introduction - abcassignmenthelp.com€¦ · web viewthe computer network is considered as the...
TRANSCRIPT
NETWORKING TECHNOLOGY
Page 1 of 15
IntroductionThe computer network is considered as the telecommunications network that allows the
different nodes in order to share the different resources. In the computer networks, the
different network computing devices exchange the set of data with the other networks
by using the data links. According to Felemban (2013), the proper connection in
between the nodes can be established by using the wireless media or by the cable
media. The devices that are mainly responsible for the route and terminate the set of
data are known as the nodes. They can include the different hosts such as the personal
computers along with the servers and the cell phones. The two devices can be said that
they are networked together when both the devices are capable of transferring the files
to each other. Along with that, the computer networks are able to support an ample
amount of applications and different kind of services such as the access to the WWW
(World Wide Web), printers, shared digital audio and video along with the different
storage servers (Fukuyama and Weber, 2013).
In this particular study, the Beta Communication Ltd has decided to shift in the LAN
networks. The main aim of this particular study is to evaluate the importance of the LAN
technology and find out the proper ways through which they can implement the system
to their account. Therefore, they need to understand the different pros and cons of the
technology. Along with that, the management also needs to understand the fact that
how much effects the shifting should be for them. The organization need to have a set
of skilled employees who can handle the system. Along with that, the study also defines
the role of the hardware and the software that needs to be used in order to set up the
new network for Beta Communication Ltd. Moreover, the study also provides a brief
description regarding the different type of servers that might be suitable for Beta
Communication Ltd and the analysis of those selections.
Task 1
1.1 Advantage and limitations of the different networking system types and topologiesThe organization Beta Communication Ltd tends to shift from the traditional process of
data sharing to the LAN technology in order to share the resources properly. Therefore,
the organization at first need to understand the fact that what are the suitable
networking types they can afford and from that list which type would be better for them
in order to maintain the proper functionality throughout the network. The different types
of networking systems that can be used are LAN, MAN, WAN, SAN, WLAN, PAN. Each
of the systems has their own advantage and disadvantages (Gupta, 2016). These are
described below.
Local Area Network
LAN stands for Local Rea Network that mainly connects the different nodes and the
other devices that are present within office premises or an office building.
Figure 1: LAN connection
(Source: Wang et al. 2014)
Advantage: There is an ample amount of advantage of the LAN. One of them is the
resource sharing. The different resources such as the printers along with the modems
can easily be shared by using the LAN technology. According to Wang et al. (2014), this
reduces the cost regarding the hardware. In addition to that, it can also share the
different software applications. Along with that, it also provides an easy and cheap
communication for Beta Communication Ltd so that they can manage their activities
properly. Moreover, it also facilitates the security features and uses the centralized set
of data so that the other workstations are able to access the set of data.
Disadvantage: The initial set up cost for the LAN system is very much high. Therefore,
Beta Communication Ltd needs to think before the implementation of the system. Along
with that, it can also be a threat to the privacy of the data sets as every user has the
accessibility to the data sets. Along with that, if Beta Communication Ltd someday has
to expand their area, then it would be tough for the management to summarize
everything by implementing the LAN technology.
Metropolitan Area Network
MAN is the amalgamation of a number of small LANs that are linked together by using
the high bandwidth technology such as the fibre-optic cable.
Figure 2: MAN architecture
(Source: Channegowda et al. 2013)
Advantage: Bandwidth is considered as the biggest advantage for MANs. It enhances
the access speed of the different resources that are shared across via the network. In
addition to that, according to Channegowda et al. (2013), it also provides a high level of
security to the organizations who deal with a large amount of data and have different
branches all over the city.
Disadvantage: Cost is a disadvantageous factor for MANs. As a small
telecommunications organization it would be tough for Beta Communication Ltd to
implement the MAN.
Wide Area Network
The Wide Area Networks are mainly considered as the large communication networks
that are able to connect the locations over a large geographical area such as the cities,
countries along with continents. WANS have a great amount of resemblance with LANs;
however, they are structured differently.
