Explore BrainMass

Networking: Protocols and Access Methods

1. As the network administrator for a growing firm, you want to design your network to run efficiently now and in the future. You plan to implement a server based Windows Server 2003 network. Although you currently support only 20 users on one floor of one building, management is rumoured to be planning an acquisition that would effectively double your company's network size. Highlight your current and future requirements, and choose the protocols and channel access method best suited to this situation. Then, explain why you chose those protocols and access methods.

2. A local bank just hired you to completely redesign its network. Money is no object, but its database transactions are time-critical, and PCs throughout the bank must be able to access the databases, which are on UNIX systems. Choose the best protocols and channel access method for this situation.

Solution Preview

1. Here we are using the windows server 2003 network. Now if we want to increase the no of users like here in this case we are simply doubling it. For this we will use VLAN method and MACA channel access method. Reason for selecting these protocols is as follows:

VLAN is a logical grouping of network users and resources that administratively defines on a switch port.

By default we can connect only one network address with a switch but by using VLAN concept we can attach multiple networks (router is must). This will be useful while we are extending our bank network as we can further divide our networks into smaller network to minimize the traffic.

The advantages of VLAN will be

a. Reduce broadcasting as we divided network into smaller networks.
b. Increases n/w performance as effectively our network is divided into smaller networks.
c. Increases security because in VLAN we can ensure that particular port is accessed by particular user.

The existing Carrier Sense Multiple Access (CSMA) method widely used in amateur packet radio on shared simplex packet radio channels frequently suffers from the well-known "hidden terminal problem" and the less well known but related problem of the "exposed terminal." This paper proposes a new scheme, Multiple Access with Collision Avoidance (MACA) that could greatly relieve these problems. MACA can also be easily extended to provide automatic transmitter power control. This could increase the carrying capacity of a channel substantially.

In the classic hidden terminal situation, station Y can hear both stations X and Z, ...

Solution Summary

This solution discusses protocols and channel access methods within different corporations.