TAILIEUCHUNG - Networking: A Beginner’s Guide Fifth Edition- P48

Networking: A Beginner’s Guide Fifth Edition- P48:I have run into many people over the years who have gained good even impressive working knowledge of PCs, operating systems, applications, and common problems and solutions. Many of these people are wizards with desktop computers. | Chapter 15 Designing a Network 217 because the data might be static and easy to restore from tape if the disk array is lost. Other applications might require the highest level of data-loss safety possible with failover servers each having mirrored RAID 1 or RAID 10 arrays and online tape backup systems updating a backup tape every hour or for every transaction. Similarly some companies might work with data that is so sensitive that they must install the best firewalls perhaps even two levels of firewalls and hire full-time professionals dedicated to keeping the data secure. Other companies might be satisfied if they are only reasonably secure. The point is that you must determine how important these issues are to the company for which you are designing the network. Then you can propose different solutions to address these needs and factor them into the rest of your design. Growth and Capacity Planning The final area to consider is the expected growth of the network particularly if the company expects this growth to be substantial. As mentioned earlier in this chapter a network designed for a rapidly growing company looks different from one for a slowly growing company even if both companies start out at the same size. In the former case you want a design that you can quickly and easily expand without needing to replace much of the existing hardware and software. In the latter case you can get by with a simpler network design. Consider the impact of growth on the different parts of the network that you ve already examined applications users and services because linear growth does not always mean a matching linear impact to the network. Assuming linear growth the impact to the network might be much lower or much higher than the curve. For example you saw in Chapter 4 how Ethernet uses a collision detection mechanism to manage network traffic. In that chapter you also learned that Ethernet scales linearly but only up to a point. Once the network starts to become .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.