Network Congestion and Flapping Issues
VerifiedAdded on 2021/02/22
|17
|4086
|68
AI Summary
This assignment delves into the complexities of network communication, specifically addressing issues such as network congestion, flapping (repeatedly dropping and re-establishing connections), and misconfiguration that affects data transfer rates. It highlights the consequences of router malfunction, link failure, and hardware issues on network performance. The assignment aims to educate students about the importance of proper network configuration and maintenance in ensuring smooth communication. By examining these challenges, students can develop a deeper understanding of network reliability and optimization techniques.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Data Communications
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
TASK 1............................................................................................................................................1
a) Are Startech correct in this belief that networking will address their issues...........................1
b) What network solution would address each of their problems...............................................1
TASK 2............................................................................................................................................2
a) Logical network diagram.........................................................................................................2
b) Identify types of cables used and provide its rough cost.........................................................2
c) Explain each infrastructure device and its function.................................................................3
d) Identify two products that could have been used for each infrastructure device....................4
TASK 3............................................................................................................................................4
a) Actual address and range used in IPv4....................................................................................4
b) Methods used by devices to acquire their address..................................................................5
TASK 4............................................................................................................................................5
Identify at least 5 appropriate services for organisation to run on their network........................5
TASK 5............................................................................................................................................7
Identify one networking monitoring tool that Startech can use to ensure that network continue
to perform effectively..................................................................................................................7
TASK 6..........................................................................................................................................11
Identify three possible issues that Startech will face and how they can provide appropriate
protection...................................................................................................................................11
REFERENCES..............................................................................................................................14
TASK 1............................................................................................................................................1
a) Are Startech correct in this belief that networking will address their issues...........................1
b) What network solution would address each of their problems...............................................1
TASK 2............................................................................................................................................2
a) Logical network diagram.........................................................................................................2
b) Identify types of cables used and provide its rough cost.........................................................2
c) Explain each infrastructure device and its function.................................................................3
d) Identify two products that could have been used for each infrastructure device....................4
TASK 3............................................................................................................................................4
a) Actual address and range used in IPv4....................................................................................4
b) Methods used by devices to acquire their address..................................................................5
TASK 4............................................................................................................................................5
Identify at least 5 appropriate services for organisation to run on their network........................5
TASK 5............................................................................................................................................7
Identify one networking monitoring tool that Startech can use to ensure that network continue
to perform effectively..................................................................................................................7
TASK 6..........................................................................................................................................11
Identify three possible issues that Startech will face and how they can provide appropriate
protection...................................................................................................................................11
REFERENCES..............................................................................................................................14
TASK 1
a) Are Startech correct in this belief that networking will address their issues
Now days the Computer Network is the fastest and reliable way of sharing information,
educational data study material within the institute. The benefits of computer network:-
The computer network is help to share the notes and information on network and the
student and staff can easily access the content from the network. The computer networks
improve the communication between the staff and students. It provides multiple access to
multiple user so that they can use data at same using a single network.
It also provides centralized storage data system through this system all user like admin,
staff and students use centralised server (Bi and et.al., 2015).
In computer network we use the firewall to prevent unauthorized access and Block
Downloading Unlicensed Software the unlicensed software increase the malware and data loss
risk on network, Block Malicious websites it install malware in you device in other it gather you
confidential information and gain total access to your machine and many tool able to prevent
from the this type issue they are anti-malware, anti-spyware, firewall and IDS and regular update
the security patch to preventing for all issue.
The network technology provide the wireless technology the wireless technology allow
the access and communicate while in the move, you don’t need extra cables or adaptors to access
the network this technology is cost saving and easy to install.
