CASE STUDY IN NETWORK FUNDAMENTALS - For Merge
CASE STUDY IN NETWORK FUNDAMENTALS - For Merge
I would like to thank the owner and staff for giving me chance to conduct the network fundamental
case study regarding of networking fundamentals which bring knowledge and more features studies for
our daily lives that required internet and network communication and then news also in social media.
The profesor and teacher doing his job to give acknowledge his student also make more gaining
experience.
Glad to extremely gratitude, warm and accept my case study then also thanks to all here.
I would like to thank my family for their motivations and support, thanks to my friends and classmates
for clarifying things that I don’t understand .
INTRODUCTION
This document will be providing a basic overview
Introduction to floor plans. the floor plan is a two-dimensional scale drawing of the planning, size and
direction of rooms, doors, walls and windows.
Network diagram is a visual representation of network architecture. It maps out the structure of
a network with a variety of different symbols and line connections. It is the ideal way to share the
layout of a network because the visual presentation makes it easier for users to understand how items
are connected.
BACKGROUND OF THE STUDY
Business plan is a document designed to detail the major characteristics of a firm its product or
service, its industry, its market, its manner of operating (production, marketing, management), and its
financial outcomes with an emphasis on the firms present and future.
There are two circumstances under which creating a business plan is absolutely necessary. One is
when outsiders expect it. This is called external legitimacy. Creating a business plan is the
acknowledged best way to build external legitimacy for your firm. When you are seeking outside
support whether financial or expert you do a business plan to signal your professionalism and how
serious you are about the business. Investors, whether they are venture capitalists, informal investors
(called angels), bankers, or your two great aunts, are going to expect to see a business plan before
considering investing in your business. In addition, many small business consultants and government
agencies want to see your business plan in order to understand your operations, goals, and level of
understanding. If you are pursuing a partnership or joint venture with a larger firm, people there will
expect to see a business plan before they even consider partnering. In these situations, a plan is the
only way you are going to get the attention of outsiders. The kinds of benefits these different groups
look for in a plan are given in proposal.
The other circumstance under which a business plan is needed is for internal understanding. This is
when you want to get all the aspects of the business clear in your mind and the minds of others in the
business, such as your partners or your key employees. When you want everyone to understand the
business in the same way, a business plan can make a tremendous difference.
OBJECTIVE OF THE STUDY
3.To
STATEMENT OF THE PROBLEM
3.
Common causes of problem in business and computers which is peripheral and program the unit (PC)
Management
Construction
Expenses
The common problems causes to solve in computers and management to fix it and then troubleshoot.
Management
The management - is a some problems of causes. Involving about moneys and balancing moneys
If you need to recheck about the record sheets and history
Construction
The construction - is a many have delaying and some-reason a manpower are stand-by this causing
delay. To solving you secure and see it how its going on your site
Expenses
The expenses – a little bit problems of expenses is to delay the salary of the staff that’s why you must
be able pay it already. To
Hang up the pc’s
Many ca
Mother Board all causes
To the Students.
This study may serve as a guide and reference for the students undertaking similar studies.
The student to understand and to learn about the field featuring in computer science or IT also
Acknowledges his professor to guiding about he tackle the subject.
To the Professors.
The professor he is give the subject in tackle about the research or proposal. It will be easier for them
to understand related topics and to learn about in subject.
DEFINITION OF TERM
Architecture
architecture and building engineering, a floor plan is a drawing to scale, showing a view from above,
of the relationships between rooms, spaces, traffic patterns, and other physical features at one level of
a structure
Telecommunications refers to the exchange of information by electronic and electrical means
over a significant distance. A complete telecommunication arrangement is made up of two or
more stations equipped with transmitter and receiver devices. A single co-arrangement of
transmitters and receivers, called a transceiver, may also be used in many telecommunication
stations.
Telecommunications devices include telephones, telegraph, radio, microwave communication
arrangements, fiber optics, satellites and the Internet.
