Sunday, November 3, 2019
LAN Essay Example | Topics and Well Written Essays - 2000 words
LAN - Essay Example The justification of the selected computing devices and the network equipment is required. The second step includes the network design. The design will clearly identify, floor connections, office connections, servers, workstations, printers, scanners and cable types. The third step is to implement a Wide Area Network (WAN) to connect other locations or Internet connectivity. 2 Network Pre requisites 2.1 First Floor The first floor includes Administration, Staff Office and the technical staff. The staff office will access the file server which is the ââ¬ËStudents notes distribution serverââ¬â¢ for uploading notes. Students are facilitated at the same time for downloading the notes. The lecturers will connect their laptops with the wireless access points installed equipped with the new 802.11n technology. Since the requirement of high bandwidth multimedia transmission is increasing, improving the (QoS) (Quality of service) is essential. A comprehensive illustration of Quality of services is available on network dictionary as ââ¬Å"Quality of Service (QoS) refers to the ability of a network to provide higher priority services, including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics, to selected network traffic over various WAN, LAN and MAN technologies.â⬠.Keeping this in mind a new technology 8.2.11n is introduced by the IEEE (Kuo 2008). For keeping the network robust and efficient 802.11n protocol provides comprehensive support for voice and video services (Cai, Ling et al. 2009). These wireless access points are connected with a Cisco switch. For providing security, Virtual local area network (VLAN) is the best match for this scenario. The VLAN will split all domains for better administration, management and security. VLAN uses encryption techniques for transmitting data over the network. Access policy list is configured in the router for defining the rou tes. The router processes the data packets based on parameters. Internet protocol and subnet is the composition of the router to handle the routes on the destination. The policy for lecturers is to access to the file server, printers and email server. In this way, data transmission from the educational domain is secured. No one can determine the wireless network because only lecturer Internet protocol pool is allowed to communicate. If anyone tries to access the wireless network from outside, he or she is prompted to enter the Wired Equivalent Privacy key (WEP). A good illustration of WEP is available in the network dictionary which says â⬠Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.â⬠WEP provides security by an encryption algorithm. No one in the school can access the wireless network or the lecturers system. An additional Cisco switch installation has been proposed. Although one access point within a range of approximately 200 feet is enough for connecting 253 laptops. The staff can access the printer on the network. The printer is shared on the network and is visible at ââ¬Å"My network placesâ⬠in case of Microsoft operating systems. The requirement for the administrative staff is to access the email server,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.