You are on page 1of 13

LAN technology fair LEASING Lanka (Pvt)

Task 1
LAN is essentially the communications network connecting data terminals and
computers, etc. within a building. Ethernet, Token Ring, FDDI, Gigabit Ethernet are the
basic LAN technologies.
Most commonly it used Ethernet LAN technology. It has been standardized by the IEEE
in 1980. It has a great collision portability because the actions.Ethernet connector
Ethernet data communication is a network interface card with the MAC address of 48
bits, which help to Ethernet devices communicate with remote Ethernet device.
Ethernet technology like other LAN technologies carries data or information from
thousands of kilometers, Ethernet is a high-speed technology and is dedicated
interconnections are also very high speed that are linked with tons of meters. LAN
Ethernet technology is very useful for providing broadband access to the network and is
useful and is used in various forms and office, terminal access, processing of data is also
distributed includes situations connectionsthey demand are media economic local
transport heavy traffic at high peak currents. "There are conditions that require resistance
to different environments, real-time responses, although not specifically excludes and
does not include any specific means for flame f Ethernet technology develops."
(Maynard, 1982)
Most LAN technologies that uses a token passing ring topology is used for synchronized
access to ring. The ring is called as shared medium, but only communication. Whenever
the computer or laptop wants to transmit or pass signals it expects the token. After the
signal is transmitted, the computer transmits the counter ring. And the next team that is
ready to transmit or receive delivery and transmitted. When a team wants to convey
course element.
LAN Interface FDDI Fiber Distributed Data is another technology that transmits data at
100 Mbps. Fiber Distributed Data Interface are not designed or developed or MAC or

very rarely. fiber distributed interface data is basically a large part of the LAN. It can be
used in various ways in a network that helps link a large number of people working in the
same building.

Another local LAN technology that is developed by modifying Ethernet and Gigabit
Ethernet is this concept is very easy to understand. Another technology used to make
quick Internet access is fast Ethernet also develop from Ethernet Ethernet simple usually
works at 10 Mbps while Fast Ethernet operates at twice the speed or when 10 Mbps
Ethernet is simple 10 multiplied by fast Ethernet speed is designed as a fast Ethernet
operates at 100 mbps speed and when multiplied by 10 can reach the Gigabit Ethernet,
which operates at the speed of 1000 mbps. Although data is transmitted to the front end
of each of the MAC frame or head, which is usually the same. some features are added,
but basically just Ethernet.The two main advantages of this are
The administrators or technicians and some providers offer support engineers are aware
of Ethernet technology or know how Ethernet. The advantage of this is that the training
budget is reduced and error Mainline operating expenses more likely or error is much
lower.
"will on the other hand they are also very beneficial for the translation of one of the
Ethernet ports operating at different prices and speeds. But as we know, is very easy and
simple to make, but this is low prices and expenses or costs very high. "(Hill, 2000)
As we know workstations connected through the centers and just rent Lanka if the centers
network access. These devices are used to spread the data coming through the entire
network. But there is a risk that, when the information or data is transmitted by more than
one person at the same time, then the data collision occurs and all data is lost. And this
collision is transmitted through the network by these centers. And to avoid such collisions
will result in data loss is replaced with switches cubes, as these devices do not propagate
through collisions network occur. These centers, etc., which together form the local
network segment. With the help of VLAN manager called virtual LAN LAN tin

segment.So in different areas this translates into a logical segmentation. VLAN allows
areas can function without routers.
VLANs can reduce the traffic generated by broadcast and multicast.
With the help of people from different departments VLAN can communicate through the
same workgroup. No VLAN can not communicate with the same ease they have to work
close to each other to communicate.