Cellphone
Small wireless device that has at least the same functions of a standard wired telephone but is
smaller and more mobile. A cell phone requires a subscription to a service provider and
requires either a prepaid or monthly billing setup. Generally, they have more functions than
traditional land lines and need to be charged after a period of time. Also called mobile phone or
mobile device.
Software
System software - is serves as a base for application software. System software includes
device drivers, operating systems (OSs), compilers, disk formatters, text editors and utilities
helping the computer to operate more efficiently. It is also responsible for managing hardware
components and providing basic non-task-specific functions. The system software is usually
written in C programming language.
Programming software - is a set of tools to aid developers in writing programs. The various
tools available are compilers, linkers, debuggers, interpreters and text editors.
Application software - is intended to perform certain tasks. Examples of application software
include office suites, gaming applications, database systems and educational software.
Application software can be a single program or a collection of small programs. This type of
software is what consumers most typically think of as "software."
Motherboard
computer’s main circuit board, and it includes the following attached to a fixed planar surface:
Input/output ports
Peripheral connections
PCI expansion slots
Bus and power connectors
Heat sinks and mounting points for fans and major components, including the central
processing unit (CPU) and optional coprocessors
Supporting chipset for CPU, bus and external components
BIOS
Memory sockets for RAM, ROM and cache
Interconnecting circuitry
Additionally, daughterboards and mezzanine cards, installed on a second level, may be plugged into
the motherboard. A daughterboard may be the actual motherboard and/or card or board plugged into
the motherboard.
The motherboard is also referred to as the main board (mobo), system board or planar board. Apple
computers refer to the motherboard as the logic board.
Hub
network hub is a device that allows multiple computers to communicate with each other over a network.
It has several Ethernet ports that are used to connect two or more network devices together. Each
computer or device connected to the hub can communicate with any other device connected to one of
the hub's Ethernet ports.
Mouse
While most people don't want to see a mouse running around in their home, they typically don't have a
problem seeing one sitting by their computer. This is because, along with the keyboard, the mouse is
one of the primary input devices used with today's computers. The name comes from the small shape
of the mouse, which you can move quickly back and forth on the mouse pad, and the cord, which
represents the mouse's tail. Of course, if you are using a wireless mouse, the analogy does not work so
well.
RAM
Random access memory, a type of computer memory that can be accessed randomly; that is, any byte
of memory can be accessed without touching the preceding bytes. RAM is found in servers, PCs,
tablets, smartphones and other devices, such as printers.
Data bus
system within a computer or device, consisting of a connector or set of wires, that provides
transportation for data. Different kinds of data buses have evolved along with personal computers and
other pieces of hardware.
Resistor
electrical component that limits the flow of electric current. One or more resistors can be used to
provide the correct amount of current to specific components within an electronic device. ... The
resulting current is inversely proportional to the resistance.
Router
device that forwards data packets along networks. A router is connected to at least two networks,
commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the
places where two or more networks connect.
Monitor
Older computer monitors were built using cathode ray tubes (CRTs), which made them rather heavy
and caused them to take up a lot of desk space. Most modern monitors are built using LCD technology
and are commonly referred to as flat screen displays. These thin monitors take up much less space
than the older CRT displays. This means people with LCD monitors have more desk space to clutter up
with stacks of papers, pens, and other objects.
drive. mechanical drive. A storage device that uses moving parts, such as a magnetic tape,
magnetic disk or optical disc. The term is commonly used to contrast hard disks with non-mechanical
solid state drives(SSDs). See hard disk and solid state drive.
HARDWARE PERIPHERALS
Specification
The headset using for conversation example gaming call and then video call or private speak person
MONITOR – VIEW PAKER
monitor is an electronic visual computer display that includes a screen, circuitry and the case in which
that circuitry is enclosed. Older computer monitors made use of cathode ray tubes (CRT), which made
them large, heavy and inefficient. Nowadays, flat-screen LCD monitors are used in devices like
laptops, PDAs and desktop computers because they are lighter and more energy efficient.
