Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Four functions of a wide area network
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Four functions of a wide area network
Introduction The purpose of this project is to design a WAN (wide area network) using a Cisco Packet Tracer simulation. The Step by step instructions included in this project are designed to help provide an inside view of how to design any type of network using the Cisco Packet Tracer network simulation software. In addition i will also be looking at other software’s that are similar to the Cisco Packet Tracer and analyse the strengths and weaknesses of the software. I will also be looking into the types of network devices needed to design a WAN. Finally, I into the types of network architecture, network topologies and security management suitable for my design network project. Literature Reviews As the networks of computing device grew larger and more complex, the need for highly accurate and scalable network simulation technologies became critical. Despite the emergence of large-scale test beds for network research, simulation still plays a vital role in terms of scalability (both in size and in experimental speed), reproducibility, rapid prototyping, and education. With simulation based studies, the approach can be studied in detail at varying scales, with varying data applications, varying field conditions, and will result in reproducible and analysable results. Gross and Güneş.2010. P31 “The goal of a network simulation is to help you itemise the tasks to build a prototype that verifies and demonstrates the behaviour of a network system. A secondary goal is to help you determine how much of a network system must be implemented in a prototype to verify the design”. Oppenheimer, 2010, P355 “A prototype is an initial implementation of a new system that provides a model on which the final implementation will be patt... ... middle of paper ... ... provide connectivity between) specific devices. Devices belonging to VLAN are not required to be part of the same workgroup nor must they be connected to the same physical switch. Berkowitz, 1999, P619. PPP (Point-to-Point Protocol) is a data link layer protocol that can be used over either asynchronous serial (dial-up) or synchronous serial (ISDN) media. Lammle, 2007,P386. “The ACL (access control list) is made up of a series of entries.” Tetz, 2011, P611. “Access list permit or deny statements that filter traffic based on the source address, destination address, protocol type and port number of a packet”. Cannon, Caudle & Chiarella,2008. P260. “ACLs are one of the most important and highly used features in the Cisco IOS. ACLs function in Layers 2, 3, and 4 of the OSI reference model and perform similarly to a network firewall”. Angelescu, 2010, P726.
MAC is a type of control that decides who will be granted access to the information based on labels, obejects, and subject. This control takes a hierarchial role when controling access to information. This method is widely used by the U. S. military.
Data is transmitted over the Internet in packets through a protocol called TCP/IP. A set of rules called an access control list (ACL) determines which packets are allowed in and which are dropped. Stateful packet filtering examines the header of each packet in isolation. Deep packet filtering examines the data in the body of a packet to provide more effective access control. Deep packet filtering is the heart of a new type of filter called intrusion prevention systems.
First I will be going over what is access control and the various models. Access control is the management of admission to resources. It grants authenticated users clearance to specific resources based on the restrictions of the access control model. Access control primarily consist of the authentication of whom ever is trying to gain access to the resources, which confirms the identity of the user trying to log in. There are 4 models of access control: Mandatory Access Control, Role Based Access Control, Discretionary Access Control, and Rule Based Access Control. Let’s look at each of these models and see what they entail.
Another recommended solution is to set up access controls. Access control is a security precaution that is used to control who or what can view or use resources in a computing environment. Physical access control limits access to campuses, buildings, and physical IT assets. Logical access limits connections to computer networks, system files and data. There are four basic types of access controls: mandatory, discretionary, role-bases and rule-based.
Sakellari, G., Morfopoulou, C., & Gelenbe, E. (2013). Investigating the tradeoffs between power consumption and quality of service in a backbone network. Future Internet, 5(2), 268. doi: 10.3390/fi5020268
In addressing the problem, the proposed research will use the case study method to examine the plan, design, and implementation of WLAN technologies at Berean. At present, the non-wireless local area network (LAN) technologies employed by Berean include 10/100BaseT Ethernet at each desktop. Ethernet ports at the desktop are switch connected to an Asynchronous Transfer Mode (ATM) T1 backbone. Berean¡¦s one remote facility connects to the network using switched Frame Relay services along with Internet Virtual Private Network (VPN) connections.
A network is merely a series of interrelated components, sharing information, linked by one common lifeline, spanning across a large area. When most people think of networks in the computer sense, cyberspace and the internet are usually types of networks that come to mind. However, these are just small pieces that complete the network puzzle. Many other types of networks include Local Area Networks (LANs), Wide Area Networks (WANs), and also wireless networks as well. This paper will provide some insight into the development, objectives, and impact of various network systems.
In the Figure 2.11, the star network topology is connected to a printer device and a wireless access point device, and acts as the backbone for two branches that connecting 25 PCs in a bus topology. In the star backbone, the devices are not directly connected to each other. For example, if a user wants to print a document, his PC is required t...
"Implementing a Network Design." Scaling Networks Companion Guide. Indianapolis: Cisco, 2014. N. pag. Safari Books Online. Web. 21 Apr. 2014. .
Computers in technological development demand more efficient networking. In a very short period it has changed the way we have looked at things since centuries. It is one industry that is going to shape our future for centuries to come Coming from a background of Electronics and Communication Engineering, I have developed an interest to probe into the area of Networking and Computer Networks. Hence I wish to do Masters in Computer Science (CS) as my major.
Networks in organisation are dynamic and complex entities which can be quite challenging to configure and manage. (Kim & Feamster 2013). These corporate networks consist of multiple routers, switches, firewalls, middleboxes and a particular advantage of network management is the ability to monitor the entire business network. As all the devices are interconnected with many event occurring simultaneously, problems with once device can eventually lead and spread throughout...
...departments makes it easier to keep a more secure network. Third ACL Layer is focus on allowing and denying access between hosts on networks. ACLs are written on both routers and firewalls. The key on creating strong ACLs is to concentrate on both ingress and egress ACLs.
When the logical design of a network is planned, an engineer will generally map out the logical layout and addressing of the network. This allows the person to picture the topology of the network and the addressing scheme that will be used amongst the network devices. Information must be gathered about several important factors before the logical design of the network is started. For example, depending on the services that will be provided to users, you may need to analyze the possible traffic patterns that might result from your plan. Locate potential bottlenecks and, where possible, alleviate them by providing multiple paths to resources or by putting up servers that provide replicas of important data so that load balancing can be provided. You need to determine who the clients are and what their actual needs will be. Distinguish between novice and power users. The services that will be provided on the network should also be determined during the logical planning stage. They may be limited by a scope, s...
Assigning the precise amount of network capacity in the right place at the right time is no simple task. Network Planners cannot afford to overbuild, as this would consume scarce investment resources that could be better used elsewhere. They also cannot delay expansion as this may result in poor service to customers and under-utilize other network assets. A balanced approach is needed in order to meet the rapidly growing and changing traffic demands. Advanced network planning and design software provides benefit to network planners in the following ways:
In this day and age, networks are everywhere. The internet has also revolutionized around world. We tend to take for grantedthat computers should be connected together. When it comes to networking, it's hard to believe that the field is still a relatively young one, especially when it comes to hooking up small computers like PCs. In approaching any discussion of networking, it is very useful to take a step back and look at networking from a high level. What is it, exactly, and why is it now considered? So, it important that it is assumed that most PCs and other devices should be networked. Computer network is the best way to take advantage of more than one computer resources by sharing these resources , such as storage space ,