Constrained Multiple Deployment In Wireless

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Question:

Discuss About The Constrained Multiple Deployment In Wireless?

 

Answer:

Introducation

There are different factors which must be taken into consideration before designing the major needs such as the host placement and the topology. The most important factor is a well established network. An established network is needed before designing the needs.  Apart from the topology and the host placement along the network, the software technologies and the hardware installment procedures along with threat less configuration of the every single component of the device (Lin, King & Chen, 2010). This paper will be going through a detailed discussion of the important steps that are designed to secure the LAN i.e. Local Area Network along with few of the major practices that are needed to be done and the paper will also discuss about how a LAN is secured considering the major areas that are related to the configuration of the network. The network configuration mainly consists of the logical and the physical design, the configuration of the switches and the routers that prolifically connect the hosts along with the segments that are needed to create the network.

Primary Challenges and Assumptions

A Local Area Network is basically designed to set up an enterprise or any business. Thus to configure the network the procedure is a major challenge. Sometimes all the networks are not exactly the same and that leads to a big issue while configuring a network by the designer the following aspects should be taken into consideration.

  • The network must be prolifically secured from the attacks launched from other internet.
  • DNS server along with the mail server and Internet facing must be secured.
  • Containing any type of damage from compromised systems and taking steps to prevent any type of attacks launching.
  • Customer databases, trade secrets etc are important and sensitive resources of the network and must be secured.
  • The structure of the network managers must be build to securely manage the network.
  • Providing systems to detect and login facility

Need for LAN

Companies need a network which can meet the requirements that is ever evolving. A business when starts, it has only some personal computers connected between with each other and the major reason for this is to share and exchange the data among themselves. With passing days new devices such as printers, servers and computers etc are added along with new employees on a large basis to the network (Schiller, 1999). Joining the new devices to each other is responsible for increasing the traffic in network. So the enterprises are substituting all the telephone connections in order to avoid the network traffic and set up a well designed LAN system.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

LAN in Procurement Department

The end users of the procurement department of an office building are prolifically designated with reference along the function of the job as they need same opportunity of accessing the application and also the resources beneath the building whereas all the departments like the sales, finance and other department are located on other respective floors. Every department consists of different number of users and different applications need various accesses and resources that are present via network.

LAN in Finance Department

If the finance users on the same building are using same network application then that is used to exchange the data within the definite server of the network by discovering the users that are adjacent to the data stores, servers that are involved because of the interactions and it can be reduced by the impact of the network and its traffic.

 

LAN in Sales Department

With the network traffic analyzing, one has to prolifically apprise the major servers and data stores that are situated in order to determine the traffic of the network (Too, 1997). Data storage devices can also be used as servers or tape backup units basically most of the amounts of data are stored. Taking the fact into consideration the traffic, the users of department of sales are building same methods as well implement the network configuration.

The topology diagram helps to identify every single port of the switch that is basically cast off for the communication of the inter switch and the disposable paths that can be in middle of the access switches of the layer and the distribution switches. The diagram prolifically shows different types of end user coterie that are situated within the network and the data stores location and servers (Wong, Yin & Lee, 2011).                                   

The minimum hardware requirements that are necessary to design the LAN are

A 24-port switch

Workstation for the departments with individual account

Backup (RAID SYTSTEM)

Connecting cables

 File server NIC

A Network Printer

Cooling Fan

ADSL Modem

Cabinet

The required software includes

Windows 7 operating system

Device drivers

Program compilers

Windows server 2008

Internet explorer

Microsoft office

PDF reader

7-Zip

Imaging software

Task 1b

IP address of Procurement department ->> 75.18.180.0 – 75.18.180.5

IP address of Finance department ->> 75.18.180.6 – 75.18.180.8

IP address of Sales department ->> 75.18.180.0 – 75.18.180.4

IP address of Retail department ->> 75.18.180.0 – 75.18.180.4

IP address of IT project department ->> 75.18.180.0 – 75.18.180.4

To Configure Ports on Agent Computer

To enable remote installation of the Agent,

  • 135: It is basically use for remote application
  • 139 & 445: It is basically used to enable the files and printers sharing.

To Configure Ports on Server Computer

  • 8020: IT is used for the communication of agent-server and for the access of the Web Console
  • 8383: It is used for the securing the communication in between the Desktop Central Server
  • 8443: It is basically used with secured communication for the feature of remote control
  • 8031: It is basically used for file transfer in a mode that is secured basically when a remote computer is being used by a remote control
  • 8032: basically used for transfer of files using remote control from a remote computer
  • 8027: mostly used for the completion of the tasks that are on-demand like remote control, remote shutdown, inventory scanning etc.

To Configure Ports on Distribution Server Device

  • 8021: Mostly used for the purpose of communication in between the distribution server and agents in Remote offices
  • 8384: mostly used for the secured communication between the distribution server and the gents in Remote offices

Configuration of desktops, laptops, and servers

VLANs form a critical part with coverage sources of network. The voice traffic can be prolifically used for supporting the bandwidth for improving the security. So, the layer access switches mostly allow the major setting of the VLANs devices of any network. VLAN is then implemented with the allotment layer to get all the data forms of the switches rather than forwarding it to the layer switches (Schiller, 1999). The layer for distribution basically helps the inter-VLAN function of routing by which easy communication can be done via the same network.

Access layer switches are PoE which increases the switch product line that is needed to use for voice convergence over a wireless access point but it is difficult to run the power on the location desired. It also requires link aggregation that helps to operate multiple links with high bandwidth.

Distribution layer helps the core layer to switch from the platform to perform any task. It also supports link aggregation (Bayraktaroglu et al., 2011). It has high processing capabilities than the access layer and it ensure adequate bandwidth to accommodate the network traffic and also can provide for fault tolerance.

The fundamental requirement needs to link aggregation support as well for ensuring the adequate handling of the frequency switches that comes from the distribution layer as the network traffic. Core layer can support an aggregate of 10 GB of Ethernet connections to fastest connectivity open in Ethernet (Beasley, 2009). Core layer rate of forwarding is mainly depending on the amount of devices taking part in the network.

 

References

Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., & Thapa, B. (2011). Performance of IEEE 802.11 under Jamming. Mobile Networks And Applications, 18(5), 678-696. doi:10.1007/s11036-011-0340-4

Beasley, J. (2009). Networking. Upper Saddle River, NJ: Prentice Hall.

Chandra, P. (2008). Wireless networking. Amsterdam: Elsevier/Newnes.

Cook, J. (2003). Networking. Rochester, MN: IBM International Technical Support Organization.

Lin, C., King, C., & Chen, T. (2010). Constrained multiple deployment problem in wireless sensor networks with guaranteed lifetimes. Wireless Netw, 17(2), 385-396. doi:10.1007/s11276-010-0286-7

Schiller, D. (1999). Digital capitalism. Cambridge, Mass.: MIT Press.

Too, L. (1997). Networking. Shaftesbury, Dorset: Element.

Wong, P., Yin, D., & Lee, T. (2011). Performance analysis of Markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling.Wireless Netw, 17(8), 1763-1774. doi:10.1007/s11276-011-0376-1

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Online Class Help Services Available from $100 to $150 Weekly We Handle Everything