Download presentation
Presentation is loading. Please wait.
Published byDoris Adams Modified over 9 years ago
1
Networks A visit to the admin block…
2
Network Topology Our school uses the flat topology. All devices are connected directly to one another in this type of topology except when hubs or switches are used. The main threat or issue for this type of topology is securing this network from inside attack. Since every devices are directly connected, access restriction to certain information is more lenient.
3
VLANS VLAN stands for Virtual Local Area Network or simply Virtual LANs. It allows the network system to be split up into virtual environments. The PCs for teachers, students, accounts department etc. all operate under separate LANs. However, it looks as if they are all on the same network since the LANs are connected to each other and forms a Virtual Lans (VLAN). Teachers do not have access to information on the PCs in the accounts department and students don’t have access to information shared between teachers and vice versa.
4
VLAN illustration Source: http://www.youtube.com/watch?v=2hUUaG4o3DAhttp://www.youtube.com/watch?v=2hUUaG4o3DA
5
System storage IBM system storage is used to backup data stored in the network. Data is backed up on tapes using incremental backup method. There are slots for tapes to be inserted in the device. New data are backed up every night during weekdays and all of the data will be backed up on weekends. At the end of every term, all data are stored on fireproof tapes and are brought to an off site territory.
6
Servers These are the servers stacked next to each other in the rack. The servers on the top are the older ones. They store applications shared between all the computers e.g Microsoft outlook. The bottom ones are called the blade servers. They are more compact and dense which allows the size to be reduced. The servers process very large amount of data and heat up very quickly hence they are stored in an air conditioned room.
7
HUBs This is the hub that connects all the devices and workstations and form a network. The school uses fiber optic cables that runs underground and connect to devices in different blocks of the school. Fiber optic cables transmit data at the speed of light.
8
VMware The software used to control the operation of the servers are called the VMware. They allowed the virtualization of the network which is the concept of the VLAN. The software allows user to control and monitor the operations of all the servers. Since a virtual network is used, errors in any server would not be a problem since the data and files can simply be transferred to another one using this software.
9
Symantec Data transferred within the network is protected using a software called Symantec. The email server in the network is also protected by this software. Up to a million or 97% of all emails received by users in the network are spams. The software blocks 99% of all spam mails. Mails without a subject are considered as spam mails and will be blocked. Rogue mails are those which they are uncertain of. Users will be notified that they received these emails and will be able to accept or decline.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.