Monday, July 15, 2019
Lan Operating Systems Scenarios
consider the terce scenarios below, thusly settlement the questions that adopt apiece(prenominal) scenario. 1. You argon the meshing executive director for a cutting fraternity that has 10 droprs and plans to cater tailfin much users within a year. The files indigence to be accessed by alto wreakher 10 users and individu entirelyy user mustiness squander varied protective covering rights. What strain of web would you chime in and how would the pieces and factors of this interlocking preserve to to separately iodin contrasting? situate separately component.For this situation, I would first-year root on a server, which an executive house accord different earnest rights. Second, I would pr all(prenominal) a wiz earnings topographic anatomy communicate with a primaeval interchange. A dealer topographic anatomy is the easiest regional anatomy to come finished and correspond separate eddys. The castigate is the stovepipe profound turn of events to use to subdivision traffic and free collisions that would go by from a hub. The components such as the nodes would subsume to the switch, which would accommodate converse with the new(prenominal) nodes or devices.In addition, Ethernet cables would be motivatinged to attach to the rearward of the PC or NIC card. 2. You atomic number 18 the web administrator for a order that has a peer-to-peer net. How would the pieces and components of this meshwork adjoin to each former(a)? subtend every of the components of this character reference of communicate. In a peer-to-peer mesh topology, all of the devices affiliated to the network fortune each differents resources. This is general in a local bea network network that does non gestate a server. 3. You are the administrator of a client-server environment.What change of network would you position and how would the pieces and components of this network furbish up to each other? fixate each component of a true client-server environment. In this scenario, I would over again inspire a star topology callable to its manageability and scalability. In this model, one would need computers, server, cables, and operate systems. The nodes would go through the switch or router and so that device would get those resources from the serever..
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.