PROCESSESOR – intel core i9
Alternately referred to as a processor, central processor, or microprocessor, the CPU(pronounced sea-
pea-you) is the central processing unit of the computer. A computer's CPU handles all instructions it
receives from hardware and software running on the computer.
VIDEO CARDS – NVIDIA GTX750 7i
video card connects to the motherboard of a computer system and generates output images
to display. Video cards are also referred to as graphics cards. Video cards include a processing unit,
memory, a cooling mechanism and connections to a display device
VGA or GPC expansion card which generates a feed of output images to a display device(such as
a computer monitor). Frequently, these are advertised as discrete or dedicated graphics cards,
emphasizing the distinction between these and integrated graphics. At the core of both is the graphics
processing unit (GPU), which is the main part that does the actual computations, but should not be
confused as the video card as a whole, although "GPU" is often used to refer to video cards.
Mother Board – GIGABYTE A110M
computer peripheral is a device that is connected to a computer but is not part of the core computer
architecture. The core elements of a computer are the central processing unit, power
supply, motherboard and the computer case that contains those three components.
Parts of a Motherboard
If you were to open up your computer and take out the motherboard, you would probably get pretty
confused about all the different parts. Depending on the make and model of your computer, it might
look something like this.
To understand how computers work, you don't need to know every single part of the motherboard.
However, it is good to know some of the more important parts and how the motherboard connects the
various parts of a computer system together. Here are some of the typical parts:
A CPU socket - the actual CPU is directly soldered onto the socket. Since high speed CPUs generate
a lot of heat, there are heat sinks and mounting points for fans right next to the CPU socket.
A power connector to distribute power to the CPU and other components.
Slots for the system's main memory, typically in the form of DRAM chips.
A chip forms an interface between the CPU, the main memory and other components. On many types
of motherboards, this is referred to as the Northbridge. This chip also contains a large heat sink.
A second chip controls the input and output (I/O) functions. It is not connected directly to the CPU but
to the Northbridge. This I/O controller is referred to as the Southbridge. The Northbridge and
Southbridge combined are referred to as the chipset.
Several connectors, which provide the physical interface between input and output devices and the
motherboard. The Southbridge handles these connections.
Slots for one or more hard drives to store files. The most common types of connections are Integrated
Drive Electronics (IDE) and Serial Advanced Technology Attachment (SATA).
A read-only memory (ROM) chip, which contains the firmware, or startup instructions for the computer
system. This is also called the BIOS.
A slot for a video or graphics card. There are a number of different types of slots, including the
Accelerated Graphics Port (AGP) and Peripheral Component Interconnect Express (PCIe).
Additional slots to connect hardware in the form of Peripheral Component Interconnect (PCI) slots.
RAM – HYPER X 8GB / 32GB
Random access memory (RAM) is a type of data storage used in computers that is generally located
on the motherboard. This type of memory is volatile and all information that was stored in RAM is lost
when the computer is turned off.
Random access memory (RAM) is a type of data storage used in computers that is generally located
on the motherboard. This type of memory is volatile and all information that was stored in RAM is lost
when the computer is turned off. Volatile memory is temporary memory while ROM (read-only memory)
is non-volatile and holds data permanently when the power is turned off.
The ram chip may be individually mounted on the motherboard or in sets of several chips on a small
board connected to the motherboard. Older memory types were in the form of chips called dual in-line
package (DIP). Although DIP chips are still used today, the majority of memory is in the form of a
module, a narrow printed circuit board attached to a connector on the motherboard. The three main
memory circuit boards types containing chips are: RIMMs (Rambus in-line memory modules), DIMMs
(dual in-line memory modules) and SIMMs (single in-line memory modules). Most motherboards today
use DIMMs.
Hard Drive Disk 4T
Hard disk drive (HDD), hard disk, hard drive, or fixed disk, is an electromechanical data storage
device that uses magnetic storage to store and retrieve digital information using one or more rigid
rapidly rotating disks (platters) coated with magnetic material.
