SYSTEM DEVELOPMENT LIFE CYCLE.
Network Reference Model Comparison of open systems interconnection and transport control
The diagram below describes the role of each layer my retail store.
This is the item in stock
It involves the pricing system
The diagram below shows:
HARDWARE AND SOFTWARE
Data item stored on computer cloud or hard
drive storage is retrieved
The pricing system software is used in
Computer drivers enables transmission of data
items on request from pricing system
Data cables, wireless are used here
Wi-Fi or network Reuters are used here.
Enables IP addresses of different computers to
The diagram below describes a data flow diagram:
OSI data flow diagram
Cashier number 2
Cashier number 1
TCP/IP data flow diagram
Impact on encapsulation
Encapsulation is the process of protecting data by depicting its essential features.
In these models, encapsulation is seen to have provided adequate response and service the ever
layer below and above it.
The comparison between the two network models give the utmost intention to use any of
these models depending on the functionality. Otherwise stated TCO/IP model comes out to be
the easiest and least complicated to use compared to OSI model.
Data administration is the process by which database administrators' use specified programs to
analyze, organize and provide data storage.
Roles of database administration.
1. Data Security
This is the primary role of database administration. Data security is the most crucial task of
database administration, protecting data from loss, corruption or any other interruption is the
main concern. This is done by auditing data flow activities.
2. Data recovery and Data backup
Database systems are prone to weaknesses, due to this data should be backed up in a cloud
storage system and in case anything malicious happens to the data, it can be easily recovered
from the backup systems.
3. Data storage and Management
This role is purposely available when accessing, receiving, sending and sharing of data. It is
required that data should be shared with the right audience and stored in the required files. This
will enable fast execution of data.
Privileges of database administration.
Database administration privileges are acquired when you (the user) is the data administrator.
Such privileges include:1. Perform database statements such as Start, drop and roll forward when executing data.
2. Make changes to objects, folders, and files irrespective of its origin or owner's discretion
3. Performs tasks such as drawing tables, creating views and adding indexes to be owned by
4. The database administrator can offer database privileges to other users.
RECOMMENDATIONS ON PERSONAL EXPERIENCE AND RESEARCH.
The story in question involves the major source of problems in many municipalities.
Communication is such a very important factor in any society. It delivers; sanity by clearing
doubts in the resident's hearts, acceptance of the current situation to the residents. A single lapse
in concrete information might compromise peace in a society. According to my personal
experience and research, the municipality in the story above should have strategized on the type
of network that would serve them efficiently and if not should at least cause a lesser evil. The
MAN (Metropolitan Area Network) was the best decision according to the area of coverage.
Although, this kind of network should be flourished with adequate resources during its
development stages. The management would have looked for ways to accumulate resources from
various department including reducing its budgeted cost for that financial year. This move would
have given them access to financial freedom in acquiring resources for this network. The
municipal directorate made a very non-strategic means of acquiring financial resources for
increasing parking and tickets offenses, instead they could have strategized on sponsorship from
resident companies with an exchange of future tax waivers.
On another recommendation; the network topology, architecture designs and public awareness
should have been factored into their strategy. This is explained below on the relevance of
network design considerations and how they can be affected.
RELEVANCE OF NETWORK DESIGN CONSIDERATIONS AND THEIR
Network topology and architecture
Network topology involves the interrelations and positioning of links and nodes of a
communication network between two or more parties. Its structure can only be determined by
your user needs and this can be either logically or physically. Its modification comes in terms of
links and nodes whereby the link is placed between two nodes which are the communicating
parties. In this case, the MAN will be viewed as a big LAN, therefore, the network topologies
that can be implemented include; ring, star, bus, and mesh.
The relevance of this consideration of a network is that;
It improves networking, this takes place when the path used by the data packet
is well specified by its capacity.
Network topology used determines the quality and type of medium used in
cabling of the network peripherals.
On a specified type of network that needs a classified security of its information
on networks of which there is a wide range of access methodologies on different
types of topologies.
Different network topologies have different cost levels of network cabling
Network architecture design.
This is a blueprint of a communication network which entails physical framework of components
and how they are organized in a network. This is a major concept in telecommunication. The
recommendations to be made in the problem in question on network architecture of the MAN
network is that each element of th...