PROPOSAL LAN technology


For the scenario mentioned in Fair lease Lanka (Pvt) Ltd, where the main problem is the
poor performance of the network and the limited number of centers is not be able to
achieve the desired level of performance. For such situations, the technology of Ethernet
switching is better or pass Gigabit Ethernet or GbE is the best technology for use as I
explained earlier that the main problem of the company is inefficient latency problems
network that slow down process of the company for the main reason is to design a system
of this type which uses DSL technology that will increase work efficiency so that the
network system can be carried out effectively and time. Therefore, I propose to use
Ethernet switching technology to overcome the problems of society and to avoid latency,
which provides an effective way to access and use Internet services.
As we know that every time data is transmitted simultaneously by two collisions occur
and this is common in Ethernet technology network and various devices network
infrastructure such as Ethernet hubs used in the organization, they have little flashing
lights on each simultaneous time data is still occurring and head collision. Ethernet
switches and is best option to achieve high performance and organization due to the use
of limited performance level is not achieved concentrators. In the case of switches
without collision it occurs when data are transmitted simultaneously. So will solve the
problem performance centers and low disadvantages would also be replaced and will
overcome the problem of latency. Gigabit Ethernet is much more effective a simple

Ethernet, normally transmits data at very high speeds typically at a rate of three times and
then simply Ethernet. Although it is not easy to go in the centers as switches are
inexpensive, but simply requires the installation of the switches in the cubes above or
wiring and replacement will handle the speed indicated by Ethernet or Gigabit Ethernet.
Gigabit Ethernet switches are very useful also avoid high traffic between the network and
its core. "GbE LAN is a technology that can also be used to achieve high performance in
this scenario as GbE can be applied both on both major chains switching and routing
backbone." (Chowdhury, 2013).
task 2
traffic-intensive services:
Internet Traffic Services (TIS) provide services such as QoS (Quality of Service) and the
services to try to make the best use of available resources in a network. (For example,
routers)

These are also very important services to a network as an organization refers.


Quality of Service (QoS) is Internet traffic for networks. It is essentially a set of rules and
ways to ensure quality and critical performance of critical applications, as mentioned in
the script. The use of resources can be more effective it is already present through this
mechanism or procedure and required performance level or the service required is
obtained without expansion or acquisition networks.
Basically, the quality of service means that all network traffic is also covered in the case
of networks. The result of this is that network traffic network best be achieved and no
warranty period, delay variation or another application performance characteristics.An
wide single band with the best service services can lead to inefficiency or low
performance for any application. Or we can say that the level of performance is
unacceptable. This is the concept that we see that user needs are critical and some
applications than others, and that means low traffic requires special and preferential
treatment.

"The goal of the gain and the director of the quality of service delivery is the service that
is best for all applications that need to ensure that the bandwidth is sufficient to control
the fluctuation or other problems, etc.. reduces latency and loss of data through the
application. " (Anon., 2003)
To control memory efficiency
There are two stages of the introduction of new standards is dynamic memory. The first
step involves different requirements to improve the bandwidth or cost per bit. And the
goal for the second time is twice that generation.
"The second step is twice the performance than the generation before mentioned is
needed, but very low power. And those memories that require low energy are called lowpower (LP) or mobile DDR." (Mace, 2009)
Yield exploration
With the limitations of energy and the cost of system memory without warranty issues
latency items that are processed in the system over the bandwidth of engineering and the
system can be offered by system architects. This is both latency and bandwidth depends
on the traffic that is interconnected with other elements that are being processed in the
system. So the main purpose or the main objective of the verification process should
always be taken into account changes in traffic patterns of objects within the process.
This will certainly increase the verification task. This efficiency depends on the
characteristic of the traffic coming into the controller memory. This will include:
The burst length
Distribution Management
Distribution of reading and writing
And Performance
"Therefore, the traffic profile is generated or produced to represent the course of
processing elements of the system of characters that are similar or identical. These

characteristics are generally determined by the characteristics of beingprocessing items