For more usage store the files and programs to able access and install apps
HUB
A network hub is a device that allows multiple computers to communicate with each other over a network.
It has several Ethernet ports that are used to connect two or more network devices together. Each
computer or device connected to the hub can communicate with any other device connected to one of
the hub's Ethernet ports.
Hubs are similar to switches, but are not as "smart." While switches send incoming data to a specific
port, hubs broadcast all incoming data to all active ports. For example, if five devices are connected to
an 8-port hub, all data received by the hub is relayed to the five active ports. While this ensures the data
gets to the right port, it also leads to inefficient use of the network bandwidth. For this reason, switches
are much more commonly used than hubs.
A router is the first line of security from intrusion into a network. Enabling the highest level of security
on the router is the best way to keep your computer system and information safe from attack.
Routers contain software called firmware that should be updated as released by the router
manufacturer.
Most routers connect to other network devices only via network cables and do not require drivers to
operate in Windows or other operating systems. However, routers that connect to a computer via a
USB or FireWire typically require drivers to operate properly.
Routers often act as the DHCP servers in small networks, issuing unique IP addresses.
Most routers are manufactured by companies like Linksys, 3Com, Belkin, D-Link, Motorola, TRENDnet,
and Cisco, but there are many others.
Routers come in many shapes and sizes, as you can see below
Routers connect a modem — like a fiber, cable, or DSL modem — to other devices to allow
communication between those devices and the Internet. Most routers, even wireless routers, usually
feature several network ports to connect numerous devices to the Internet simultaneously.
Typically, a router connects physically, via a network cable, to the modem via the 'Internet' or 'WAN'
port and then physically, again via a network cable, to the network interface card in whatever wired
network devices you may have. A wireless router can connect via various wireless standards to devices
that also support the particular standard used.
The IP address assigned to the 'WAN' or 'Internet' connection is a public IP address. The IP address
assigned to the 'LAN' or local network connection is a private IP address. The private IP addresses
assigned to a router is usually the default gate way for the various devices on the network.
Wireless routers, and wired routers with multiple connections, also act as simple network
switches allowing the devices to communicate with each other. For example, several computers
connected to a router can be configured to share printers and files amongst themselves.
Printer
Printer Languages
Printer languages are commands from the computer to the printer to tell the printer how to format the
document being printed. These commands manage font size, graphics, compression of data sent to the
printer, color, etc. The two most popular printer languages are Postscript and Printer Control Language.
SOFTWARE
This containing about the software and direct installed application in computers also the meaning
base in characters.
Microsoft Office
Microsoft Word or MS-WORD (often called Word) is a Graphical word processing program that users
can type with. It is made by the computer company Microsoft. Its purpose is to allow users to type and
save documents.
Spelling & grammar checker, word count (this also counts letters and lines)
Speech recognition
Inserts pictures in documents
Choice of typefaces
Special codes
Web pages, graphs, etc.
Tables
Displays synonyms of words and can read out the text
Prints in different ways
Microsoft Excel
Excel is typically used to organize data and perform financial analysis. It is used across all business
functions and at companies from small to large.
The main uses of Excel include:
Data entry
Data management
Accounting
Financial analysis
Charting and graphing
Programming
Time management
Task management
Financial modeling
Customer relationship management (CRM)
Almost anything that needs to be organized!
Microsoft PowerPoint
The software allows users to create anything from basic slide shows to complex presentations.
PowerPoint is often used to create business presentations, but can also be used for educational or
informal purposes. The presentations are comprised of slides, which may contain text, images, and
other media, such as audio clips and movies. Sound effects and animated transitions can also be
included to add extra appeal to the presentation. However, overusing sound effects and transitions will
probably do more to annoy your audience than draw their attention. (Yes, we have all heard the car
screeching noise enough times for one lifetime.)
