Friday, May 10, 2019
LAN Essay Example | Topics and Well Written Essays - 2000 words
LAN - Essay ExampleThe justification of the selected computing devices and the communicate equipment is required. The second step includes the entanglement design. The design will clearly identify, floor connections, office connections, servers, workstations, printers, scanners and cable types. The trinity step is to implement a Wide Area Network (WAN) to connect other locations or cyberspace connectivity. 2 Network Pre requisites 2.1 First Floor The first floor includes Administration, Staff Office and the technical provide. The staff office will access the file server which is the Students notes distribution server for uploading notes. Students are facilitated at the very(prenominal) time for downloading the notes. The lecturers will connect their laptops with the radio receiver access points installed equipped with the new 802.11n technology. Since the requirement of high bandwidth multimedia system transmission is increasing, improving the (QoS) (Quality of service) is ess ential. A comprehensive illustration of Quality of run is unattached on network dictionary as Quality of Service (QoS) refers to the ability of a network to provide higher antecedence services, including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive relations), and improved loss characteristics, to selected network traffic over various WAN, LAN and MAN technologies..Keeping this in mind a new technology 8.2.11n is introduced by the IEEE (Kuo 2008). For keeping the network robust and efficient 802.11n protocol provides comprehensive support for voice and video services (Cai, Ling et al. 2009). These wireless access points are connected with a Cisco switch. For providing security, Virtual local rural area network (VLAN) is the best match for this scenario. The VLAN will split all domains for better administration, management and security. VLAN uses encryption techniques for transmitting data over the network. Access policy list is configured in the router for defining the routes. The router processes the data packets establish on parameters. Internet protocol and subnet is the composition of the router to handle the routes on the destination. The policy for lecturers is to access to the file server, printers and netmail server. In this way, data transmission from the educational domain is secured. No one can determine the wireless network because only lecturer Internet protocol pool is allowed to communicate. If anyone tries to access the wireless network from outside, he or she is prompted to enter the Wired Equivalent Privacy key (WEP). A good illustration of WEP is available in the network dictionary which says Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. WEP provides secur ity by an encryption algorithm. No one in the school can access the wireless network or the lecturers system. An additional Cisco switch installation has been proposed. Although one access point within a couch of approximately 200 feet is enough for connecting 253 laptops. The staff can access the printer on the network. The printer is dual-lane on the network and is visible at My network places in case of Microsoft operating systems. The requirement for the administrative staff is to access the email server,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.