In this technology unauthorized Wi-Fi access Are most common issue to prevent this issue
we provide the user name and password to all users for access the Wi-Fi with the data limit and
access permission that mean the student access only educational sites or block any type of
downloading, staff allow to access all sites and downloading.
b) What network solution would address each of their problems
Data breach problem could be solved by using a good password policy such as by keeping
an unpredictable and complex passwords (Shariatmadari and et.al., 2015). Updating the
operating systems and application software also prevents data breach threats. Using firewall
could be the first step for defence in network security. Malicious attacks can be prevented by
keeping local firewall on all the time. Use of antivirus, anti-malware or anti spyware could
continuously monitor or protect server and prevent stealing and destroying data assets from
malicious programs. Continuously auditing and analysing suspicious activities could prevent
1
a) Are Startech correct in this belief that networking will address their issues
Now days the Computer Network is the fastest and reliable way of sharing information,
educational data study material within the institute. The benefits of computer network:-
The computer network is help to share the notes and information on network and the
student and staff can easily access the content from the network. The computer networks
improve the communication between the staff and students. It provides multiple access to
multiple user so that they can use data at same using a single network.
It also provides centralized storage data system through this system all user like admin,
staff and students use centralised server (Bi and et.al., 2015).
In computer network we use the firewall to prevent unauthorized access and Block
Downloading Unlicensed Software the unlicensed software increase the malware and data loss
risk on network, Block Malicious websites it install malware in you device in other it gather you
confidential information and gain total access to your machine and many tool able to prevent
from the this type issue they are anti-malware, anti-spyware, firewall and IDS and regular update
the security patch to preventing for all issue.
The network technology provide the wireless technology the wireless technology allow
the access and communicate while in the move, you don’t need extra cables or adaptors to access
the network this technology is cost saving and easy to install.
In this technology unauthorized Wi-Fi access Are most common issue to prevent this issue
we provide the user name and password to all users for access the Wi-Fi with the data limit and
access permission that mean the student access only educational sites or block any type of
downloading, staff allow to access all sites and downloading.
b) What network solution would address each of their problems
Data breach problem could be solved by using a good password policy such as by keeping
an unpredictable and complex passwords (Shariatmadari and et.al., 2015). Updating the
operating systems and application software also prevents data breach threats. Using firewall
could be the first step for defence in network security. Malicious attacks can be prevented by
keeping local firewall on all the time. Use of antivirus, anti-malware or anti spyware could
continuously monitor or protect server and prevent stealing and destroying data assets from
malicious programs. Continuously auditing and analysing suspicious activities could prevent
1
future serious data breach problems.
Networking prevents unauthorized software downloading through rule based software
restrictions. This rule has two main components one is identification of the software and
software authorization status. There are basically four rules to restrict and permit an application
are hash rule, certificate rule, path rule and internet zone rule.
Hash rule
This policy of software restriction calculates a files hash either by MD5 hash algorithm or secure
hash algorithm and thus assign software restriction policy
Certificate rule
This rule can only be applied to windows installer packages and scripts and not be
applicable in DLL or EXE file extensions.
Path rule
Path rule either grant access or deny access to a program.
Internet zone rule
This rule either allows or disallows user to run the software.
2
Networking prevents unauthorized software downloading through rule based software
restrictions. This rule has two main components one is identification of the software and
software authorization status. There are basically four rules to restrict and permit an application
are hash rule, certificate rule, path rule and internet zone rule.
Hash rule
This policy of software restriction calculates a files hash either by MD5 hash algorithm or secure
hash algorithm and thus assign software restriction policy
Certificate rule
This rule can only be applied to windows installer packages and scripts and not be
applicable in DLL or EXE file extensions.
Path rule
Path rule either grant access or deny access to a program.
Internet zone rule
This rule either allows or disallows user to run the software.
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TASK 2
a) Logical network diagram
b) Identify types of cables used and provide its rough cost
In network there are different types of cables that are used. A cable is necessary in LAN as
it connects each device within a network. Basically, cable supports in cross connection point.
This means that if switch is located in different room or floor, cable is used to connect it.
However, distance plays important role in data signal performance. So, longer the distance poor
will be performance of cable (Zeydan and et.al., 2016). Generally, length of cable range from
50 meters to 2 kilometres. Moreover, cost of LAN cable depends on media type and budget. In
Startech LAN designed included 30 workstations thus it is necessary to ensure that cable used
are less expensive. Hence, it does not require high bandwidth or network performance.