Most PowerPoint presentations are created from a template, which includes a background color or
image, a standard font, and a choice of several slide layouts. Changes to the template can be saved to
a "master slide," which stores the main slide theme used in the presentation. When changes are made
to the master slide, such as choosing a new background image, the changes are propagated to all the
other slides. This keeps a uniform look among all the slides in the presentation.
When presenting a PowerPoint presentation, the presenter may choose to have the slides change at
preset intervals or may decide to control the flow manually. This can be done using
the mouse, keyboard, or a remote control. The flow of the presentation can be further customized by
having slides load completely or one bullet at a time. For example, if the presenter has several bullet
points on a page, he might have individual points appear when he clicks the mouse. This allows more
interactivity with the audience and brings greater focus to each point.
PowerPoint presentations can be created and viewed using Microsoft PowerPoint. They can also be
imported and exported with Apple Keynote, Apple's presentation program for the Macintosh platform.
Since most people prefer not to watch presentations on a laptop, PowerPoint presentations are often
displayed using a projector. Therefore, if you are preparing a PowerPoint presentation for a room full of
people, just make sure you have the correct video adapter.
CCBOOT DISKLESS
Diskless node (or diskless workstation) is a workstation or personal computer without disk drives,
which employs network booting to load its operating system from a server. (A computer may also be
said to act as a diskless node, if its disks are unused and network booting is used.)
software can provide the server stand alone and can clone pc to providing and devider storage
transferred clients
GAME SOFTWARE
It will be entertaining clients and guests to play any game to provide and run software
SERVERPORT BILLING SYSTEM
Able creating time and transferring data time to clients and guests
The adding money or promos provide
cybercafe is place that has a number of personal computers connected to the Internet and available for
use by customers If you travel and need access to the Internet, a cybercafe might be one solution.
renting computers hour.
OPERATING SYSTEM – WINDOW 7
all programs to access and more exploring and creating
Windows 7 Home Premium - the standard version installed with most home PCs and includes
all of the features listed above.
Windows 7 Professional - typically installed on business computers and includes all the Home
Premium features as well as additional features such as Windows XP mode (XPM) and Domain
Join.
Windows 7 Ultimate - the most complete version, which has all of the Professional features as
well as BitLocker data protection and additional language support.
The system requirements for Windows 7 are:
1 GHz or faster 32-bit (x86) or 64-bit (x64) processor
1 GB of RAM or 2 GB of RAM for the 64-bit version
16 GB of available hard disk space or 20 GB for the 64-bit version
DirectX 9 graphics device with WDDM 1.0 or higher driver
RESEARCH STUDY
For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices
connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single administrative system is
generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices, schools,
colleges or universities. Number of systems connected in LAN may vary from as least as two to as
much as 16 million.
LAN provides a useful way of sharing the resources between end users.The resources such as
printers, file servers, scanners, and internet are easily sharable among computers.
LANs are composed of inexpensive networking and routing equipment. It may contains local servers
serving file storage and other locally shared applications. It mostly operates on private IP addresses
and does not involve heavy routing. LAN works under its own local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology
and uses Star topology, while Token-ring is rarely seen.
LAN can be wired,wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network.
It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their
Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city.
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area
Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet.
Wide Area Network
As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are Wide Area Network.
These networks provide connectivity to MANs and LANs. Since they are equipped with very high
speed backbone, WANs use very expensive network equipment.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and
Synchronous Optical Network (SONET). WAN may be managed by multiple administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest network in
existence on this planet.The internet hugely connects all WANs and it can have connection to LANs
and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol.
Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is
gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It uses
WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-
Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are
laid under sea known to us as submarine communication cable.
Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible
by client software known as Web Browsers. When a user requests a page using some web browser
located on some Web Server anywhere in the world, the Web Server responds with the proper HTML
page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them are:
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Ethernet
Ethernet is a widely deployed LAN technology.This technology was invented by Bob Metcalfe and D.R. Boggs in
the year 1970. It was standardized in IEEE 802.3 in 1980.