Advantage: WAN mainly use centralize IT infrastructure that mainly eliminates the
buying of the email servers. They only need to set up the head data centre from where
the authorized users can have the proper accessibility. Moreover, it also enhances the
privacy of the network and the bandwidth of the overall network. Along with that, it also
eliminates the need of the ISDN. In addition to that, it cuts the costs and enhances the
profits for the organizations.
Disadvantage: The set up of WANs are very much complicated, therefore they are very
much expensive to set up. Along with that, there are ample amounts of security issues
regarding the network. Moreover, the maintenance of the network is also very much
complex for the organizations.
Storage Area Network
It is a kind of network that provides a proper access to the different block-level data
storage. This is mainly used in order to enhance the different storage devices such as
the different disk arrays to the operating systems as the locally integrated device.
Advantage: SAN mainly allows the user to store the set of information and dynamically
allocate the exact requirement that they had. Therefore, it requires a minimum amount
of time to be spent on the drive for the servers and make an ample amount of space for
enhancing the efficiency (Zaman and Kildal, 2014).
Disadvantage: Redundancy and the price are the two main drawbacks for the SAN.
Wireless Local Area Network
WLAN is the kind of local area network that mainly uses the radio waves as the
transmission medium.
Advantage: In this technology, it is simpler to add or move workstations. Along with
that, it is also easier to provide a proper connectivity in the different areas where the
laying of cables is difficult. In addition to that, according to Ellison et al. (2015), the
proper access to the network can be done from any place that is within the range of the
access point.
Disadvantage: Security is the most difficult part that requires no proper configuration.
Along with that, with the proper change of the standards, it would be necessary to
replace the access points.
Private Area Network
A personal area network is considered as the computer network that is mainly used for
the data transmission in between the devices such as the tablets and the telephones.
The wireless PAN is a low powered network that is mainly carried over a short distance
wireless technology (Rafique et al. 2014).
Advantage: the main advantage of this network is the security. For the safety purpose,
Bluetooth can be used for the file sharing.
Disadvantage: The data rate of the network is very much less than the other networks.
Along with that, the range is another issue regarding the network.
When it comes to the network topology, Beta Communication Ltd need to select the
proper topology based on the different aspects of them. The organization need to
understand the areas in which they need to enhance their expertise and based on that
they need to select the proper topology for them. The different type of network
topologies is: Star topology, Mesh topology, Ring topology, Bus topology, Tree
topology, Hybrid topology.
Star topology
The star topology is mainly designed with the nodes that are connected directly to the
central device that is mainly known as the network switch. Therefore, Beta
Communication Ltd can easily use the star topology into their account as the LAN
technology mainly works with that. It is very much easy to install and detect the different
faults (Gringeri et al. 2013). However, it requires an ample amount of cabling and much
more expensive than the bus topology.
Figure 3: Star Topology
(Source: Gringeri et al. 2013)
Mesh topology
Mesh topology is the kind of topology that mainly uses its nodes in order to transmit the
data to the different networks. A broken node would not distract the data transmission. It
is considered as the best advantage for this topology. Along with that, this topology can
also add much more nodes to the topology; however, it would not affect the network
connectivity. In addition to that, this topology is also able to handle the heavy network
traffic load. On the other hand, the maintenance is very tough for the employees of Beta
Communication Ltd. Along with that, the management also needs to use the different
devices.
Ring topology
In this particular topology, all the nodes are connected to each other in such a way that
it looks like a closed loop. This topology mainly sends and receives the data set by the
help of the Token ring. The main advantage of this topology is the fact that if the data
load increases, it does not hamper the performance of the topology. Along with that, it
does not require a network server in order to control the network connectivity (Sezer et
al. 2013). However, in contrast, if a particular node fails, then the entire network would
be affected. Along with that, the speed of this topology is less than the star topology.
Bus topology
The bus topology mainly includes a main run of cable with a proper terminator at each
of the ends. It is very much easy to connect a workstation or any other peripheral device
to a linear bus. In addition to that, it requires a less amount of cable than the star
topology. On the other hand, it is very much difficult to identify the issue over the entire
network and the network would shut down if there is any minor failure in the main cable.
Tree topology
Tree topology is the integration of both the star and the bus topology. In this topology, it
is easy to maintain it and find out the faults. On the other hand, it requires an ample
amount of cabling.