Therefore, in Startech LAN network unshielded twisted pair (UTP) is used. It consists of 4
different pairs of copper cable twisted together. Also, twisted rate depends on category of UTP
3
a) Logical network diagram
b) Identify types of cables used and provide its rough cost
In network there are different types of cables that are used. A cable is necessary in LAN as
it connects each device within a network. Basically, cable supports in cross connection point.
This means that if switch is located in different room or floor, cable is used to connect it.
However, distance plays important role in data signal performance. So, longer the distance poor
will be performance of cable (Zeydan and et.al., 2016). Generally, length of cable range from
50 meters to 2 kilometres. Moreover, cost of LAN cable depends on media type and budget. In
Startech LAN designed included 30 workstations thus it is necessary to ensure that cable used
are less expensive. Hence, it does not require high bandwidth or network performance.
Therefore, in Startech LAN network unshielded twisted pair (UTP) is used. It consists of 4
different pairs of copper cable twisted together. Also, twisted rate depends on category of UTP
3
used. In Startech network type 6 UTP cable is used. Its bandwidth is 250 MHz and it easily
support 1000 Mbps Ethernet speed (1000- base- T). This cable is used because LAN network is
small and located in one building only. The cost of cable is estimated at €50 per feet.
c) Explain each infrastructure device and its function
In LAN network there are various types of devices used. Each device is having different
function that it performs within network. Furthermore, selection of devices depends on cost and
type of network to be created. In Startech LAN network several types of devices are used. They
are described below :-
Router –This device is installed in LAN to handle network traffic. It will connect two network
together. In company the device will control route of sending and receiving data packets from
one PC to another. It will work on defined protocols and manage traffic.
Switch - A switch handle data and identifies specific address to deliver message. In LAN
network it will be useful to deliver message to right system. Furthermore, it increases efficiency
of network by providing fast speed.
Firewall – It is been installed to prevent unauthorised access in private network. This prevents
hackers or third party to access network and steal confidential data and information. It is either
installed in hardware or software. In Startech firewall is installed to prevent unauthorised access.
It will support in maintaining privacy of network (Ratasuk and et.al., 2015) Firewall is required
as it will prevent malicious attack, virus, spyware, etc. to enter into network.
Server – This is main device where all data and information is stored. Also, it shares resources
with other work station in network. Its purpose is to process data and respond to request of client.
Here, in organisation server will be useful for storing data. With help of it students or admin staff
can easily access data from it.
UTP cable- It helps in establishing connection between devices in network. The function of UTP
cable is to offer high bandwidth or frequency in LAN network. In Startech type 6 UTP cable is
used. It is because network range is small so UTP will support in offering high frequency
between devices.
Internet – This is the main device in network which connects different computers with one
another. The computers will share internet to access data and information. In Startech network
internet is required to share and access data.
4
support 1000 Mbps Ethernet speed (1000- base- T). This cable is used because LAN network is
small and located in one building only. The cost of cable is estimated at €50 per feet.
c) Explain each infrastructure device and its function
In LAN network there are various types of devices used. Each device is having different
function that it performs within network. Furthermore, selection of devices depends on cost and
type of network to be created. In Startech LAN network several types of devices are used. They
are described below :-
Router –This device is installed in LAN to handle network traffic. It will connect two network
together. In company the device will control route of sending and receiving data packets from
one PC to another. It will work on defined protocols and manage traffic.
Switch - A switch handle data and identifies specific address to deliver message. In LAN
network it will be useful to deliver message to right system. Furthermore, it increases efficiency
of network by providing fast speed.
Firewall – It is been installed to prevent unauthorised access in private network. This prevents
hackers or third party to access network and steal confidential data and information. It is either
installed in hardware or software. In Startech firewall is installed to prevent unauthorised access.
