Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Introduction

In this assignment will identify correct and sufficient domain service features, tools,
and technologies suitable for the online gaming tournament directory services. We
will draw up network architecture and a network diagram to provide connection
between devices.
Question 1

1.1 – A brief description of the components of the floor plan and the motivation
behind it.

LAN: A local area network (LAN) is a group of computers and associated devices
that share a common communications line or wireless link to a server. Typically, a
LAN encompasses computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment.

Switch: It serves as a controller, enabling networked devices to talk to each other


efficiently. Through information sharing and resource allocation, switches save
businesses money and increase employee productivity.

Router: It is hardware device designed to receive, analyse and move incoming


packets to another network. It may also be used to convert the packets to another
network interface, drop them, and perform other actions relating to a network.

Server: It is a computer designed to process requests and deliver data to other


(client) computers over a local network or the internet.

Directory based network: It is a directory service that Microsoft developed for


Windows domain networks. It is included in most Windows Server operating systems
as a set of processes and services. Initially, Active Directory was only in charge of
centralized domain management. Starting with Windows Server 2008, however,
Active Directory became an umbrella title for a broad range of directory-based
identity-related services.

Wireless networking (Wireless Router): A wireless router is a device that performs


the functions of a router and also includes the functions of a wireless access point. It
is used to provide access to the Internet or a private computer network.
The draw above shows how the network diagram can fit on the Network Architecture.
1.2 – Produce a network diagram demonstrating the online gaming network.

1.3 – Network cabled specifications according to the diagram.

All the devices where configured by console cable

Crossover is something that crosses transmit and receive pairs of a cable. Like in
ethernet, or a serial cable (little more complicated!). In ethernet, pairs 1-2 cross with
3-6 on opposite ends of the cable crossing the TX/RX pairs. With a T1, it's 1-2 and
4-5 pairs.

The Implementations of Fast Ethernet

Fast Ethernet is defined for three different physical implementations:

100BASE-TX: Category 5

100BASE-FX: Multimode fiber

100BASE-T4: Category 3

Probably the most popular form of Fast Ethernet is 100BASE-TX. 100BASE-TX runs
on EIA/TIA 568 Category 5 unshielded twisted pair, sometimes called UTP-5. It uses
the same pair and pin configurations as 10Base-T, and is topologically similar in
running from a number of stations to a central hub.
As an upgrade to 10Mbps Ethernet over Multimode fiber (10Base-F), 100BASE-FX
is Fast Ethernet over fiber. Single duplex runs are supported up to 400m, and full
duplex runs are supported for up to 2km.

Fast Ethernet is possible on Category 3 UTP with 100BASE-T4. There is a popular


misconception that Fast Ethernet will only run on Category 5 cable. That is true only
for 100BASE-TX. If you have Category 3 cable with all four pairs (8 wires) connected
between station and hub, you can still use it for Fast Ethernet by running 100BASE-
T4. 100BASE-T4 sends 100Mbps over the relatively slow UTP-3 wire by fanning out
the signal to three pairs of wire. This “demultiplexing” slows down each byte enough
that the signal won’t overrun the cable. Category 3 cables have four pairs of wire,
eight wires total, running from point to point. 10Base-T only uses four wires, two
pairs. Some cables only have these two pairs connected in the RJ-45 plug. If the
category 3 cabling at your site has all four pairs between hub and workstation, you
can use Fast Ethernet by running 100BASE-T4.

1.4 – A brief description of how the networked tournament will work.

Dynamic tournament gaming method and system, including the provision of a


plurality of gaming terminals selectively interlinkable together with a host terminal so
that current players of the terminals desiring to participate in group tournament play
can be notified of the opportunity and provided with the choice to play or not. If a
current player chooses to play, he so signifies, enters his entry fee into the terminal,
and awaits start of the event. Upon start of the tournament by the host terminal, the
player will play the tournament game over and over as fast as possible to
accumulate as many points as possible during a particular pre-announced
tournament period. The host terminal will continuously monitor the terminals of all
play participants, dynamically record play status, and control termination of the game
period. It will also conduct an accounting of the results, issue win results notification,
and perhaps provide remote pay-out of game winnings.

The security features and network protocols applicable to this networked


tournament:

Create a network diagram. One of the most useful exercises for understanding
your library’s security situation is creating a network diagram. A network diagram
consists of symbols representing your hardware (PCs, servers, switches, routers,
printers, etc.) and the connections between them. The diagram should also include
some information about the model and configuration of each piece of hardware (e.g.,
name, IP address, function, etc.). For network connections, list the speed and
protocol of each link. For some examples, take a look at Rate My Network Diagram.
While you can map a small network with pencil and paper, it’s hard to extend and
update your diagram using this technique. Most network administrators employ
software to help them map their networks. We’ve listed some free and low-cost
options under Further Resources.
Understand your situation. A network diagram goes hand-in-hand with an
assessment and evaluation of everything that happens on your network. Who uses
your network? What types of hardware and software do they use? What kind of
Internet connection does your library have? Do you host your own Web site, your
own email server, your own OPAC? Do you allow patrons to connect to your network
with their own computers and peripheral devices? Is your staff network separated
from the public network? What types of security policies, procedures and equipment
do you already have in place?

Review your technology plan. Review this document, if available, to determine the
network services you’re currently providing and the plans for your network’s future.

Train your IT staff or hire a consultant. You must make sure that either your IT
staff receive appropriate training when it comes to network security or look for
outside IT support that can offer the necessary knowledge to secure your network.

Focus on protecting the high impact, high-risk areas of your network. For more
information, see Identifying Vulnerabilities and Risks on Your Network.
1.5 – Plan, design, and install the directory services.

The Infrastructure Planning and Design Guide for Active Directory Domain Services
include the following thirteen-step process:

Step 1: Determine the Number of Forests. This step involves determining whether
one or multiple forests are required to meet the organization’s objectives.

Step 2: Determine the Number of Domains. This step involves determining the
number of domains that are required to meet the organization’s objectives.

Step 3: Assign Domain Names. This step involves assigning names to each of the
domains.

Step 4: Select the Forest Root Domain. This step involves selecting the forest root
domain.

Step A1: Design the OU Structure. This step involves defining the OU structure for
each domain in the design.

Step B1: Determine Domain Controller Placement. This step involves deciding where
domain controller resources will be placed for each domain in each forest.

Step B2: Determine the Number of Domain Controllers. This step addresses how
many domain controllers to place in each location for each domain.

Step B3: Determine Global Catalogue Placement. This step involves deciding which
domain controllers in the forest will host global catalogue services.

Step B4: Determine Operations Master Role Placement. This step involves deciding
the placement of the operations master roles for the forest and each domain.

Step C1: Create the Site Design. This step involves examining each physical
location and deciding whether the location should be a new site within the directory
or should be associated to another site.

Step C2: Create the Site Link Design. This step involves defining links between all
sites through the use of one or more site links.

Step C3: Create the Site Link Bridge Design. This step involves creating the site link
bridge design.

Step D1: Determine Domain Controller Configuration. This step involves determining
the disk space, memory, processor, and the network requirements for each domain
controller.
Conclusion

We have briefly discussed in this assignment certain components that we used in the
network diagram and show how to install the online gaming tournament network and
then configuring the server, routers and roles displayed.

You might also like