Hybrid topology
This topology is flexible enough and it is also reliable. On the other hand, this topology
is difficult to install and configure. Along with that, the cost regarding the HUB is very
expensive.
Networking standards
The networking standards mainly ensure the exact interoperability of the networking
technology that critically defines the rules of the entire communication process in
between the different network devices that are connected to the traffic. The proper
networking standards can also help to ensure the fact that the products of the different
vendors such as the software or the hardware are able to work integrated in a network
that have a lesser amount of risk. There are an ample amount of networking standards
available for the Beta Communication Ltd they need to choose one of them based on
their effectiveness. They can choose the IEEE 802.11 standards. It is considered as a
set of MAC and the physical layer requirements in order to implement the WLANs. Beta
Communication Ltd can implement the 802.11af standards as it allows the bandwidth of
near about 800MHz. along with that, it mainly uses the cognitive radio technology in
order to transmit the different set of data.
1.2 Impact of current network technology along with communications and standardsThe current network technology that Beta Communication Ltd incorporates into their
account has an ample amount of impact over their business process. The organization
has three different buildings that they need to connect with each other. Therefore, Beta
Communication Ltd needs to implement the proper standards that can enhance their
process. In addition to that, the Beta Communication Ltd can also incorporate the
TCP/IP model that can enhance their business. Moreover, the Beta Communication Ltd
also needs to look at the actual bandwidth that needs to be used within the network
system. In addition to that, the Beta Communication Ltd may also use the client-server
architecture in which there would be one central node and the other client machines
would have access to the main server in order to take out the set of important data. The
organization Beta Communication Ltd also needs to maintain the proper communication
in between the different buildings and in order to maintain the effective communication
process they need to manage the exact bandwidth of the network traffic.
1.3 Usage of protocols regarding the proper utilization of the networking systemsThe IPv4 is the fourth version of the Internet Protocol and it is the core protocol of the
different standard based inter-networking methods. In addition to that, Beta
Communication Ltd also uses the FTP that mainly enhances the speed of the file
transfer. Along with that, the HTTP also can be used in order to enhance the business
functionalities of the network (Karaboga et al. 2014). As there are ample amounts of
people having the access of the network, therefore the security needs to be tight
enough so that the unauthorized access of the files and the data sets can be closed.
The throughput of the particular communication system in Beta Communication Ltd can
be easily get affected by different factors that include the limitations of the different
physical medium that Beta Communication Ltd use. The organization can also use the
SMTP in order to transfer the emails to the networks that mainly run on the proper IP
addresses. It has an ample amount of advantages such as the simplicity of it. It mainly
provides the simplest form of communication in between the employees of the
organization. Along with that, it also looks towards the processing speed of the email. In
addition to that, this particular protocol is reliable enough so that the users find it
authentic for their usage. Moreover, if Beta Communication Ltd implement the SMTP
then they may go for the dedicated servers that can handle the different outgoing
emails. However, some ISPs and the web mail services provide the same feature; still
the organizations should use the SMTP as they are managed locally and can easily be
configured to handle the important and the sensitive messages.
Task 2
2.1 Role of hardware and software componentsIn order to construct a LAN connection for Beta Communication Ltd., they need to
implement the proper hardware components. The components are the network
switches, routers, hubs, repeaters, bridges, modems along with different handheld
devices and the servers. The organization need to select the devices that are
appropriate for them.
The routers mainly capture the set of information that generated through the broadband
connection via the modems. As Beta Communication Ltd. is a medium organization,
therefore according to Eberhart (2014), the wired and the wireless routers can be
suitable for them. Along with that, as Beta Communication Ltd. is using the “Class C” IP
address, therefore it would be proper for them. Both the wire and wireless routers are
able to maintain the proper routing and configuration in the routing table. Along with
that, it also provides the proper filtering service regarding the traffic monitoring over the
outgoing packets that are based on the given IP address of the service provider of Beta
Communication Ltd.