It will support in maintaining privacy of network (Ratasuk and et.al., 2015) Firewall is required
as it will prevent malicious attack, virus, spyware, etc. to enter into network.
Server – This is main device where all data and information is stored. Also, it shares resources
with other work station in network. Its purpose is to process data and respond to request of client.
Here, in organisation server will be useful for storing data. With help of it students or admin staff
can easily access data from it.
UTP cable- It helps in establishing connection between devices in network. The function of UTP
cable is to offer high bandwidth or frequency in LAN network. In Startech type 6 UTP cable is
used. It is because network range is small so UTP will support in offering high frequency
between devices.
Internet – This is the main device in network which connects different computers with one
another. The computers will share internet to access data and information. In Startech network
internet is required to share and access data.
4
Workstation – A computer designed for specific purpose or application. Its function is to
perform specific task such as storing, processing, etc. of data. It uses operating system and are
attached in LAN to share resources.
d) Identify two products that could have been used for each infrastructure device
It can be stated that in LAN network there are many infrastructure devices used. They all
perform various functions and are designed for particular purpose. Here, many products are
available of distinct features which can be used in each device. The use of product depends on
type of network and budget. So, the products are defined below :-
Workstation
IBM workstation- It is mainframe PC that can that be used in LAN network. The supplier is
IBM and its price range from €200 to €400 (Delmastro, Arnaboldi and Conti, 2016).
Hewlett Packard- It includes both laptops and work station PC which are most commonly used
in LAN network. The supplier is HP and price varies from €300 to €500.
Router
BKP4 Cisco router – This router is supplied by Cicso in UK. Its price is €150.
Netgear AC3200 Tri band wifi router – This type of router is manufactured and supplied by
netgear. The price is approx €200.
Server
Dell poweredge T30- this server is produced and supplied by Dell. The price is €100
Asus TS500 – The server is supplied by asus in UK. Price range from €150- €250.
Firewall
Cisco ASA firepower – Supplied by Cisco in UK and price range is €50
TASK 3
a) Actual address and range used in IPv4
IP address is a numeric value allocated to each device in network which helps in
identifying its location. With this computers communicate with each other. Basically, there are
two types of IP address that is static and dynamic. Static is provided by ISP and does not change.
Whereas dynamic can be changed anytime. Moreover, IP address includes a range from which it
starts. In Startech network both static and dynamic IP address is allocated. It is given as below:
5
perform specific task such as storing, processing, etc. of data. It uses operating system and are
attached in LAN to share resources.
d) Identify two products that could have been used for each infrastructure device
It can be stated that in LAN network there are many infrastructure devices used. They all
perform various functions and are designed for particular purpose. Here, many products are
available of distinct features which can be used in each device. The use of product depends on
type of network and budget. So, the products are defined below :-
Workstation
IBM workstation- It is mainframe PC that can that be used in LAN network. The supplier is
IBM and its price range from €200 to €400 (Delmastro, Arnaboldi and Conti, 2016).
Hewlett Packard- It includes both laptops and work station PC which are most commonly used
in LAN network. The supplier is HP and price varies from €300 to €500.
Router
BKP4 Cisco router – This router is supplied by Cicso in UK. Its price is €150.
Netgear AC3200 Tri band wifi router – This type of router is manufactured and supplied by
netgear. The price is approx €200.
Server
Dell poweredge T30- this server is produced and supplied by Dell. The price is €100
Asus TS500 – The server is supplied by asus in UK. Price range from €150- €250.
Firewall
Cisco ASA firepower – Supplied by Cisco in UK and price range is €50
TASK 3
a) Actual address and range used in IPv4
IP address is a numeric value allocated to each device in network which helps in
identifying its location. With this computers communicate with each other. Basically, there are
two types of IP address that is static and dynamic. Static is provided by ISP and does not change.
