Anda di halaman 1dari 15

1

Table of Contents
Abstract ........................................................................................................................................................ 2
1. Introduction ............................................................................................................................................. 3
2. Data and Network Communications within the ICT requirements ................................................. 4
3. Network Model for ICT .......................................................................................................................... 4
4. Data communication Instruments ........................................................................................................ 9
5. Networking ............................................................................................................................................ 10
6. Network Devices .................................................................................................................................. 13
7. Cost Estimation .................................................................................................................................... 14
8. Conclusion ............................................................................................................................................ 14
References ................................................................................................................................................ 14



2

ASSIGNMENT COVER SHEET (INDIVIDUAL)
ATMC GEELONG
Assignment has to be submitted online on Moodle and on or before the due date.
SUBJECT CODE:

ITECH 6502
SUBJECT TITLE:

Data Communication Management
ASSIGNMENT NUMBER
AND TITILE:

1
WORD COUNT (IF
APPLICABLE):

2500
DUE WEEK:

WEEK 11
LAB/TUTORIAL GROUP:

THU 9-11
LECTURER:

SHITIZ
TUTOR:

JANA POLGAR


STUDENT ID : 30115013
STUDENT FAMILY NAME: Appidi
STUDENT GIVEN NAMES: Ratnakar Reddy

I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied
from any other students work or from any other source except where due acknowledgement is made
explicitly in the text, nor has any part been written for me by another person. I realize that the penalties
may ensure for late submission or any other breaches of assignment rules.

3


Abstract
The present study deals about the ICT requirements which the Langdon primary school
has requested for and the study has given all the information about what the primary
school would need that is the network and ICT devices for proper internet access for the
school.

1. Introduction
The chosen scenario for the present study is Langdon primary school, the school was
built in the year 2012 and the school provides education for the students from Grade
prep to Grade 6. At the beginning the school has 140 students in 2012 now in 2014 they
have up to 640 students. The school has demanded for some of the ICT requirements
to provide the internet and desktop services to the staff and the students.
The following are the main ICT requirements needed by the school:
Enhance pedagogical practice concentrating on Literacy and Numeracy
Introduce 1-1 iPads from Prep-Year 3
Continue 1-1 netbooks for Years 4-6
Apps to embed ICT and Inquiry across all curriculum areas
Introduce Languages online
Embed the use of data collection and analysis to drive student learning

The above points were the ICT requirements needed for the school and also the school
needs the wireless services as well as the students from grade 4-6 have to write their
assignments and do project so wireless connection for their iPads is another major
requirement.
All the internet access will be provided from the Victorian Education department and a
proxy server which is installed in the school will share the data provided from the main
4

public server of the Victorian Education Department this type of internet access is
mainly provided so that the students or the staff may get safe and secure internet and
they will not be get exposed to pornographic websites.


2. Data and Network Communications within the ICT requirements
All the Post and the grade schools that needs to set up the Information and
Communication Technology in their school must arrange appropriately with a
percentage of the rules when proceeding onwards to further stages. These rules are
connected with the incorporation of the foundation needs of the ICT with the building
structure, the school powers must choose up on the expansions for the new ICT that
needs to be introduced. On account of officially existing school which needs ICT for
such should extend a broadening or repair task is given which is an adaptable down to
earth approach should be required, in such cases the experts will be able to point out
the issues with the Planning and Building Unit to begin the ICT outline. At that point
after complete examination the division of the Education and Science will at last see the
requisition and will endorse it if everything is correct (Abbott L., & Metcalfe N., 2004).

3. Network Model for ICT
For giving the internet access all through the school a legitimate system model must be
chosen and the system model is characterized as a database model which is viewed as
an adaptable method for distinguishing the items and their connections, the different
layers of the system model is that it is seen in a sort of chart where the item sorts are
spoken to as hubs and relationship sorts as bends (Abbott L., & Metcalfe N., 2004).
For the current scenario of Langdon Primary school the network model which has been
chosen is OSI model where the internet access can be provided through the seven
5

layers. This model has seemed to be very much appropriate for the present case so
OSI has been chosen as their network model.

The OSI, or Open System Interconnection, model characterizes a systems
administration structure to actualize conventions in seven layers. Control is passed
starting with one layer then onto the next, beginning at the provision layer in one station,
and undertaking to the bottom layer, over the channel to the following station and go
down the chain of command (Charles Kozierok M., 2005).

