WAN Network Design

Masters
Assignment
Technology
Pages 6 (1506 words)
Download 0
Being seperated by distance is a challenge for a growing company. Expanding a remote area office is extremely needed to cut transportation fee, the employment matters, and other necessity. However, we have to establish communication connectivity between these remote areas and their headquarters to maintain the company's important data correspondences…

Introduction


Many telecommunication carriers offer leased circuit as a solution for this distance barrier. Determining the link bandwidth and topology of the network should be an important subject to discuss. To minimize operational fee by expanding a remote office is our main goal. Yet, we will unable to achieve this objective if we miscalculate the network development cost, although, we eventually have the ability to deliver data communication among the nodes (we often call a network entity as a 'node').
WlvNET is software that enables us to calculate network development cost for each topology that we simulate. By knowing the cost, we will able to find out the best network path that meet the maximum cost requirement for the company.
What wlvNET do is basically an iteration of an algorithm to find the shortest-path of a link related to the incoming/outgoing traffic of a node. It uses Djikstra's algorithm as this method has been used in most of shortest-path calculation (lecture notes, sli. 13). Any topology possibilities could be shown by this software. Unfortunately, we have to decide the optimum network topology manually. This would be a very essential issue.
One of the parameter that this tool uses in its iteration is incoming/outgoing traffic. This parameter need deep discussion as it will effect the link needed to overcome the traffic. ...
Download paper
Not exactly what you need?

Related papers

Network Infrastructure Assignment
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…
WAN Network Design
Many telecommunication carriers offer leased circuit as a solution for this distance barrier. Determining the link bandwidth and topology of the network should be an important subject to discuss. To minimize operational fee by expanding a remote office is our main goal. Yet, we will unable to achieve this objective if we miscalculate the network development cost, although, we eventually have the…
Computer Network Principles
In order to design or upgrade a computer network for business, we need to consider the goals for the network design and the possible problems that will exist in the network after the design is finished or the problems that already exists in the system. Network designer needs to cooperate with the client completely and find out their business and technical goals. For instance, the network designer…
Advanced Routing Protocols
The popular routing protocol used on the Internet is the Border Gateway Protocol (BGP) which is an exterior gateway routing protocol. Corporate networks manage internal routing with the help of Routing Information Protocol version 2 (RIPv2) and Open Shortest Path First (OSPF) which are interior gateway routing protocols. In this case study, the practical implementation of a complex network for an…
Computer Network Security Methods
The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees,…
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…
Optimising Network Services
Depending on scale and services involved, there is a choice between ignoring QoS and just over dimensioning resources and implementing QoS at one or more layers, using one of two architectures, through protocols of different robustness and complexity.…