Ethernet shares media. Network which uses shared media has high probability of data collision. Ethernet uses
Carrier Sense Multi Access/Collision Detection (CSMA/CD) technology to detect collisions. On the occurrence of
collision in Ethernet, all its hosts roll back, wait for some random amount of time, and then re-transmit the
data.
Ethernet connector is,network interface card equipped with 48-bits MAC address. This helps other Ethernet
devices to identify and communicate with remote devices in Ethernet.
Traditional Ethernet uses 10BASE-T specifications.The number 10 depicts 10MBPS speed, BASE
stands for baseband, and T stands for Thick Ethernet. 10BASE-T Ethernet provides transmission
speed up to 10MBPS and uses coaxial cable or Cat-5 twisted pair cable with RJ-45 connector.
Ethernet follows star topology with segment length up to 100 meters. All devices are connected to a
hub/switch in a star fashion.
Fast-Ethernet
To encompass need of fast emerging software and hardware technologies, Ethernet extends itself as
Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It can provide speed up to 100
MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable. It uses
CSMA/CD technique for wired media sharing among the Ethernet hosts and CSMA/CA (CA stands for
Collision Avoidance) technique for wireless Ethernet LAN.
Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up to 100 MBPS
on fiber. Ethernet over fiber can be extended up to 100 meters in half-duplex mode and can reach
maximum of 2000 meters in full-duplex over multimode fibers.
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed status only for 3 years till
Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000 mbits/seconds. IEEE802.3ab
standardize Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah defines
Giga-Ethernet over Fiber.
Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared media in Ethernet create one single
Broadcast domain and one single Collision domain. Introduction of switches to Ethernet has removed
single collision domain issue and each device connected to switch works in its separate collision
domain. But even Switches cannot divide a network into separate Broadcast domains.
Virtual LAN is a solution to divide a single Broadcast domain into multiple Broadcast domains. Host in
one VLAN cannot speak to a host in another. By default, all hosts are placed into the same VLAN.
In this diagram, different VLANs are depicted in different color codes. Hosts in one VLAN, even if
connected on the same Switch cannot see or speak to other hosts in different VLANs. VLAN is Layer-2
technology which works closely on Ethernet. To route packets between two different VLANs a Layer-3
device such as Router is required.
Network Topology is the arrangement with which computer systems or network devices are connected
to each other. Topologies may define both physical and logical aspect of the network. Both logical and
physical topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the
end hosts are unaware of underlying network and see each other as if they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus topology may have
problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other devices. But failure of the
shared communication line can make all other devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction and as
soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-to-
point connection. That is, there exists a point to point connection between hosts and hub. The hub
device can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other
hosts fails. Every communication between hosts, takes place through only the hub.Star topology is not
expensive as to connect one more host, only one cable is required and configuration is simple.
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing
structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of
failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-
to-point connection with every other host or may also have hosts which are in point-to-point connection
to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links.
Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus
for every new host n(n-1)/2 connections are required. It provides the most reliable network
structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect
to each other in some arbitrarily fashion. This topology exists where we need to provide
reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently.This topology imitates as extended Star topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is
bifurcated into three types of network devices. The lowermost is access-layer where computers are
attached. The middle layer is known as distribution layer, which works as mediator between upper
layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e.
root of the tree from which all nodes fork.
All neighboring hosts have point-to-point connection between them.Similar to the Bus topology, if the
root goes down, then the entire network suffers even.though it is not the single point of failure. Every
connection serves as point of failure, failing of which divides the network into unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts.Means, if the end hosts in daisy chain are
connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits the network
into two segments.Every intermediate host works as relay for its immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may contain
attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of
Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the
best example of largest Hybrid topology
Network Topologies
Network topology refers to the shape or the arrangement of the different elements in a computer
network (i.e. links and nodes). Network Topology defines how different nodes in a network are
connected to each other and how they communicate is determined by the network's topology.
Topologies are either physical or logical. There are four principal topologies used in LANs.
