Being seperated by distance is a challenge for a growing company. Expanding a remote area office is extremely needed to cut transportation fee, the employment matters, and other necessity. However, we have to establish communication connectivity between these remote areas and their headquarters to maintain the company's important data correspondences…
Many telecommunication carriers offer leased circuit as a solution for this distance barrier. Determining the link bandwidth and topology of the network should be an important subject to discuss. To minimize operational fee by expanding a remote office is our main goal. Yet, we will unable to achieve this objective if we miscalculate the network development cost, although, we eventually have the ability to deliver data communication among the nodes (we often call a network entity as a 'node').
WlvNET is software that enables us to calculate network development cost for each topology that we simulate. By knowing the cost, we will able to find out the best network path that meet the maximum cost requirement for the company.
What wlvNET do is basically an iteration of an algorithm to find the shortest-path of a link related to the incoming/outgoing traffic of a node. It uses Djikstra's algorithm as this method has been used in most of shortest-path calculation (lecture notes, sli. 13). Any topology possibilities could be shown by this software. Unfortunately, we have to decide the optimum network topology manually. This would be a very essential issue.
One of the parameter that this tool uses in its iteration is incoming/outgoing traffic. This parameter need deep discussion as it will effect the link needed to overcome the traffic. One thing should be taken care of is that upload and download traffic have a ratio which depend on the application used by the end-point/user. For example, simple usage of internet to browsing, e-mail, and instant-messenging would give an upload/download traffic ratio 1:8. Other type of usage, such as LAN-emulation and banking application using frame-relay connectivity will yield a ratio of 1:3. Moreover, a voice application, such as voice over IP has a ratio of 1:1 for its upload/download traffic. These measures based on the traffic pattern tendency that my company record from the customer's private link.
The second variable that important for this software to run appropriately is, of course, the distance between any nodes. Our main goal is to find the minimum cost for sum of the entire link. Hence, cost per kilometer for a link is a very crucial issue.
Distance between the nodes could be achieved by using simple coordinate calculation. I use a plain method where I map the cities of Vin da France network to (X, Y) coordinates and subsequently, scaling of the distance will depend to wlvNET calculation mechanism. I have tried several experiments and I come to a conclusion that wlvNET will automatically scaling the distance based on the coordinates as the input. Hence, the cost of the network will remain the same although we increase the distance value for a link. The cost will be different if we make a correction on the coordinate position.
Another optional variable is the personnel population of each node. This variable will result to final traffic calculation that going from/to each node. Actually, we need to determine the distribution traffic pattern for each personnel's traffic. However, due to limitation of each user's statistical data, I take an assumption that each personnel will have an equal daily traffic.
One weakness of this application is that we could not simulate multiple line type to be used in the network. We only able to specify one line type for each single simulation, whereas combination of line types will result a ...
Cite this document
(“WAN Network Design Assignment Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.net/technology/287184-wan-network-design
(WAN Network Design Assignment Example | Topics and Well Written Essays - 1500 Words)
“WAN Network Design Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.net/technology/287184-wan-network-design.
The paper tells that encryption must also be incorporated within the network for transmitting highly confidential data. Furthermore, encryption can be carried out symmetrically or asymmetrically depending on the requirements. Lastly, encryption keys are vital to protect, as leakage of encryption keys may result in a complete exposure of confidential information.
After a detailed review of the organization and its needs, I decided that I would design and implement a bus topology network since it was the most suitable for this particular scenario. This decision was arrived at after careful and detailed deliberations with the company and a consideration of my knowledge and experience of network design, implementation and maintenance.
Network infrastructure is simply information relay flow. The best developed infrastructure should be reliable, fast delivery should be a factor to consider, ability to adapt to changes to both the environment and platform on which it is based, and lastly the network should grow simultaneously with the business growth (Keith, 2011).
The head quarter is in Chelmsford (England) while news campuses are in Mexico City (Mexico) and Kuala Lumpur (Malaysia). This report will also give a brief explanation of the protocol and it pros and cons. Configuration of WAN and LAN components are also included.
As a systems and networking advisor, we need to design a computer network for the business based on the structure of the company and the number of computers and we will consider the fact that the network needs to be scalable and reliable. In the first section of this report, we will discuss the most important computer network design phases for an enterprise network and we will address suitable equipment recommendation where needed.
While building a network, the designer focuses more on three layers of the OSI model. Although there are many technologies available for network construction, it is extremely important to be aware of the implications of
The library realizes considerable liberty in providing Wi-Fi to its clients more so the students and other parties that obtain various services from these libraries. Shifting from hard line to wireless network services offers numerous
This requires a network topology that is stable, secure, and integral.
For the first ten employees of the company, a ring topology proves to be very effective; this topology holds all the employees equal thereby allowing them equal
On this regard, this paper lays major emphasis on designing quality network topologies via an account of an account of a company that has been experiencing aggressive expansion every year.
It is vital to note
However, choosing between an i5 model and an i7 will hugely depend on the extent of use of the processor, as core i7 models are relatively faster but a bit more expensive (Cooler Master 2012).
The motherboard is one of the most important components in any
6 Pages(1500 words)Assignment
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Assignment on topic WAN Network Design for FREE!