupled purposes, or services – most of which are network based. Virtualized Infrastructure Virtualized infrastructure enables the development and deployment of applications dramatically easier, thus increasing the reliable scope of these applications achievable within allocated budget and organizational controls.. Virtual infrastructure also expands reliability, efficiency and quality by including similarities within application requirements and aids the organized sharing of services. Now a day, almost every business activity requires Information Technology and its services in any form available. Technology wants to develop end-user efficiency and decrease Technology-driven overhead What is SOA or Service Oriented Architectures? Service Oriented Architectures is not a new concept, but in the recent years it has gained a considerable attention. Examples of some such early that were based on SOA are Object Request Brokers (ORBs), DCOM and Remote Procedure Calls (RPC). Most recent model of SOA is known as Grid Computing solution and infrastructures. In a Service Oriented Architecture environment organizations or customer request an Information Technology service (or an incorporated set of these services) at the preferred functional, capacity and quality level, and receive an on-demand the response. Giving importance to reliability, service discovery and brokering. Main idea of the SOA is that establishing an architecture in which services are capable to communicate each other using http protocol. Expectation of next few years is that, solutions based on information technology services would be the major medium for transmission of information and other IT assisted roles at both organizational and individual levels. Cloud Architecture Cloud architecture is designed by the cloud architect, who foresees basic requirements of system’s architecture in the sense of hardware or software requirements involved in the delivery of cloud computing. Cloud architect works for a cloud integrator. It basically involves several components of cloud, communicating each other using programming interface, mostly web services. It closely resembles the concepts on which UNIX works, multiple programs working on same thing well and communicating together over global interfaces. Thus complexness is controlled and the resulting systems are more organized than their gigantic opposite systems. Cloud applications are accessed using web browsers or software applications, extending the cloud architecture to the end-user. Metadata operations in cloud storage architectures are centralized allowing the data terminals to extent into the hundreds of other terminals, each of which separately delivering data to applications or clients. There are four major categories of cloud computing, (Samir Kumar Bandyopadhyay, Wael Adi, Tai-hoon Kim, Yang Xiao, 2010, p.212) those are as follows: Application as service ( AaaS) Platform as a Service (PaaS) Infrastructure as a service (IaaS) Software as a Service (SaaS) Application as s service (AaaS): It is the first category of cloud computing that came to life. Using AaaS, a particular service is made available to the customer. The customer is required to create an online account on the GUI interface of cloud computing service provider that and start using the requested service. Web based email service of Hotmail is renowned is first of its kind that was allowing a web interface for its email application. Now there are number of such application these days on internet. Platform as a Service (PaaS): It is cloud base service in which a platform is provided for the execution and development of applications. Facilities that are provided in PaaS include management of database, defense against threats, managing workflow, allocation of application, and so on. Provided platform works like an operating system that is supplied to a client or end user after an agreement of monthly usability charges. Google, Microsoft and Amazon are some important vendors of cloud computing. Infrastructure as a service (IaaS): This category of cloud computer offers on demand computing power and storage spaces. The thing that makes it different from other categories of cloud is that software that executes in it is basically owned by the client. Practically IaaS works on the principals that everyone knows the perspective of server segmentation or flexible storage, which is same as of virtualization. It enables the client to configure and execute a virtual machine in the Cloud instead of creating it on a physical server and using it in his own premises. A virtual is also available in the same fashion of virtual machine for performing storage activities. Vendors providing services of Cloud Computing offer there infrastructure as a part of offered service. Prices are the compensated on the basis of hardware service requirements such as processors, memory, networks etc. Software as a service (SaaS): It is a software distribution category of cloud computing where service provider (vendor) maintains the operations and support