Tuesday, May 5, 2020
Constrained Multiple Deployment In Wireless -Myassignmenthelp.Com
Question: Discuss About The Constrained Multiple Deployment In Wireless? Answer: Introducation There are different factors which must be taken into consideration before designing the major needs such as the host placement and the topology. The most important factor is a well established network. An established network is needed before designing the needs. Apart from the topology and the host placement along the network, the software technologies and the hardware installment procedures along with threat less configuration of the every single component of the device (Lin, King Chen, 2010). This paper will be going through a detailed discussion of the important steps that are designed to secure the LAN i.e. Local Area Network along with few of the major practices that are needed to be done and the paper will also discuss about how a LAN is secured considering the major areas that are related to the configuration of the network. The network configuration mainly consists of the logical and the physical design, the configuration of the switches and the routers that prolifically con nect the hosts along with the segments that are needed to create the network. Primary Challenges and Assumptions A Local Area Network is basically designed to set up an enterprise or any business. Thus to configure the network the procedure is a major challenge. Sometimes all the networks are not exactly the same and that leads to a big issue while configuring a network by the designer the following aspects should be taken into consideration. The network must be prolifically secured from the attacks launched from other internet. DNS server along with the mail server and Internet facing must be secured. Containing any type of damage from compromised systems and taking steps to prevent any type of attacks launching. Customer databases, trade secrets etc are important and sensitive resources of the network and must be secured. The structure of the network managers must be build to securely manage the network. Providing systems to detect and login facility Need for LAN Companies need a network which can meet the requirements that is ever evolving. A business when starts, it has only some personal computers connected between with each other and the major reason for this is to share and exchange the data among themselves. With passing days new devices such as printers, servers and computers etc are added along with new employees on a large basis to the network (Schiller, 1999). Joining the new devices to each other is responsible for increasing the traffic in network. So the enterprises are substituting all the telephone connections in order to avoid the network traffic and set up a well designed LAN system. LAN in Procurement Department The end users of the procurement department of an office building are prolifically designated with reference along the function of the job as they need same opportunity of accessing the application and also the resources beneath the building whereas all the departments like the sales, finance and other department are located on other respective floors. Every department consists of different number of users and different applications need various accesses and resources that are present via network. LAN in Finance Department If the finance users on the same building are using same network application then that is used to exchange the data within the definite server of the network by discovering the users that are adjacent to the data stores, servers that are involved because of the interactions and it can be reduced by the impact of the network and its traffic. LAN in Sales Department With the network traffic analyzing, one has to prolifically apprise the major servers and data stores that are situated in order to determine the traffic of the network (Too, 1997). Data storage devices can also be used as servers or tape backup units basically most of the amounts of data are stored. Taking the fact into consideration the traffic, the users of department of sales are building same methods as well implement the network configuration. The topology diagram helps to identify every single port of the switch that is basically cast off for the communication of the inter switch and the disposable paths that can be in middle of the access switches of the layer and the distribution switches. The diagram prolifically shows different types of end user coterie that are situated within the network and the data stores location and servers (Wong, Yin Lee, 2011). The minimum hardware requirements that are necessary to design the LAN are A 24-port switch Workstation for the departments with individual account Backup (RAID SYTSTEM) Connecting cables File serverNIC A Network Printer Cooling Fan ADSL Modem Cabinet The required software includes Windows 7 operating system Device drivers Program compilers Windows server 2008 Internet explorer Microsoft office PDF reader 7-Zip Imaging software Task 1b IP address of Procurement department - 75.18.180.0 - 75.18.180.5 IP address of Finance department - 75.18.180.6 - 75.18.180.8 IP address of Sales department - 75.18.180.0 - 75.18.180.4 IP address of Retail department - 75.18.180.0 - 75.18.180.4 IP address of IT project department - 75.18.180.0 - 75.18.180.4 To Configure Ports on Agent Computer To enable remote installation of the Agent, 135: It is basically use for remote application 139 445: It is basically used to enable the files and printers sharing. To Configure Ports on Server Computer 8020: IT is used for the communication of agent-server and for the access of the Web Console 8383: It is used for the securing the communication in between the Desktop Central Server 8443: It is basically used with secured communication for the feature of remote control 8031: It is basically used for file transfer in a mode that is secured basically when a remote computer is being used by a remote control 8032: basically used for transfer of files using remote control from a remote computer 8027: mostly used for the completion of the tasks that are on-demand like remote control, remote shutdown, inventory scanning etc. To Configure Ports on Distribution Server Device 8021: Mostly used for the purpose of communication in between the distribution server and agents in Remote offices 8384: mostly used for the secured communication between the distribution server and the gents in Remote offices Configuration of desktops, laptops, and servers VLANs form a critical part with coverage sources of network. The voice traffic can be prolifically used for supporting the bandwidth for improving the security. So, the layer access switches mostly allow the major setting of the VLANs devices of any network. VLAN is then implemented with the allotment layer to get all the data forms of the switches rather than forwarding it to the layer switches (Schiller, 1999). The layer for distribution basically helps the inter-VLAN function of routing by which easy communication can be done via the same network. Access layer switches are PoE which increases the switch product line that is needed to use for voice convergence over a wireless access point but it is difficult to run the power on the location desired. It also requires link aggregation that helps to operate multiple links with high bandwidth. Distribution layer helps the core layer to switch from the platform to perform any task. It also supports link aggregation (Bayraktaroglu et al., 2011). It has high processing capabilities than the access layer and it ensure adequate bandwidth to accommodate the network traffic and also can provide for fault tolerance. The fundamental requirement needs to link aggregation support as well for ensuring the adequate handling of the frequency switches that comes from the distribution layer as the network traffic. Core layer can support an aggregate of 10 GB of Ethernet connections to fastest connectivity open in Ethernet (Beasley, 2009). Core layer rate of forwarding is mainly depending on the amount of devices taking part in the network. References Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B. (2011). Performance of IEEE 802.11 under Jamming.Mobile Networks And Applications,18(5), 678-696. doi:10.1007/s11036-011-0340-4 Beasley, J. (2009).Networking. Upper Saddle River, NJ: Prentice Hall. Chandra, P. (2008).Wireless networking. Amsterdam: Elsevier/Newnes. Cook, J. (2003).Networking. Rochester, MN: IBM International Technical Support Organization. Lin, C., King, C., Chen, T. (2010). Constrained multiple deployment problem in wireless sensor networks with guaranteed lifetimes.Wireless Netw,17(2), 385-396. doi:10.1007/s11276-010-0286-7 Schiller, D. (1999).Digital capitalism. Cambridge, Mass.: MIT Press. Too, L. (1997).Networking. Shaftesbury, Dorset: Element. Wong, P., Yin, D., Lee, T. (2011). Performance analysis of Markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling.Wireless Netw,17(8), 1763-1774. doi:10.1007/s11276-011-0376-1
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.