Saturday, December 7, 2019

Future Generation Communication and Networking †MyAssignmenthelp

Question: Discuss about the Future Generation Communication and Networking. Answer: Introduction A private biomedical 5 star organization, is comprised of 3 story building that are adjacent to each other. The length of both buildings is about 50 meters whereas width is approximately 15 meters. The distance between both buildings is approximately 40 meters. Their main objective is to change the existing network into modified system for making it beneficial as the company grows in terms of number of employees. The existing network is old and that is required to upgrade. They have an idea for setting two IT rooms having 20 systems. The programmers will sit in one room whereas Web Designers will sit in other room. The 5 star organization wants to set virtual machines that needs to be operated online. The organization wants to implement WAN at the branch offices which are just recently opened. 100 systems will be set up in their branch offices that can be used for video conferencing with other offices. The new branch office is 200 km the head office. Hence, all the offices need to be on WLAN for the future communication. WLAN is similar to LAN. The only difference between them is the radio signals which are used as transport medium in spite of wires. The main purpose of WLAN it is connected with the mobility of the users by implementing it in simple way and easy configuration. The main challenge in implementing WLAN is its security that also includes its legacy as well as complexity in its implementation. The enhanced adaptability of Wireless LANs results in the profitable work groups, better contribution from staff and also satisfies the employees as implementing WLAN makes staff more flexible and it increases the mobility of staff. (Dr. Singh, G., 2012). The main objective of the organization is to make network better so that the branch offices can communicate with the head office of biomedical organization without any interruption. The organization wants to operate virtual machines online so that employees can have mobility to work from anywhere. The organization also wants to implement video conferencing so that branch office can communicate with their head office on very less expenses. The organization wants to be at the top in their networking. Also, the implemented WLAN should be enough for future if number of employees increases. Challenge of Network Security The remote networking system provides access beyond the physical limits of the staff or the building. Anyone can use the enterprise wireless network. So it is necessary to implement the effective security to wireless network as the staff can have the rogue access to the enterprise network without having the knowledge to the management. Dissimilar to wired network systems, the signal of a remote system can be broadcast to the imparting hubs. A hacker has the ability to hack the wireless network by intercepting the radio signals. He can also remotely hack the network from any remote location. So it is necessary to implement a security policy in the organization to secure the wireless network. With the increase in the growth of WLAN, more systems can have access on the network. It must be necessary for network administrator to provide some extra access points so that others users can also have access to the network. So it is necessary for the network administrator to implement security policy centrally from the server. (Avaya Inc., 2011). Wireless network (WLAN) should be implemented in such a way that remote users who are outside the office can have the access to the network in a secure methodology. The best solution for providing remote access to the outside users is setting VPN which enables users to securely transmit data over VPN server by having centralized network access. VPN also provides flexibility to its users as it helps users to carry IP protocols as per IPSec standards. It also helps to rationalize all its resources in order to avoid any type of waste. It encrypt the data which is transferred through the network. (Bourdoucen, H., Naamany, A., A., 2009). The transmission capacity of various access points can be set to 10Mbps or more in order to give enough transmission capacity for the network traffic, whereas the information or packet size to be sent was set at 1400 bytes. The remote system standard utilized was 802.11n and this was set as the uniform for all the points. (Ochang, P, A. Irving, P., 2016). The number of network users will expand in future. There must be centralized security system which must be centralized managed by network administrator. The network must be enough efficient in order to deliver appropriate throughput to its users. The quality of audio and video conferencing must be good. (Finneran, M., 2004). The various hardware which are required for successfully implementation of WLAN includes switch, router, cisco firewall, laptops, phones, printers