that the end-user will use throughout the time he have bought the service. A vendor hosted system shall be used by the client, which will keep customer’s data on their machines and provide the required resources for the execution of the stored information. In other words a customer is allowed to access the software using internet upon registration SaaS is available on rent for demand basis. The used information is then stored on local systems or on the systems of cloud provider. Software distributions like CRM or CAD/CAM can be used under SaaS scheme. Types of Cloud There are three types of clouds. Public cloud: Public cloud or external cloud depicts cloud computing in which resources are shared between several organizations to maximize the cost effectiveness. (Furht, B., & Escalante, A., 2010, p.337). Applications of many customers are expected to be merged on cloud’s server, its storages and network. Public clouds are operated by third party vendors, providing services to number of customers. Private cloud: Private clouds are infrastructures built especially for the use of single client, providing it the extreme levels of security, controls over data and quality of service. (Laszewski, T., & Nauduri, P., 2012, p.5) A private cloud is owned by the organizations and has the exclusive rights of application deployment. It is up to an organization to establish its own Private cloud with the help of Information Technology department of the organization or by a cloud provider Hybrid cloud: A Hybrid clouds is the combination of both private and public clouds models. (NÜTtgens, M., Gadatsch, A., Kautz, K., Schirmer, I., & Blinn, N., 2011, p.273)  It is type of environment in which some applications provided and managed internally while others provided externally. Potential uses, benefits and dangers of cloud computing: Uses and benefits Accessibility After registration cloud services are available to the client everywhere using any PC connected to internet connection. Cost Effectiveness Cloud providers offer their services on advance hardware to the clients. That reduces the high cost of infrastructure on customers. Organizations can save lots of money they spend on IT support. Scalability Huge amount of storage, RAM and processing capabilities are essential part of cloud services and can be used at the time of requirement. Fast Deployment Cloud services can be deployed within few minutes or as per the requirement of services. Fast Data Recovery Data recovery in cloud computing is very fast. Out Sourcing It provides a path to organizations for outsourcing there non-critical applications and focusing on critical applications. Risks and dangers Cost Although the emergence of low cost software inside the cloud, clients should know what they are actually buying. Would service provider be able to furnish all the required features? What is the importance of these features to the organization? Security Cloud is available on internet 24 x 7. Which means that data is transmitted through an unsecure medium (Internet). There are many concerns over the authentication system of the service provider. As media is shared amongst many customers at the same time so there is a threat of data leakage. Internet Connectivity Internet connectivity is the major requirement for accessing cloud services. That means if customer don’t have internet connectivity, no cloud services. Even the reliable internet service providers can experience some amount of down time. Technical Issues The most trusted service provider can experience occasional technical problems and service outrage regard less of how rigid their maintenance standards are. Set of recommendation for the purchase of Computers: Recommendations set for an organization for the purchase of computers for accessing cloud services and also want to use it for daily office work. For specialized requirements, graphics or video rendering or any other huge numerical calculation, there is more specialized hardware than of those mentioned below. It is recommended that purchase should be made by plan of using the PC for next three to four year period, as the varying demands of applications could exceed its capacity. Thus an upgrade of the hardware is mostly influenced by the software using on it. The processor should be within 10% of the fastest available.  For example, if i7 is available as the fastest one, then it is recommended that an i3 or i5 should be purchase to support current and near future needs.  