Wednesday, June 19, 2019
LAN Essay Example | Topics and Well Written Essays - 2000 words
local scene of action network - Essay ExampleThe justification of the selected computing devices and the network equipment is required. The second step includes the network design. The design will clearly identify, floor connections, postal service connections, servers, workstations, printers, scanners and cable types. The third step is to implement a Wide Area Network (WAN) to connect other locations or Internet connectivity. 2 Network Pre requisites 2.1 firstborn Floor The first floor includes Administration, Staff Office and the technical staff. The staff office will access the file server which is the Students notes distribution server for uploading notes. Students atomic number 18 facilitated at the same time for downloading the notes. The lecturers will connect their laptops with the piano tuner access points installed equipped with the new 802.11n technology. Since the requirement of high bandwidth multimedia transmission is increasing, improving the (QoS) (Quality of se rvice) is essential. A comprehensive illustration of Quality of services is available on network dictionary as Quality of Service (QoS) refers to the ability of a network to stomach higher priority services, including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics, to selected network traffic over various WAN, LAN and MAN technologies..Keeping this in mind a new technology 8.2.11n is introduced by the IEEE (Kuo 2008). For keeping the network robust and efficient 802.11n protocol provides comprehensive support for illustration and video services (Cai, Ling et al. 2009). These wireless access points are connected with a Cisco switch. For providing security, Virtual local area network (VLAN) is the best get together for this scenario. The VLAN will split all domains for better administration, management and security. VLAN uses encryption techniques for transmitting data over the network. Acc ess policy list is configured in the router for delimit the routes. The router processes the data packets based on parameters. Internet protocol and subnet is the composition of the router to handle the routes on the destination. The policy for lecturers is to access to the file server, printers and email server. In this way, data transmission from the educational domain is secured. No unitary can determine the wireless network because only lecturer Internet protocol pool is allowed to communicate. If anyone tries to access the wireless network from outside, he or she is prompted to enter the Wired Equivalent Privacy key (WEP). A good illustration of WEP is available in the network dictionary which says Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. WE P provides security by an encryption algorithm. No one in the school can access the wireless network or the lecturers system. An additional Cisco switch installation has been proposed. Although one access point in spite of appearance a range of approximately 200 feet is enough for connecting 253 laptops. The staff can access the printer on the network. The printer is shared on the network and is palpable at My network places in case of Microsoft operating systems. The requirement for the administrative staff is to access the email server,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.