There's truly nothing to the OSI model. Actually, its not by any means substantial. The
OSI model doesn't do any capacities in the systems administration process; it is a
calculated system so we can better comprehend complex communications that are
going on. The OSI model takes the undertaking of internetworking and partitions that up
into what is alluded to as a vertical stack that comprises of the accompanying layers
(Charles Kozierok M., 2005):

6


Figure 1: OSI MODEL, Source: (Charles Kozierok M., 2005)

7


Figure 2: OSI Model Clear Illustration of All Seven Layers, Source: (Charles Kozierok
M., 2005)


Physical Layer 1: (Charles Kozierok M., 2005)
This layer passes on the bit stream - electrical drive, light or radio sign - through the
system at the electrical and mechanical level. It gives the fittings method for sending
and getting information on a transporter, including characterizing links, cards and
physical perspectives. Quick Ethernet, Rs232, and ATM are conventions with physical
layer parts.

8

Data link Layer 2: (Charles Kozierok M., 2005)
At this layer, information bundles are encoded and decoded into bits. It outfits
transmission convention learning and administration and handles mistakes in the
physical layer, stream control and edge synchronization. The information connection
layer is separated into two sub layers: The Media Access Control (MAC) layer and the
Logical Link Control (LLC) layer. The MAC sub layer controls how a machine on the
system gets access to the information and consent to transmit it. The LLC layer controls
outline synchronization, stream control and mistake checking.

Network Layer 3: (Charles Kozierok M., 2005)
This layer gives exchanging and directing advances, making sensible ways, known as
virtual circuits, for transmitting information from hub to hub. Steering and sending are
capacities of this layer, and additionally tending to, internetworking, lapse taking care of,
blockage control and parcel sequencing.

Transport Layer 4: (Charles Kozierok M., 2005)
This layer gives transparent exchange of information between end frameworks, or has,
and is in charge of end-to-end slip recuperation and stream control. It guarantees
complete information exchange.

Session Layer 5: (Charles Kozierok M., 2005)
This layer creates, oversees and ends associations between provisions. The session
layer sets up, directions, and ends discussions, trades, and dialogs between the
provisions at each one end. It manages session and association coordination.

Presentation Layer 6: (Charles Kozierok M., 2005)
9

This layer gives freedom from contrasts in information representation (e.g., encryption)
by making an interpretation of from requisition to system organization, and the other
way around. The presentation layer attempts to convert information into the structure
that the provision layer can acknowledge. This layer organizes and scrambles
information to be sent over a system, giving opportunity from similarity issues. It is
usually called as the linguistic use layer.

Application Layer (Layer 7) (Charles Kozierok M., 2005)
This layer helps provision and end-client forms. Correspondence accomplices are
recognized, nature of administration is distinguished, client confirmation and protection
are considered, and any stipulations on information linguistic use are recognized.
Everything at this layer is requisition particular. This layer gives requisition
administrations to document exchanges, email, and other system programming
administrations. Telnet and FTP are provisions that exist totally in the requisition level.
Layered provision architectures are a piece of this layer.

4. Data communication Instruments
As the Langdon needs sophisticated ICT technologies fiber optic cables are utilized for
the fast and easy delivery of the data and ADSL2+ modems are equipped for data
communication (William Stallings, 2006).
An optical fiber link is a link holding one or more optical strands that are utilized to
convey light. The optical fiber components are exclusively covered with plastic layers
and held in a defensive tube suitable for the earth where the link will be sent. Distinctive
sorts of link are utilized for diverse provisions, for instance long separation telecom, or
giving a fast information association between distinctive parts of a building (William
Stallings, 2006).

10


Optical fibers are extremely solid, yet the quality is radically decreased by unavoidable
microbial surface imperfections inborn in the assembling methodology. The starting fiber
quality, and in addition its change with time, must be viewed as in respect to the anxiety
forced on the fiber throughout taking care of, cabling, and establishment for a given set
of ecological conditions. There are three fundamental situations that can prompt quality
debasement and disappointment by instigating imperfection development: element
weakness, static uniform, and zero-anxiety maturing (William Stallings, 2006).


Figure 3: Optical cable, Source: (Charles Kozierok M., 2005)

5. Networking
For the best possible correspondence which needs to be accommodated all the rooms
of the showing staff, address corridors, library and managerial building of the school a
system framework must be given which comprises of the equipment and programming
supplies which will help in information correspondence and asset imparting. A system
typically comprises of transmission equipment, gadgets to interconnect the transmission
11

media and to direct the transmissions, and programming to recode and arrangement the
data and additionally to perceive and redress the issues (William Stallings, 2006).