Figure 4: Router connection
(Source: Eberhart, 2014)
When it comes to the switches, Beta Communication Ltd. needs to use the Cisco series
switches in order to maintain a smoothness of their functionality. Beta Communication
Ltd. can use the campus LAN switches. The 2960-X switch provides the speed of 80
Gbps and on the other hand, the 3650 series provides the speed of 160 Gbps (Boccardi
et al. 2014). Therefore, the organization may use the 3650 series switches that can
provide the proper transmission of data from one building to another.
Along with that, the different wireless devices such as the mobile phones, tablets can
also be used in order to manage the entire network traffic. The use of 3G, 4G, and
GPRS connection within the mobile phones can enhance the accessibility of the
network for the employees. However, the security measures restrict them to have an
access to the main server.
The different software components that Beta Communication Ltd. can use are the
different client software along with the different server software. The organization need
to select the software based on the prices of the product. The organization also has to
consider the fact that whether they have the proper labor to handle that software or not.
Beta Communication Ltd. can use the Ubuntu server for their usage. That is simple to
handle and too easy to learn. Along with that, when it comes to choosing the operating
system, they can use the Linux operating system as it would be compatible with the
server software.
2.2 Different types of server and requirement of selectionThe proper database is very much important for Beta Communication Ltd. in order
handle the load of the customers and the clients. Along with that, the organization has
three different buildings from where the employees need to access the database in
order to have the required set of data. Therefore, Beta Communication Ltd. can use the
client-server architecture. The first line support technicians can have the access to the
main server. Along with that, the network infrastructure manager also needs to have a
proper access to the database along with that, as the person needs to use the video
conferencing, therefore the network switches also need to be implemented in his or her
workstation that has a proper bandwidth. In addition to that, the Telco product manager
needs to have a safe and secure database, therefore there need to be the proper
security applications for the database. Beta Communication Ltd. can use the firewalls in
order to make the database safe and secure enough from the intruders. Moreover, the
second building that consists the general staffs and the ordering and the delivery
section need to have the access to the client database and from there they need to
handle the proper shipping process (Al-Sultan et al. 2014). In the third building, the
managing director and the PA would also need to access the main server and from that,
they can make out any kind of decisions regarding the organizational matter.
2.3 Interdependence of the machine’s hardware with different network componentsBefore implementing the different network hardware, Beta Communication Ltd. needs to
look at their machine’s hardware. The internal memory needs to be high enough so that
the workstations should not get slow. Along with that, the operating system Linux needs
to be updated so the users find it easy to use the system. Along with that, according to
Song et al. (2013), the hard drive of the workstations also needs to be compatible with
the different network devices. The network card that Beta Communication Ltd. should
use also needs to be suitable enough so that it provides a proper network speed. In
addition to that, the proper cabling is also necessary for the system. The different input-
output devices such as the webcam also need to be set with the systems because
manager needs to have the video conferencing. The permission from the ISP is also
very important as based on that the entire traffic would be activated.
Task 3
3.1 Network system
Figure 5: Network architecture
(Source: Created by self)
3.2 Analysis of the user feedbackBased on the above network system, it can be said that the entire network traffic is safe
because of the firewalls. Along with that, the Cisco Series switches also enhance the
security measures of the entire network traffic (Javed et al. 2017). Therefore, it can be
evaluated that the safety is the primary measure of Beta Communication Ltd. and they
are able to maintain it properly by using the proper hardware and software devices.
Along with that, the transmission of data through the router also goes through in
between the switches. The two access points helps the huge amount of data to get
transmitted to the test server and from that server the data is being distributed through
the other workstations of the different buildings.
ConclusionAfter summing up the entire study, it can be evaluated that the age of advanced
technology wants the different organizations to implement the advanced technologies
into their account. Therefore, the Beta Communication Ltd. wants to implement the LAN
connection in their organization’s different buildings. Along with that, the study also
concludes the fact that it made the entire network traffic smooth enough so that the
organization can maintain their business operations in the best way. The entire study
also defines the importance of the LAN architecture and the different components that
are used in order to design the entire system. Moreover, the use and the configuration
of the different topologies along with the network devices such as the bridges, switches,
routers, hubs are also defined in this study. That can provide an ample amount of
knowledge regarding the use of this components and how the employees of the
organization can handle these components.