Lan Span
Lan Span
Task 1
LAN is essentially the communications network connecting data terminals and
computers, etc. within a building. Ethernet, Token Ring, FDDI, Gigabit Ethernet are the
basic LAN technologies.
Most commonly it used Ethernet LAN technology. It has been standardized by the IEEE
in 1980. It has a great collision portability because the actions.Ethernet connector
Ethernet data communication is a network interface card with the MAC address of 48
bits, which help to Ethernet devices communicate with remote Ethernet device.
Ethernet technology like other LAN technologies carries data or information from
thousands of kilometers, Ethernet is a high-speed technology and is dedicated
interconnections are also very high speed that are linked with tons of meters. LAN
Ethernet technology is very useful for providing broadband access to the network and is
useful and is used in various forms and office, terminal access, processing of data is also
distributed includes situations connectionsthey demand are media economic local
transport heavy traffic at high peak currents. "There are conditions that require resistance
to different environments, real-time responses, although not specifically excludes and
does not include any specific means for flame f Ethernet technology develops."
(Maynard, 1982)
Most LAN technologies that uses a token passing ring topology is used for synchronized
access to ring. The ring is called as shared medium, but only communication. Whenever
the computer or laptop wants to transmit or pass signals it expects the token. After the
signal is transmitted, the computer transmits the counter ring. And the next team that is
ready to transmit or receive delivery and transmitted. When a team wants to convey
course element.
LAN Interface FDDI Fiber Distributed Data is another technology that transmits data at
100 Mbps. Fiber Distributed Data Interface are not designed or developed or MAC or
very rarely. fiber distributed interface data is basically a large part of the LAN. It can be
used in various ways in a network that helps link a large number of people working in the
same building.
Another local LAN technology that is developed by modifying Ethernet and Gigabit
Ethernet is this concept is very easy to understand. Another technology used to make
quick Internet access is fast Ethernet also develop from Ethernet Ethernet simple usually
works at 10 Mbps while Fast Ethernet operates at twice the speed or when 10 Mbps
Ethernet is simple 10 multiplied by fast Ethernet speed is designed as a fast Ethernet
operates at 100 mbps speed and when multiplied by 10 can reach the Gigabit Ethernet,
which operates at the speed of 1000 mbps. Although data is transmitted to the front end
of each of the MAC frame or head, which is usually the same. some features are added,
but basically just Ethernet.The two main advantages of this are
The administrators or technicians and some providers offer support engineers are aware
of Ethernet technology or know how Ethernet. The advantage of this is that the training
budget is reduced and error Mainline operating expenses more likely or error is much
lower.
"will on the other hand they are also very beneficial for the translation of one of the
Ethernet ports operating at different prices and speeds. But as we know, is very easy and
simple to make, but this is low prices and expenses or costs very high. "(Hill, 2000)
As we know workstations connected through the centers and just rent Lanka if the centers
network access. These devices are used to spread the data coming through the entire
network. But there is a risk that, when the information or data is transmitted by more than
one person at the same time, then the data collision occurs and all data is lost. And this
collision is transmitted through the network by these centers. And to avoid such collisions
will result in data loss is replaced with switches cubes, as these devices do not propagate
through collisions network occur. These centers, etc., which together form the local
network segment. With the help of VLAN manager called virtual LAN LAN tin
segment.So in different areas this translates into a logical segmentation. VLAN allows
areas can function without routers.
VLANs can reduce the traffic generated by broadcast and multicast.
With the help of people from different departments VLAN can communicate through the
same workgroup. No VLAN can not communicate with the same ease they have to work
close to each other to communicate.
Ethernet, normally transmits data at very high speeds typically at a rate of three times and
then simply Ethernet. Although it is not easy to go in the centers as switches are
inexpensive, but simply requires the installation of the switches in the cubes above or
wiring and replacement will handle the speed indicated by Ethernet or Gigabit Ethernet.
Gigabit Ethernet switches are very useful also avoid high traffic between the network and
its core. "GbE LAN is a technology that can also be used to achieve high performance in
this scenario as GbE can be applied both on both major chains switching and routing
backbone." (Chowdhury, 2013).
task 2
traffic-intensive services:
Internet Traffic Services (TIS) provide services such as QoS (Quality of Service) and the
services to try to make the best use of available resources in a network. (For example,
routers)
"The goal of the gain and the director of the quality of service delivery is the service that
is best for all applications that need to ensure that the bandwidth is sufficient to control
the fluctuation or other problems, etc.. reduces latency and loss of data through the
application. " (Anon., 2003)
To control memory efficiency
There are two stages of the introduction of new standards is dynamic memory. The first
step involves different requirements to improve the bandwidth or cost per bit. And the
goal for the second time is twice that generation.
"The second step is twice the performance than the generation before mentioned is
needed, but very low power. And those memories that require low energy are called lowpower (LP) or mobile DDR." (Mace, 2009)
Yield exploration
With the limitations of energy and the cost of system memory without warranty issues
latency items that are processed in the system over the bandwidth of engineering and the
system can be offered by system architects. This is both latency and bandwidth depends
on the traffic that is interconnected with other elements that are being processed in the
system. So the main purpose or the main objective of the verification process should
always be taken into account changes in traffic patterns of objects within the process.