As when it comes to change in technology in processor, 20% increase is noted with 1 year. Purchasing within the 10% of the fastest one would also benefit in saving lots of buyers money. It is a recommended that the minimum RAM should equal to the half of total amount of RAM generally a computer can hold. For example if a single PC can hold 4GB of RAM then one should install minimum of 2GB in it for better performance. As more the computational use, more RAM is better. It is much better to have the huge amount of hard drive, as new operating systems require large amount of hard drive to load, software and our data also need a reasonable amount of space. It is recommended to have LED for good graphical views and less space and very less consumption of power. For accessing internet a network card is must. Normally it is present on the motherboards that are manufactured now a day. It is also recommended to have a Wi-Fi card that may work without any wired connected using wireless router. Compatible wireless network cards are 802.11b/g/n. A combo drive (one that has the ability to write on CD and DVD) is the better option. The faster writing speed of the drive will result’s better. At least warranty of three warranties of computers should be obtained from the vendors that may cover repairs, replacement and labor as a part of purchase. Laptop is also a better option to use as it saves desk space can be used in mobile. Worst thing about it – not a cost effective solution. Recommendations for purchasing printers: Most recommended printer for business use are monochrome laser-jet printers. A laser-jet printer produces a very low cost per page printing. Monochrome laser jet offers minimum of 12 pages and can go maximum up-to 200 pages per minute. It is recommended that for office use fast monochrome printer should have duplex printing technology, it will enable it to print on both side of the paper and reduces the cost of paper. Before purchasing printer, estimating average per day printing is an important factor for purchasing a cost effective printer. It should have a facility of taking different size of paper It should have internal memory to handle the printing load from the network. Laser printers are very suitable for networking environment because of high speed, internal memory and internal storage space. A3 printers are expensive and their high quality (Dot Per Inch) resolution makes it a best for printing images of high resolutions. A3 photo printer requires a set of 6-8 cartridges at once as some needs extra colors. A3 printers require space as they are long in size. An A3 printer are not recommended to be used for printing text as they are slow and printing on it would rather be costly. A3 printers should have network port to share it on the network. It is recommended to check manufacture’s Recommendations for suitable logical network topology and network peripherals: Topology: Arrangement of a network virtually or structurally is referred to as topology. It is divided in to two categories “physical” and “logical”. (Sharma, D., 2008, p.321) Physical Topology: A physical topology is referred to as the physical layout of a computer network. Following are types of physical topology: a. Star b. Bus c. Mesh d. Ring e. Hybrid f. Tree Logical Topology: A logical topology is referred to as how data will flow into a computer network. (Godse, A. P., & Godse, D. A., 2007, 65) It can also be termed as network transport system. There are two types of logical topologies: a. Shared Media Topology. b. Logical Ring Topology. Shared Media Topology: In the Shared Media Topology whenever a node tries to send a data on the network towards another node; the sender node broadcasts the data packet to the whole network. (Barrett, D., & King, T. 2005, p.93).  All the nodes attached in the network hear that broadcast and try to check if the data is for them.  If data is for them they keep it or ignore it if it was not sent to them. Best known example of shared media topology is Ethernet. The main disadvantage of this topology is collision. It occurs when two systems transmit there data at the same time over the network. Collision is avoided in Ethernet by using Carrier Sense Multiple Access / Collision Detection (CSMA/CD). In this method all the nodes listen the medium and if finds any transmission, wait till it ends then starts transmission. Logical Ring Topology: This topology uses a token to access the network for accessing network. (Behl, R. 2009, p. 125) This token moves around the network and whenever a node has to send the data, it grabs the token and attaches it with the data packet and then sends it to through the medium. As this data packet moves around the network, each node examines it, until it reaches the intended recipient. Recipient copies the information and the token again start its movement until it reaches to the sender node, who then take it from the medium and sends a new empty token to be used in the network by another node. Logical topology recommended for CSL is Shared Media Topology because: Every node in the topology has the functionality to access the physical topology every time they require. Accessing the physical media is unrestricted. This topology is most widely used for small businesses. Easily extendable by using switches or hubs. To avoid collision CSMA/CD is used in the topology. (Dong, J., 2007, p.87) Every node has different time of sensing and transmitting in the network. Although it can be deployed on star, bus and hybrid physical topologies, but star is mostly used physical topology with shared media topology. Ethernet is the example of