Bus Topology
All devices are connected to a central cable, called the bus or backbone. Bus networks are relatively
inexpensive and easy to install for small networks.
Ring Topology
All devices are connected to one another in the shape of a closed loop, so that each device is
connected directly to two other devices, one on either side of it.
Star Topology
All devices are connected to a central hub. Star networks are relatively easy to install and manage, but
bottlenecks can occur because all data must pass through the hub.
Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-
configured workstations connected to a linear bus backbone cable.
These topologies can also be mixed. For example, a bus-star network consists of a high-bandwidth
bus, called the backbone, which connects a collections of slower-bandwidth star segments.
Topology
1. Mesh Topology
Mesh Topology: In a mesh network, devices are connected with many redundant interconnections
between network nodes. In a true mesh topology every node has a connection to every other node in
the network. There are two types of mesh topologies:
Full mesh topology: occurs when every node has a circuit connecting it to every other node in a
network. Full mesh is very expensive to implement but yields the greatest amount of redundancy, so in
the event that one of those nodes fails, network traffic can be directed to any of the other nodes. Full
mesh is usually reserved for backbone networks.
Partial mesh topology: is less expensive to implement and yields less redundancy than full mesh
topology. With partial mesh, some nodes are organized in a full mesh scheme but others are only
connected to one or two in the network. Partial mesh topology is commonly found in peripheral
networks connected to a full meshed backbone.
2. Star Topology
Star Topology: In a star network devices are connected to a central computer, called a hub. Nodes
communicate across the network by passing data through the hub.
Main Advantage: In a star network, one malfunctioning node doesn't affect the rest of the network.
Main Disadvantage: If the central computer fails, the entire network becomes unusable.
3. Bus Topology
Bus Topology: In networking a bus is the central cable -- the main wire -- that connects all devices on a
local-area network (LAN). It is also called the backbone. This is often used to describe the main
network connections composing the Internet. Bus networks are relatively inexpensive and easy to
install for small networks. Ethernet systems use a bus topology.
Main Advantage: It's easy to connect a computer or device and typically it requires less cable than a
star topology.
Main Disadvantage: The entire network shuts down if there is a break in the main wire and it can be
difficult to identify the problem if the network shuts down.
4. Ring Topology
Ring Topology: A local-area network (LAN) whose topology is a ring. That is, all of the nodes are
connected in a closed loop. Messages travel around the ring, with each node reading those messages
addressed to it.
Main Advantage: One main advantage to a ring network is that it can span larger distances than other
types of networks, such as bus networks, because each node regenerates messages as they pass
through it.
5. Tree Topology
Tree Topology: This is a "hybrid" topology that combines characteristics of linear bus and star
topologies. In a tree network, groups of star-configured networks are connected to a linear bus
backbone cable.
Main Advantage: A Tree topology is a good choice for large computer networks as the tree topology
"divides" the whole network into parts that are more easily manageable.
Main Disadvantage: The entire network depends on a central hub and a failure of the central hub can
cripple the whole network
IMPORTANCE
Internet Cafes (I-Cafes) , where the demand for computer use was so high because of students for
their assignments and projects, of employees for their paper works and research, and of gamers for
their fun and leisure.
In today’s Information Age, I-Cafes still do exist. One of the most successful computer cafes in the
Philippines, continues to offer computer services like printing, internet browsing, and gaming. The
question is, you will put up a computer shop today, will it still get the revenues you wanted like those
of the early I-Cafes and make it a profitable business in the Philippines?
Is There a Demand Still?
Internet Surfing
Since the rise of mobile internet, the demand for computers for internet browsing has declined. You
can simply acquire postpaid or prepaid plan from your mobile carrier and you can surf the net in no
time. A lot of establishments nowadays are offering free WiFi hot spots so the need of renting a
computer for internet browsing is decreasing.
Internet Surfing
Printing and Scanning Services
From my personal experience, I usually rent computer at malls and pay 60 per hour not to check my
Facebook news feed but to make documents for printing. I-Cafes offering printing services are still
relevant nowadays because mobile phones and tablet cannot perform that task.
