14716 NETWORK TECHNOLOGIES
This assignment is based on the concept of networking technologies, which need to be implemented within a new premise of Beta communication Limited. This company works on the platform of telecommunication, which deals with telecom products for the niche market. Moreover, this assignment can help the learner to understand the standard and the models which are associated with the networking technologies. The aim of this assignment is to give a background to the basic components of the networked system through which the entire networking operations can derive. Furthermore, this company has the different building; each building has different department and every different have various requirements on the basis of the network along with the applications of the networking.
LO1: Understanding the principles of networking
A.C 1.1 Discuss the benefits and constraints of different networking systems, types and topologies. Analyze and clearly identify the requirements of the systems for this network in order to convince the management of the given case study company
According to a network consultant, there are various benefits of the networking system, which can help the Beta communication Limited to fulfil the requirements of the different building of this company. Those benefits are given below:
- File sharing: After implementation of LAN within the 1st, 2nd and 3rd building of this company, this networking system can offer a quick and easy way for sharing their large volume data or files directly. According to Vermeils (2012, p.90), has stated that as this company has three buildings, therefore, using a disk or USB from one building to another for sharing their files can consume a lot of time.
- Security: As a network consultant, it can be said that security can be one of the most important aspects of having networking technologies within any building or office. The first building of this company need to have the Web server and File Transfer Protocol or FTP for storing purpose of application and data, therefore, they require a secured platform. That password can limit the authorization of the file, that is, it gives protection by limiting the access to the authorized users (Tropper, 2014, p.19).