Purchase Solution

Networking: Protocols and Access Methods

Not what you're looking for?

Ask Custom Question

1. As the network administrator for a growing firm, you want to design your network to run efficiently now and in the future. You plan to implement a server based Windows Server 2003 network. Although you currently support only 20 users on one floor of one building, management is rumoured to be planning an acquisition that would effectively double your company's network size. Highlight your current and future requirements, and choose the protocols and channel access method best suited to this situation. Then, explain why you chose those protocols and access methods.

2. A local bank just hired you to completely redesign its network. Money is no object, but its database transactions are time-critical, and PCs throughout the bank must be able to access the databases, which are on UNIX systems. Choose the best protocols and channel access method for this situation.

Purchase this Solution

Solution Summary

This solution discusses protocols and channel access methods within different corporations.

Solution Preview

1. Here we are using the windows server 2003 network. Now if we want to increase the no of users like here in this case we are simply doubling it. For this we will use VLAN method and MACA channel access method. Reason for selecting these protocols is as follows:

VLAN:
VLAN is a logical grouping of network users and resources that administratively defines on a switch port.

By default we can connect only one network address with a switch but by using VLAN concept we can attach multiple networks (router is must). This will be useful while we are extending our bank network as we can further divide our networks into smaller network to minimize the traffic.

The advantages of VLAN will be

a. Reduce broadcasting as we divided network into smaller networks.
b. Increases n/w performance as effectively our network is divided into smaller networks.
c. Increases security because in VLAN we can ensure that particular port is accessed by particular user.

MACA:
The existing Carrier Sense Multiple Access (CSMA) method widely used in amateur packet radio on shared simplex packet radio channels frequently suffers from the well-known "hidden terminal problem" and the less well known but related problem of the "exposed terminal." This paper proposes a new scheme, Multiple Access with Collision Avoidance (MACA) that could greatly relieve these problems. MACA can also be easily extended to provide automatic transmitter power control. This could increase the carrying capacity of a channel substantially.

In the classic hidden terminal situation, station Y can hear both stations X and Z, ...

Purchase this Solution


Free BrainMass Quizzes
Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Javscript Basics

Quiz on basics of javascript programming language.

C# variables and classes

This quiz contains questions about C# classes and variables.

C++ Operators

This quiz tests a student's knowledge about C++ operators.

Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.