Scanning services on the other hand can be alternately done by just taking a picture of the document
by a mobile phone camera and sending it immediately through e-mail of chat. The quality is better
since a lot of phones now have high resolution cameras.
Video Streaming and Video Chat
I-Cafes are the best venue to watch online videos and movies or stream videos live since they usually
have a stronger connection as opposed to Wi-Fi, where the bandwidth is limited. Mobile internet can
be used however with the existing cap per month by our major carriers, video streaming is now
discouraged.
Video Chat can be substituted with Face Time from a mobile device or tablet. With the rise of
households having their own Wi-Fi connection for security, the demand for online video chat in I-Cafes
is low.
Skype Video Chat
E-Gaming
Most of my time and money spent on renting computers in I-Cafes is on gaming. Well for a guy like me,
I was hooked on playing computer games just like playing Super Mario on SNES. Lets take a look on
the development of E-gaming since its conception.
Evolution of E-Gaming
LAN Games
Other LAN Games that we played were Diablo, Star Craft, Warcraft, Battle Realms, and NBA Live. You
can play alone or play with people inside the I-Cafe since you are all connected in a local network.
MMORPG
Then came the MMORPG (Multi-Player Online Role Playing Game), like Ragnarok, MU, Flyff and the
like, which initially required game cards to play the game. So we pay the computer rent, plus the game
itself! Now, mostly MMORPG’s are free to play and earn revenues on selling in-game items for cash.
Some MMORPG can now be played on mobile phones and tablets.
Dota 2
Rentals and Services
Computer Rental ranges from 20 per hour. I-Cafe Services vary depending on the kind of print (laser,
ink jet)and the color (black, colored).
1. To raise money for your business
Potential investors or lenders want a written business plan before they give you money. A mere
description of your business concept is not enough. Instead, ensure you have a thorough business and
financial plan that demonstrates the likelihood of success and how much you will need for your
business to take off.
2. To make sound decisions
As an entrepreneur, having a business plan helps you to define and focus on your business ideas and
business strategies. You not only concentrate on financial matters, but also on management issues,
human resource planning, technology and creating value for your customer.
3. To help you identify potential weaknesses
Having a business plan helps you to identify potential pitfalls in your idea. You can also share the plan
with others who can give you their opinions and advice. Identify experts and professionals who are at a
position to give you invaluable advice, and share your plan with them.
4. To communicate your ideas with stakeholders
A business plan is a communication tool that you can use to secure investment capital from financial
institutions or lenders. It can also be used to convince people to work for your enterprise, to secure
credit from suppliers, and to attract potential customers.
Creating a business plan involves a lot of thought. You need to consider what you want to do, and use
that as a starting point. It doesn't need to be complicated. At its core, your plan should identify where
you are now, where you want your business to go, and how you will get there.
Business
business plan is an important tool for managing and growing your business. A well-designed plan lays
out a vision of growth and the steps needed to get there. A plan is also an essential communications
tool for attracting financing for your business as well as managers and staff as your business grows.
Clarify Direction
The primary purpose of a business plan is to define what the business is or what it intends to be over
time. Clarifying the purpose and direction of your business allows you to understand what needs to be
done for forward movement. Clarifying can consist of a simple description of your business and its
products or services, or it can specify the exact product lines and services you'll offer, as well as a
detailed description of your ideal customer.
Future Vision
Businesses evolve and adapt over time, and factoring future growth and direction into the business
plan can be an effective way to plan for changes in the market, growing or slowing trends, and new
innovations or directions to take as the company grows. Although clarifying direction in the business
plan lets you know where you're starting, future vision allows you to have goals to reach for.
RESUME
Recinto. Joshua B,
Reference:
Eng. Jeffrey Ecaruan. MIT, LPT
Instructor
ACCESS COMPUTER COLLEGE +63 907 719 594
Signature