This will certainly increase the verification task. This efficiency depends on the
characteristic of the traffic coming into the controller memory. This will include:
The burst length
Distribution Management
Distribution of reading and writing
And Performance
"Therefore, the traffic profile is generated or produced to represent the course of
processing elements of the system of characters that are similar or identical. These
designed to make communication possible between the buildings are more likely to be
attacked by intruders who are very potential and this is due to the reason that the
interception range is very wide. Although not as easy for intruders to attack the system in
this case. The attacker must be able to make a difference in the data that are addressed to
them and be transmitted concurrently or simultaneously. And the attacker must be able to
decipher the signal. This process is very expensive because it requires a lot of work,
although we know that computers can be used to solve the signal. We must be able to
understand that in the area of wireless LAN coverage is not only the distance but also the
signal levels and co-channel interference as well. "The wireless network can also be used
to extend the existing LAN cable that is difficult to be replaced, this will add complexity
to the architecture." (Amin Leiman, n.d.).
transmission types
There are different types of transmissions. As infrared transmission is the transmission
requires line of sight, but the bandwidth is limited. For example, an infrared wavelength
of 790 nm is used; the interval between its nodes is about 80 feet. So there is a risk that
the intruder might be in construction within the specified range and is in a line of sight
path, these factors can not be achieved by the person working there.
radiofrequency
As we know that radio frequency radiation can easily pass through walls or patricians so
they are usually placed at the site or on the same floor. Because in this case, no infrared
line is required unlike sight, transmitted data can be intercepted more easily here.
Therefore, products have been developed to overcome and solve this problem and these
products have encryption capabilities.
Service availability
To understand the concerns of LAN security should be used as a wireless LAN network
concept is very important to be understood. It can be considered as a ring tone that is
received by picking up the phone. And the absence of this tone is the result of the busy
circuit or perhaps because the signal of shit.
signal availability
If I RDS (radio frequency signal) is used availability signal for the radio receiver used to
make the bit error rate is acceptable if enough signal power reaches. While in the case of
an infrared system apparatus receives the signal must be in the line of sight of the beam,
signal availability refers to the direct distance, but when the node is not in the availability
interval signal specified decreases
availability circuits
Circuit availability depending on the adjacent channel interference and co-channel.
Whenever there is simultaneous mapping of two carrier frequency signals transmitted or
on the single receiver is designated as the co channel. (This relationship is called the
carrier to interference). When the energy of the modulated carrier is set or bypass
channels that are adjacent to this, which is known as adjacent channel interference. One
call management centers such as frequency Motorola Management Center is the database
used to monitor or maintain a record of the frequency and location of the unit Altair in the
US It is used to reduce the risk of interference. "A trick of the attacker is to locate the
carrier frequency and the receiver to prevent transmission or signal reaches the frozen
receiver. Therefore, the wireless local being compared to wired LANs are at risk or who
are especially sensitive to these attacks" . (Amin Leiman, sf)
colleagues adequate training to sensitize them on certain points of view, rather than
imposing strict technical standards and closures.
If education and training is the best way to guide everyone to the right path to education
is the best way to accomplish this. It can be properly trained and guided on the network
and use what will be operated correctly and right.
task 4
LAN infrastructure
Ethernet
Here are the Ethernet LAN using wireless technology for quick access.
Only Ethernet for rent Lanka
task 5
INGREDIENTS
It consists of different devices that require Internet access and wireless LAN (local area
network that provides Internet access to a single building or an organization in this
current scenario of the company is the use of the network within a building made of
several different plants.)
It is used for network that provides Internet technology / Ethernet is used because it is
reliable and easy to implement cost-effective and gives switches high performance.The
are used instead cube as centers are low-level components and does not help enough to
achieve high performance.
Hubs are generally inexpensive, but slow network performance, slowing down the whole
system. Therefore effective if used hubs can be achieved using this organization cubes, as
it is affected by a drop in performance.
AP router establishes an infrastructure network among all wireless clients and Ethernet
resources. Here cube is replaced by the switch network to improve organizational
performance and Ethernet technology is used to capture and response to this Ethernet
switches high performance is the best option to achieve high performance and limited
organization because it is reached using cubic not performing level. This is the most
appropriate way of integrating a high-performance system.
I designed taking into account the operating mechanism of the Fair lease Lanka, which is
the company consists of several people working on different floors, so I designed the
wireless LAN technology known as Ethernet switches for thisCompany to avoid
problems network and achieve the desired level of performance, as it consists of cubes
that are certainly not cheap, but are not suitable for use in this scenario, so they replaced
by switches. These switches are very beneficial because people in different plants may
use the same network time, and transmits signals simultaneously these switches will work
to avoid collision could occur before due to the presence of centers and retards network
performance but the switches in this case dealing with this problem and there is no delay
in network performance will happen then these switches indicate high-speed network
LAN Ethernet is used mainly be transferred to achieve high performance that captures
signals high speed and then transmitted across the network. When these signals are
transmitted to the whole team working on different floors of the application.
When people working on different floors have access to a high speed network, then tasks
can be effectively treated. So all latency issues that were previously in force in this
society are solved by using switches and LAN.
You can also use the fast or Gigabit Ethernet technology to achieve high performance and
could be faster than Ethernet simple, but they are very expensive to use so it could exceed
the available budget.
references
Amin Leiman, M., N. D. Securing Wireless LANs. Computerworld, pp.4-6.
Anon., 2003 TechNet. [On line]
Available in: https://technet.microsoft.com
[Accessed 20 January 2016].
Choudry, D. D., 14 March 2013. The operations GbE topology and wiring. In:
Technology Broadband Internet. s.l.:Springer Science and Business Media p. 497.
Chowdhury, D. D., 2013. GbE operations Topolgy and wiring. In: High speed LAN
Technology Handbook. s.l.:Springer Science and Business Media, pp. 273-274.
Hill, D., 2000. Introduction to Gigabit Ethernet. In: J. Rosser, ed. Switching II. of S.L. ..:.
Xylan creative services team, pp 95-96.
Mace, T., 2009. optimizing traffic management, S.L. .. S.N.
Maynard, S. C. C., 1982. Ethernet. In: A local network link layer data and physical layer
specifications. s.l.:s.n., pp. 1-2.