Whereas dynamic can be changed anytime. Moreover, IP address includes a range from which it
starts. In Startech network both static and dynamic IP address is allocated. It is given as below:
5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IP address classes
Class Network address Host address
A 128 124,414
B 16384 54556
C 2,085,132 256
IPv4 network range
Address range Netmask
11.0.0.0- 11.255.255.255 11.0.0
152.12.0.0- 152.21.255.255 152.12.0.0
202.182.0.0- 202.182.255.255 202.182.0.0
b) Methods used by devices to acquire their address
For allocating IP address there are various methods used. It depends on type of network and
its classification. There are three methods through which DHCP server assign IP address.
Automatic- Here, permanent IP address is assigned to client from IP pools. This is done
automatically by DHCP server.
Dynamic – It is a method in which reusable IP address is assigned to client for long time. This is
known as lease. Also, it is used when there is limited number of IP address to be allocated.
Static- here, IP address is chosen by client and then send to DHCP server. As name suggests
this IP address is permanent (Mecham and et.al., 2016).
In Startech network dynamic method is been used to assign IP address. With this it is
easy to identify device and allocate IP address. Moreover, in organisation dynamic method will
support secondary network as well. In addition in future IP address can be changed if network is
expanded in organisation. Thus, this method is been used for IP allocation.
TASK 4
Identify at least 5 appropriate services for organisation to run on their network
Network operations are facilitated by network services. Higher layer services such as
performance, dependability and security specifications are provided by network services. The
server components provide various services to one or more computers in the network. Network
services are further characterized into foreground services and background services. Some
6
Class Network address Host address
A 128 124,414
B 16384 54556
C 2,085,132 256
IPv4 network range
Address range Netmask
11.0.0.0- 11.255.255.255 11.0.0
152.12.0.0- 152.21.255.255 152.12.0.0
202.182.0.0- 202.182.255.255 202.182.0.0
b) Methods used by devices to acquire their address
For allocating IP address there are various methods used. It depends on type of network and
its classification. There are three methods through which DHCP server assign IP address.
Automatic- Here, permanent IP address is assigned to client from IP pools. This is done
automatically by DHCP server.
Dynamic – It is a method in which reusable IP address is assigned to client for long time. This is
known as lease. Also, it is used when there is limited number of IP address to be allocated.
Static- here, IP address is chosen by client and then send to DHCP server. As name suggests
this IP address is permanent (Mecham and et.al., 2016).
In Startech network dynamic method is been used to assign IP address. With this it is
easy to identify device and allocate IP address. Moreover, in organisation dynamic method will
support secondary network as well. In addition in future IP address can be changed if network is
expanded in organisation. Thus, this method is been used for IP allocation.
TASK 4
Identify at least 5 appropriate services for organisation to run on their network
Network operations are facilitated by network services. Higher layer services such as
performance, dependability and security specifications are provided by network services. The
server components provide various services to one or more computers in the network. Network
services are further characterized into foreground services and background services. Some
6
examples of foreground and background services are user management services, email services,
shared-printing services, system administration services, domain name servers, instant messaging
and directory services.
User management services
User management are the services that creates user names and passwords and gives
allocation of rights, privileges and access to user (Mecham and et.al., 2016). Such as creating a
new user for a new staff member to access the network services. For the access of various
applications, files, services and tools to complete the task the user needs to authenticate itself
from user management.
Email services
Email is an electronic method to exchange messages between electronic devices by
people. In email services neither the computer and nor the user needs to online simultaneously.
Email is the network service which is a productivity tool that requires internet connection. For
using the maximum storage capacity many organizations uses policy surrounding the email
software. Some organizations provide their staff with company specific email address which
requires creation and maintenance of email server.
Shared-printing services
Another primary network service required by any organization is shared printing. Some
shared units of shared printing are multi function printer’s scanners and photocopiers. For this
type of network services the firms requires special printer management software to control the
flow of documents and protection of confidential documents. Sometimes printers may have its
built-in print servers.
System administration services
The network service has the ably to control all the workstation from a single central
location. The responsibility of administrator here is to deploy new software applications,
updating the OS and maintaining the same software version on all the work stations. In many of
the organization the admin has the complete to only one to add new software and run new
program at all workstations (Aijaz and et.al., 2016). Therefore, it increases quality of network
and reduces time spent on computer maintenance by the staff.