and codes it provided." (Mace, 2009).
Other facts that affect performance are
disk latency can also be accomplished by providing
balance workloads among storage arrays
Server performance may affect storage
task 3
Factors affecting the security of the local network
local wireless LANs are different that are connected tightly.This reference model differs
as to the physical and data link reference model of open systems interconnection layer. In
the case of a wired LAN he hired when he attacked the author needs access to the media,
either physically by the child or a telephone closet these cables are essentially connected
to the network. Contrary to this wireless LAN communicates through the air, the signal
from the air and this will require more sophisticated techniques. There are several factors
to consider when security of wireless LAN is evaluated, these factors include the physical
configuration, transmission type, and service availability.
The physical configuration
As we know that wireless LAN is better than cable because it gives greater flexibility in
changing the terminal configuration for the user, when you consider that the operational
point of view Rome. But if we consider that in terms of security of this flexibility in the
wireless LAN offers more risks of attacks that are possible in nature.
In this case, hackers or intruders will not need any physical access to the workstation or a
building is made up of the network, but attacking wireless transmissions. But it also
depends on how it is prepared or are establishing the wireless LAN. Take the example in
which the local network is used for a single building and access is limited to specific
local offices for LAN it must be well designed to protect intruders.And if the network is

designed to make communication possible between the buildings are more likely to be
attacked by intruders who are very potential and this is due to the reason that the
interception range is very wide. Although not as easy for intruders to attack the system in
this case. The attacker must be able to make a difference in the data that are addressed to
them and be transmitted concurrently or simultaneously. And the attacker must be able to
decipher the signal. This process is very expensive because it requires a lot of work,
although we know that computers can be used to solve the signal. We must be able to
understand that in the area of wireless LAN coverage is not only the distance but also the
signal levels and co-channel interference as well. "The wireless network can also be used
to extend the existing LAN cable that is difficult to be replaced, this will add complexity
to the architecture." (Amin Leiman, n.d.).
transmission types
There are different types of transmissions. As infrared transmission is the transmission
requires line of sight, but the bandwidth is limited. For example, an infrared wavelength
of 790 nm is used; the interval between its nodes is about 80 feet. So there is a risk that
the intruder might be in construction within the specified range and is in a line of sight
path, these factors can not be achieved by the person working there.

radiofrequency
As we know that radio frequency radiation can easily pass through walls or patricians so
they are usually placed at the site or on the same floor. Because in this case, no infrared
line is required unlike sight, transmitted data can be intercepted more easily here.
Therefore, products have been developed to overcome and solve this problem and these
products have encryption capabilities.
Service availability
To understand the concerns of LAN security should be used as a wireless LAN network
concept is very important to be understood. It can be considered as a ring tone that is

received by picking up the phone. And the absence of this tone is the result of the busy
circuit or perhaps because the signal of shit.
signal availability
If I RDS (radio frequency signal) is used availability signal for the radio receiver used to
make the bit error rate is acceptable if enough signal power reaches. While in the case of
an infrared system apparatus receives the signal must be in the line of sight of the beam,
signal availability refers to the direct distance, but when the node is not in the availability
interval signal specified decreases
availability circuits
Circuit availability depending on the adjacent channel interference and co-channel.
Whenever there is simultaneous mapping of two carrier frequency signals transmitted or
on the single receiver is designated as the co channel. (This relationship is called the
carrier to interference). When the energy of the modulated carrier is set or bypass
channels that are adjacent to this, which is known as adjacent channel interference. One
call management centers such as frequency Motorola Management Center is the database
used to monitor or maintain a record of the frequency and location of the unit Altair in the
US It is used to reduce the risk of interference. "A trick of the attacker is to locate the
carrier frequency and the receiver to prevent transmission or signal reaches the frozen
receiver. Therefore, the wireless local being compared to wired LANs are at risk or who
are especially sensitive to these attacks" . (Amin Leiman, sf)

the reliability of network security and performance can be achieved by


To get rid of the centers
workstations or older companies, including rental Lanka exhibition centers and are
present on the network. Compared to these centers network switches are very
advantageous for use. The switch performance is much better than the centers, as they are
very effective and do not allow entering collisions that helps us achieve high

performance. So there is no relationship between the performance is much better than