The three types of networks which are used mostly are
LAN Local Area Network
WAN Wide Area Network
VPN Virtual Private Network

Local Area Network
Local area network are the majorly utilized sort of system, they were outlined as an
option for point-to-point associations which are really not that expensive. This network
mostly relies on upon the imparted media.

Wide Area Network
WAN is a kind of system which will have the capacity to associate numerous amounts of
locales for more remote separation, to numerous workstations. WAN system utilizes
parcel switches to convey the information successfully and with rapid information
exchanges.


Virtual Private Network
VPN is created for the most part for the openly available foundation, in the same way as
the web or people in general phone system. These utilize an encryption and have a
powerful client confirmation. Ordinarily a VPN is considered to be as a WAN. A VPN will
help the comparative intranet benefits as that of the conventional WAN, however it
12

likewise will help the remote access benefit also. This will be compelling for working
from home. In VPN the server will validate the client and will develop the flip side of the
tunnel. At that point the VPN programming will begin the information encryption and
bundles it into an IP parcel and will convey it through the tunnel, where it is
unscrambled at the flip side.
For Langdon Primary School the internet data is provided by the Victorian Education
Department where the web content is redirected to the school through the proxy server
so for the school LAN network has been chosen as this network covers the limited area
within the school.

Figure 4: LAN Model, Source: (Charles Kozierok M., 2005)


13

6. Network Devices
Router
A Router can be considered as the fittings gadget which unites two or more systems.
These are the considered to be as the spine gadget of the web, which join the different
system advances. Each individual switch will be appointed with two or more IP
addresses as every individual IP location comprises of a prefix that tags a physical
system. Prior to the parcel is gone to the steering programming, it is examined. In the
event that it is known to be debased then it is evacuated (William Stallings, 2006).


Firewall
A firewall might be a machine, switch, or few different specialized gadgets which
manages the data between the systems. It acts like a security and is referred to be as
the first-line safeguard which ensures from the ambushes of the outside world. A firewall
might be programming or equipment subordinate. The fittings subordinate firewall is a
specific switch which has an additional channel and administration capabilities. The
product subordinate firewall will work on top of the operation framework and will
transform the PC into the firewall (William Stallings, 2006).

Hypothetically, they might be considered as Network layer or Application layer. The
Network layer firewalls are fast and they control the activity basing on the area locations
and the source and port numbers from this information they will pick whether they have
to move ahead the information or uproot it. The provision layer firewalls won't
encourage straightforwardly between the systems. They are regularly the hosts running
the substitute servers. Substitute servers can apply the convention particular security as
they have the learning of the provision convention that is constantly used. In the present
situation for the school as the substitute server is constantly utilized from the Victorian
Education Department, so provision layer firewalls are utilized.
14


Wireless services can be provided through wireless ethernet services as the students of
the Langon primary School grade 4 to 6
th
have to do their assignment and projects and
they have been provided with the iPads as well by the government.





7. Cost Estimation
EQUIPMENT REQUIRED

TOTAL COST
ESTIMATED


Data Communication
Equipment

1000 $

Software and Security
Support Services

1500 $


8. Conclusion
The present study describes the Langdon primary school ICT requirements and every
detail of the networking and data communication equipment has been provided and
finally the network devices were also concentrated and the cost estimation was also
projected.
15

References

Abbott, L., Austin, R., & Metcalfe, N. (2004), The global classroom: advancing cultural
awareness in special schools through collaborative work using ICT. European
Journal, Special Needs Education, 19 (2) 225240.

Becta, (2005), Tablet PCs in schools. Case study report. Coventry: Available From
http://partners.becta.org.uk/index.php?section=rh&catcode=_re_rp_ap_03&rid=1127
9
Bush, D., & Meyer (2002), Some Internet Architectural Guidelines and Philosophy,
Internet Engineering Task Force.
Behrouz, A., & Forouzan, (2003) Data Communications and Networking.

Charles Kozierok, M. (2005) "The TCP/IP Guide", No Starch Press 2005.

McFarlane, A. & Sakellariou, S. (2002), The role of ICT in science education.
Cambridge Journal of Education,. 32 (2) 219232.

William Stallings, (2006) Data and Computer Communications, Prentice Hall,
ISBN 0-13-243310-9.

Anda mungkin juga menyukai