etc. Firewalls have been developed with additional security features like application assessment capacities, which gives the capacity to inspect, recognize, and check application as well as to treat traffic as indicated by various policies that depends on various variables. This helps to block unwanted network traffic who want the unethical access to the entire network of the organization. The firewall secures the access at various key system points, guaranteeing, for instance, that sales representative can't access the financial system or payroll of the ERP. (https://www.cisco.com, 2017). Mesh topology is the best solution for implementing WLAN in order to provide remote access. Implementing mesh topology is cost effective as well as it provides secure solution for remote access. It enhances the unique solution for mesh topology and also. Also, it adequately underpins current systems administration necessities, and establishes the framework for the combination of business applications. A remote mesh network can be defined as the communication network which is built by radio hubs which possess two pathways of communication to every hub. It constructs routes between hubs as required by originating nodes. If a hub wants a route to a goal for which it doesn't have route, it communicates a route request packet over the network. Nodes mainly monitor the route request through source IP address and broadcast ID. It is the progression towards giving high data transmission solution over a particular scope range. It is stable network topology. (https://www.solwise.co.uk, 2017). In order to provide end-to-end networking access, the center layer interconnects a few other system frameworks that are executed in various parts and other parts of the building. Utilizing VSS to virtualize the center layer into logical framework stays transparent to each system device that interconnects to the VSS-empowered center. A logical IP gateway builds up a point-to-point network topology in the distribution block, which removes customary protocol and empowers the system to work at full limit. (https://www.cisco.com, 2017). Conclusions An ever increasing number of ventures are perceiving the wireless LAN (WLAN) innovation. Versatility builds business benefit through enhanced profitability, upgraded ongoing network communication, and new business applications. The wireless LAN network have a high adaptability factor. They give continuously on network availability, yet don't require a system link. When a better network topology is adopted, it helps to enhance profit of the organization and also helps to fulfill the customer's goals for flexibility, and execution. One of the destinations as a system originator should be to enable the customer to develop a couple of philosophies and techniques for realizing framework organization. References Bourdoucen, H., Naamany, A., A. (2009). Impact of Implementing VPN to Secure Wireless LAN. World Academy of Science, Engineering and Technology 27 2009. Retrieved from- https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.309.2682rep=rep1type=pdf Community College and Vocational Education (CCVE) Design Overview. Retrieved from - https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Education/CCVE/CCVE_DG/CCVE_Ch3.html Deploying secure wireless network services. Avaya Inc. (2011). Retrieved from - https://www.avaya.com/en/documents/dn5244.pdf?t=0 Dr. Singh, G. (2012). Security Issues in Wireless Local Area Networks (WLAN). Global Journal of Science Frontier Research Mathematics and Decision Sciences Volume 12 Issue 11 Version 1.0 year 2012. Retrieved from - https://globaljournals.org/GJSFR_Volume12/8-Security-Issues-in-Wireless-Local-Area.pdf Finneran, M. (2004). Five critical planning steps for wireless LANs, Step 5: Manageability -- Switching to WLAN switches. Retrieved from - https://searchnetworking.techtarget.com/tutorial/Five-critical-planning-steps-for-wireless-LANs-Step-5-Manageability-Switching-to-WLAN-switches Iyer, A. Badgujar, A. (2013). Voice and Video over Wireless LAN. International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013. Retrieved from - https://www.ijsrp.org/research-paper-0913/ijsrp-p21106.pdf Ochang, P, A. Irving, P. (2016). Performance Analysis of Wireless Network Throughput and Security Protocol Integration. International Journal of Future Generation Communication and Networking Vol. 9, No. 1 (2016), pp. 71-78. Retrieved from - https://www.sersc.org/journals/IJFGCN/vol9_no1/7.pdf Outdoor wireless including linking buildings and wide area coverage. Retrieved from - https://www.solwise.co.uk/downloads/files/linking-buildings-using-wireless.pdf Ro, E. (2002). Wireless Local Area Network Proposal. CAO - ITS. Retrieved from - https://www.csun.edu/~esr46044/Documents/WLAN_Sacto.pdf Wireless and Network Security Integration Solution Design Guide. Retrieved from - https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sw2dg/ch6_2_SPMb.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.