existing ones. This does not mean throwing switches and switches purchase are also very
cheap, but to buy good switches that help us perform operations that are reliable and error
free.
The use of firewalls
There are assumptions that simple router with NAT enabled better address threats and
viruses. This is useful, no doubt, but provides only a limited ability to block many attacks
the best way to protect the network from threats and viruses that are possible in nature is
the use of firewalls. There are many routers that have the firewall, but the firewall
function is disabled due to several reasons, including the necessary configuration
management and additional necessary b. And it can be painful to configure and
connectivity problems occur, but a firewall router is very good way to protect your data
against vulnerable attacks.
Think reliably
If we want to create a software application, you will see how the application will be used
and carefully consider all points of failure. reliable applications requires operations that
are reliable and reliable processes and application. It should also focus on how the service
is provided and consider all the circumstances and possible problems in points of failure
will be minimized by the design and other alternatives.
Investing in people
Applications that are reliable are usually the result of investment in developing the
application people.Developers and staff makes the child of the system operation, must
receive adequate training in management practices lifecycle prevent failures which may
arise in the application.
participation and user
No system is very developed or bad, but the cause of poor performance is mainly due to
the misconduct of users running the application. So it will be effective to give your

colleagues adequate training to sensitize them on certain points of view, rather than
imposing strict technical standards and closures.
If education and training is the best way to guide everyone to the right path to education
is the best way to accomplish this. It can be properly trained and guided on the network
and use what will be operated correctly and right.
task 4
LAN infrastructure
Ethernet

Here are the Ethernet LAN using wireless technology for quick access.
Only Ethernet for rent Lanka

task 5
INGREDIENTS
It consists of different devices that require Internet access and wireless LAN (local area
network that provides Internet access to a single building or an organization in this
current scenario of the company is the use of the network within a building made of
several different plants.)
It is used for network that provides Internet technology / Ethernet is used because it is
reliable and easy to implement cost-effective and gives switches high performance.The
are used instead cube as centers are low-level components and does not help enough to
achieve high performance.

Hubs are generally inexpensive, but slow network performance, slowing down the whole
system. Therefore effective if used hubs can be achieved using this organization cubes, as
it is affected by a drop in performance.
AP router establishes an infrastructure network among all wireless clients and Ethernet
resources. Here cube is replaced by the switch network to improve organizational
performance and Ethernet technology is used to capture and response to this Ethernet
switches high performance is the best option to achieve high performance and limited
organization because it is reached using cubic not performing level. This is the most
appropriate way of integrating a high-performance system.
I designed taking into account the operating mechanism of the Fair lease Lanka, which is
the company consists of several people working on different floors, so I designed the
wireless LAN technology known as Ethernet switches for thisCompany to avoid
problems network and achieve the desired level of performance, as it consists of cubes
that are certainly not cheap, but are not suitable for use in this scenario, so they replaced
by switches. These switches are very beneficial because people in different plants may
use the same network time, and transmits signals simultaneously these switches will work
to avoid collision could occur before due to the presence of centers and retards network
performance but the switches in this case dealing with this problem and there is no delay
in network performance will happen then these switches indicate high-speed network
LAN Ethernet is used mainly be transferred to achieve high performance that captures
signals high speed and then transmitted across the network. When these signals are
transmitted to the whole team working on different floors of the application.
When people working on different floors have access to a high speed network, then tasks
can be effectively treated. So all latency issues that were previously in force in this
society are solved by using switches and LAN.
You can also use the fast or Gigabit Ethernet technology to achieve high performance and
could be faster than Ethernet simple, but they are very expensive to use so it could exceed
the available budget.

references
Amin Leiman, M., N. D. Securing Wireless LANs. Computerworld, pp.4-6.
Anon., 2003 TechNet. [On line]
Available in: https://technet.microsoft.com
[Accessed 20 January 2016].
Choudry, D. D., 14 March 2013. The operations GbE topology and wiring. In:
Technology Broadband Internet. s.l.:Springer Science and Business Media p. 497.
Chowdhury, D. D., 2013. GbE operations Topolgy and wiring. In: High speed LAN
Technology Handbook. s.l.:Springer Science and Business Media, pp. 273-274.
Hill, D., 2000. Introduction to Gigabit Ethernet. In: J. Rosser, ed. Switching II. of S.L. ..:.
Xylan creative services team, pp 95-96.
Mace, T., 2009. optimizing traffic management, S.L. .. S.N.
Maynard, S. C. C., 1982. Ethernet. In: A local network link layer data and physical layer
specifications. s.l.:s.n., pp. 1-2.

You might also like