There are 20 or more computers for every computer laboratories. So we don’t need to buy more. Network Equipment: The most commonly used cable is RIG-45. A hub is a rectangular box that used as the central object on which computers and other devices are connected. A router is another type of device that acts as the central point among computers and other devices that are part of a network. A network card / LANA Card, or a network adapter, also called a network interface card, or NICE, allows a computer to connect to the exterior.
A network switch is a computer outworking device that connects devices together on a computer network, by using a form of packet switching to forward data to the destination device. An uninterruptible power supply / uninterruptible power source or UPS, is an electrical apparatus that provides emergency power to a load when the input power source, typically mains power, fails. ISP: An internet service provider (ISP) is a company that serves as the intermediary between your network (or you) and the internet. We will use PLOT as ISP at 8. 5 MBps. Firewall: A firewall is a security measures that consists of protecting your network from intruders.
This is primarily important if you plan to connect your network to the firewall distribution, based on the Freebased operating system with a custom kernel including third party free software packages for additional functionality. Topology: Star Network is one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computers, which act as a conduit to transmit messages. This consists of a central node, to which all other nodes are connected; this central node provides a common connection point for all odes through a hub.
In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch. Human Resource Proposed IT Team: Chief of Network – Mr.. Royce Freeman Chief of Hardware Technician – Mr.. Clark Peter Chief of Software Technician – Mr.. George Burke Coordination – Mrs.. Janet C. Fernando Allan Portland – Assistant Software Technician Flow of Information Figure 1 As you can see at the figure 1, 5 computer laboratories and that is the position of the computer rooms in Thomas Claudio Memorial College.
At the left side most is the server room where all other rooms should be networked and all of the information Access to Information The one who can access the information is the administrators only, they’re the one who are allowed to use the computer servers, and they’re the only one who know what are the passwords for every access point. Computer laboratory 1 – 4 cannot access all of the information on the server if they logged in as “guest”. But of course it is networked so if the user know the password and logged in as “administrator” they can access everything where ever room they are.