Discuss About The Constrained Multiple Deployment In Wireless?
There are different factors which must be taken into consideration before designing the major needs such as the host placement and the topology. The most important factor is a well established network. An established network is needed before designing the needs. Apart from the topology and the host placement along the network, the software technologies and the hardware installment procedures along with threat less configuration of the every single component of the device (Lin, King & Chen, 2010). This paper will be going through a detailed discussion of the important steps that are designed to secure the LAN i.e. Local Area Network along with few of the major practices that are needed to be done and the paper will also discuss about how a LAN is secured considering the major areas that are related to the configuration of the network. The network configuration mainly consists of the logical and the physical design, the configuration of the switches and the routers that prolifically connect the hosts along with the segments that are needed to create the network.
A Local Area Network is basically designed to set up an enterprise or any business. Thus to configure the network the procedure is a major challenge. Sometimes all the networks are not exactly the same and that leads to a big issue while configuring a network by the designer the following aspects should be taken into consideration.
Companies need a network which can meet the requirements that is ever evolving. A business when starts, it has only some personal computers connected between with each other and the major reason for this is to share and exchange the data among themselves. With passing days new devices such as printers, servers and computers etc are added along with new employees on a large basis to the network (Schiller, 1999). Joining the new devices to each other is responsible for increasing the traffic in network. So the enterprises are substituting all the telephone connections in order to avoid the network traffic and set up a well designed LAN system.
The end users of the procurement department of an office building are prolifically designated with reference along the function of the job as they need same opportunity of accessing the application and also the resources beneath the building whereas all the departments like the sales, finance and other department are located on other respective floors. Every department consists of different number of users and different applications need various accesses and resources that are present via network.
If the finance users on the same building are using same network application then that is used to exchange the data within the definite server of the network by discovering the users that are adjacent to the data stores, servers that are involved because of the interactions and it can be reduced by the impact of the network and its traffic.
With the network traffic analyzing, one has to prolifically apprise the major servers and data stores that are situated in order to determine the traffic of the network (Too, 1997). Data storage devices can also be used as servers or tape backup units basically most of the amounts of data are stored. Taking the fact into consideration the traffic, the users of department of sales are building same methods as well implement the network configuration.
The topology diagram helps to identify every single port of the switch that is basically cast off for the communication of the inter switch and the disposable paths that can be in middle of the access switches of the layer and the distribution switches. The diagram prolifically shows different types of end user coterie that are situated within the network and the data stores location and servers (Wong, Yin & Lee, 2011).
The minimum hardware requirements that are necessary to design the LAN are
A 24-port switch
Workstation for the departments with individual account
Backup (RAID SYTSTEM)
Connecting cables
File server NIC
A Network Printer
Cooling Fan
ADSL Modem
Cabinet
The required software includes
Windows 7 operating system
Device drivers
Program compilers
Windows server 2008
Internet explorer
Microsoft office
PDF reader
7-Zip
Imaging software
IP address of Procurement department ->> 75.18.180.0 – 75.18.180.5
IP address of Finance department ->> 75.18.180.6 – 75.18.180.8
IP address of Sales department ->> 75.18.180.0 – 75.18.180.4
IP address of Retail department ->> 75.18.180.0 – 75.18.180.4
IP address of IT project department ->> 75.18.180.0 – 75.18.180.4
To enable remote installation of the Agent,
VLANs form a critical part with coverage sources of network. The voice traffic can be prolifically used for supporting the bandwidth for improving the security. So, the layer access switches mostly allow the major setting of the VLANs devices of any network. VLAN is then implemented with the allotment layer to get all the data forms of the switches rather than forwarding it to the layer switches (Schiller, 1999). The layer for distribution basically helps the inter-VLAN function of routing by which easy communication can be done via the same network.
Access layer switches are PoE which increases the switch product line that is needed to use for voice convergence over a wireless access point but it is difficult to run the power on the location desired. It also requires link aggregation that helps to operate multiple links with high bandwidth.
Distribution layer helps the core layer to switch from the platform to perform any task. It also supports link aggregation (Bayraktaroglu et al., 2011). It has high processing capabilities than the access layer and it ensure adequate bandwidth to accommodate the network traffic and also can provide for fault tolerance.
The fundamental requirement needs to link aggregation support as well for ensuring the adequate handling of the frequency switches that comes from the distribution layer as the network traffic. Core layer can support an aggregate of 10 GB of Ethernet connections to fastest connectivity open in Ethernet (Beasley, 2009). Core layer rate of forwarding is mainly depending on the amount of devices taking part in the network.
Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., & Thapa, B. (2011). Performance of IEEE 802.11 under Jamming. Mobile Networks And Applications, 18(5), 678-696. doi:10.1007/s11036-011-0340-4
Beasley, J. (2009). Networking. Upper Saddle River, NJ: Prentice Hall.
Chandra, P. (2008). Wireless networking. Amsterdam: Elsevier/Newnes.
Cook, J. (2003). Networking. Rochester, MN: IBM International Technical Support Organization.
Lin, C., King, C., & Chen, T. (2010). Constrained multiple deployment problem in wireless sensor networks with guaranteed lifetimes. Wireless Netw, 17(2), 385-396. doi:10.1007/s11276-010-0286-7
Schiller, D. (1999). Digital capitalism. Cambridge, Mass.: MIT Press.
Too, L. (1997). Networking. Shaftesbury, Dorset: Element.
Wong, P., Yin, D., & Lee, T. (2011). Performance analysis of Markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling.Wireless Netw, 17(8), 1763-1774. doi:10.1007/s11276-011-0376-1
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more