shared media logical topology. (Miller, P., & Cummins, M., 2000, p.41) Network hardware required for CSL is. Ethernet Cable: It will be used for complete wired cabling. Switch: Used as a central device for connecting nodes. Router: It will be used for connecting both sites. IP addressing scheme for CSL is as follows: Requirement of IP host in- Shop is 4 i.e. 2 PCs. Complex office is 16 i.e. 8 for staff PCs, 6 for online shop maintenance, 1 for A3 network printer, 1 for black and white network printer. Warehouse is 3 i.e. 2 PCs and 1 network printer. Lab is 20 i.e. 20 PCs in the lab for community training. Major Network: 192.168.1.0/24 Available IP addresses in major network: 254 Number of IP addresses needed: 47 Available IP addresses in allocated subnets: 72 Subnet Name Needed Size Allocated Size Address Mask Dec Mask Assignable Range Broadcast Lab 20 30 192.168.1.0 /27 255.255.255.224 192.168.1.1 - 192.168.1.30 192.168.1.31 Office 16 30 192.168.1.32 /27 255.255.255.224 192.168.1.33 - 192.168.1.62 192.168.1.63 Warehouse 5 6 192.168.1.64 /29 255.255.255.248 192.168.1.65 - 192.168.1.70 192.168.1.71 Shop 4 6 192.168.1.72 /29 255.255.255.248 192.168.1.73 - 192.168.1.78 192.168.1.79 Recommendations for a broadband connection for CSL: Before concluding for a broadband connection, there are two important concepts to be considered in bandwidth distribution (calculated in Mbps): those are upstream and downstream of traffic respectively. Downstream Bandwidth It defines the amount of data transmitted to individual’s personal computer/LAN at a single time, affecting the web page loading speed, streaming of audio/video files, downloading of files, video/audio streaming, etc. Upstream Bandwidth It defines the shortest amount of time a system/LAN takes to transmit the data to a remote location. Bandwidth usage assumptions and recommendations Assuming the use of following services on internet by the employees: Accessing emails. Accessing Cloud based services Uploading/down loading of files Using voice-over-IP Downloading/uploading of large files Online backup All of the above items play key roles in bandwidth consumptions. So the required bandwidth can be calculated by: Multiplying Number of users with estimated Traffic based on usage = Required Bandwidth N x T =B As bandwidth in CSL shall be mostly used for accessing Cloud based services, including updating of online database. It is recommended to have a 10Mbps fiber connection with unlimited downloading as requirements. Requirements of bandwidth cannot be underestimated as it can cost a lot. References Adams, C., & Franzosa, R. (2009). Introduction to topology: Pure and applied. New Delhi, Pearson. Barrett, D., & King, T. (2005). Computer networking illuminated. Sudbury, Mass, Jones and Bartlett. Behl, R. (2009). Information technology for management. New Delhi, India, Tata McGraw-Hill. Dong, J. (2007). Network dictionary. Saratoga, Calif, Javvin Technologies, Inc. http://www.books24x7.com/marc.asp?bookid=23111. Furht, B., & Escalante, A. (2010). Handbook of cloud computing. New York, Springer. http://www.books24x7.com/marc.asp?bookid=37945. Godse, A. P., & Godse, D. A. (2007). Computer concepts and C programming. Pune, Technical Publications Pune. Laszewski, T., & Nauduri, P. (2012). Migrating to the cloud Oracle client/server modernization. Waltham, MA, Syngress. http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597496476. Miller, P., & Cummins, M. (2000). LAN technologies explained. Boston, Digital Press. NU¨Ttgens, M., Gadatsch, A., Kautz, K., Schirmer, I., & Blinn, N. (2011). Governance and Sustainability in Information Systems. Managing the Transfer and Diffusion of IT Ifip WG 8.6 International Working Conference, Hamburg, Germany, September 22-24, 2011. Proceedings. Berlin, Heidelberg, Ifip International Federation for Information Processing. Samir Kumar Bandyopadhyay, Wael Adi, Tai-hoon Kim, Yang Xiao (2010) Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings, : Springer. Sharma, D. (2008). Foundations of IT. New Delhi, Excel Books. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Economical Set of Recommendations to LDA for Implementing Suitable Coursework Example | Topics and Well Written Essays - 3000 words - 1, n.d.)
Economical Set of Recommendations to LDA for Implementing Suitable Coursework Example | Topics and Well Written Essays - 3000 words - 1. https://studentshare.org/information-technology/1797510-computer-systems
(Economical Set of Recommendations to LDA for Implementing Suitable Coursework Example | Topics and Well Written Essays - 3000 Words - 1)
Economical Set of Recommendations to LDA for Implementing Suitable Coursework Example | Topics and Well Written Essays - 3000 Words - 1. https://studentshare.org/information-technology/1797510-computer-systems.
“Economical Set of Recommendations to LDA for Implementing Suitable Coursework Example | Topics and Well Written Essays - 3000 Words - 1”. https://studentshare.org/information-technology/1797510-computer-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology

Current State of Wheeler-Lea Act

In the essay “Current State of Wheeler-Lea Act,” the author focuses on speech regulations on food and drugs, which were established by the Early Twentieth Acts.... But there were many shortcomings like lack of jurisdiction over false or misleading claims; difficult prosecutions and exception....
2 Pages (500 words) Essay

The Theology of St. Luke

This paper "The Theology of St.... Luke" focuses on the fact that the theology of St.... Luke can be found out by looking at the lines that are there with respect to the evidence which is present.... A Gospel basically lacks the rational sequence of propositional sentences which are a trait of the missives....
8 Pages (2000 words) Essay

The Current State of the Wheeler-Lea Act

rovides safe tolerances be set for unavoidable poisonous substances.... But there were many shortcomings like lack of jurisdiction over false or misleading claims; difficult prosecutions and exception like no need of any form of affirmative label statement.... On… ndation of revision of 1906 Act, Congress passed the Federal Food, Drug and Cosmetic Act of 1938 (FD&C Act), Which authorized regulation of many different types of commercial speech that were previously outside the FDA's regulatory control and other requirements like labeling Current of Wheeler-Lea Act Introduction Many speech regulations on food and drugs were established by Early Twentieth Acts....
2 Pages (500 words) Essay

Market Segmentation and Positioning

Marketers have to create homogenous segments on the intended market that bear customers with similar needs and Task Introduction Marketers ought to recognize a suitable market for their merchandise, which can be referred to as a target market.... Therefore, market targeting serves as the first element in the creation of a suitable marketing strategy.... The management should also develop suitable promotion strategies through utilization of the promotional mixes or plans....
1 Pages (250 words) Essay

Network Topology Design

Additionally, the company projects a… This requires a network topology that is stable, secure, and integral. For the first ten employees of the company, a ring topology proves to be very effective; this topology holds all the employees equal thereby allowing them equal Network topology Design The company has grown from ten to a hundred employees in one year.... This requires a network topology that is stable, secure, and integral....
1 Pages (250 words) Assignment

Network Topology Design

In the current speedy and constantly advancing technological world, designing of a high quality network topology is always a very crucial subject of concern (Karris, 2009).... In essence, a quality network topology design results into in a computer network configuration that… On this regard, this paper lays major emphasis on designing quality network topologies via an account of an account of a company that has been experiencing aggressive expansion every year. It is vital to note Network topology Design Executive Summary In the current speedy and constantly advancing technological world, designing of a high quality network topology is always a very crucial subject of concern (Karris, 2009)....
1 Pages (250 words) Assignment

Recommendation for Mass Borrowing of Auto Loans

The paper presents the following recommendations to solve the issues presented in the case.... The immense borrowing has led to high debt rates in Canada; creating a situation that needs immediate attention (Does Canada have a loan bubble…2014).... Based on a PESTEL… People are spending a lot of money in buying expensive cars because of ease of loan accessibility....
2 Pages (500 words) Essay

Cloud Computing System for Anglia Cloud

… Cloud computing system for Anglia CloudIntroductionThis paper is a report for the board of Anglia Cloud explaining the idea, benefits and dangers of cloud computing as well as recommendations of computers, printers, broadband internet connection, Cloud computing system for Anglia CloudIntroductionThis paper is a report for the board of Anglia Cloud explaining the idea, benefits and dangers of cloud computing as well as recommendations of computers, printers, broadband internet connection, network hardware, and network topology suitable for the system....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us