Domain name services (DNS)
Domain name system (DNS), network services are the services that converts between
7
shared-printing services, system administration services, domain name servers, instant messaging
and directory services.
User management services
User management are the services that creates user names and passwords and gives
allocation of rights, privileges and access to user (Mecham and et.al., 2016). Such as creating a
new user for a new staff member to access the network services. For the access of various
applications, files, services and tools to complete the task the user needs to authenticate itself
from user management.
Email services
Email is an electronic method to exchange messages between electronic devices by
people. In email services neither the computer and nor the user needs to online simultaneously.
Email is the network service which is a productivity tool that requires internet connection. For
using the maximum storage capacity many organizations uses policy surrounding the email
software. Some organizations provide their staff with company specific email address which
requires creation and maintenance of email server.
Shared-printing services
Another primary network service required by any organization is shared printing. Some
shared units of shared printing are multi function printer’s scanners and photocopiers. For this
type of network services the firms requires special printer management software to control the
flow of documents and protection of confidential documents. Sometimes printers may have its
built-in print servers.
System administration services
The network service has the ably to control all the workstation from a single central
location. The responsibility of administrator here is to deploy new software applications,
updating the OS and maintaining the same software version on all the work stations. In many of
the organization the admin has the complete to only one to add new software and run new
program at all workstations (Aijaz and et.al., 2016). Therefore, it increases quality of network
and reduces time spent on computer maintenance by the staff.
Domain name services (DNS)
Domain name system (DNS), network services are the services that converts between
7
WWW name and numeric internet address. Thus, each computer on network is identified by a
unique number. But when the size of network increases it is difficult to remember the number
thus researchers developed a database that translates each computer numeric name into string of
letters which is easy to remember. DNS promotes efficiency as they store cache to receive
answers in set amount of time.
Instant messaging
Instant messaging is the technology provided by network services that facilitates online
chat that offers real time text transmission between sender and receiver over the internet.
Messages can be transmitted between two parties either in two ways one is when the sender
types it completes thought and presses send button than the message will be transmitted to the
receiver side. The another type of instant messaging is real time text which uses push technology
in which messages are transmitted character by character as the sender types.
Online gaming
Online gaming is the video games that are either partially or primarily played over
internet. Online gaming includes PCs, mobile devices or gaming consoles. The design of online
game could be of complex graphics or a simple text based environment (Orsino and et.al.,
2016).
Video telephony
Video telephony is a network service that allows transmission and reception of audio
video signals at different location for the real time communication between people. When this
technology is used by group and organization than it is termed as videoconferencing.
TASK 5
Identify one networking monitoring tool that Startech can use to ensure that network continue to
perform effectively
Solarwinds manufactured by the SolarWinds Inc. is an American company founded in
1999 in U.S. that develops software for network and information technology infrastructure. It
develops many products for networking like network performance monitor, netflow traffic
analyzer, network configuration manager and server and application monitor.
Solarwinds network monitoring tool keep eye on network traffic, device, servers, and
bandwidth usage. The monitor tool finds any kind of error, slow response time, it inform to
administration via email or text message and it enables to resolve network performance problem.
8
unique number. But when the size of network increases it is difficult to remember the number
thus researchers developed a database that translates each computer numeric name into string of
letters which is easy to remember. DNS promotes efficiency as they store cache to receive
answers in set amount of time.
Instant messaging
Instant messaging is the technology provided by network services that facilitates online
chat that offers real time text transmission between sender and receiver over the internet.
Messages can be transmitted between two parties either in two ways one is when the sender
types it completes thought and presses send button than the message will be transmitted to the
receiver side. The another type of instant messaging is real time text which uses push technology
in which messages are transmitted character by character as the sender types.
Online gaming
Online gaming is the video games that are either partially or primarily played over
internet. Online gaming includes PCs, mobile devices or gaming consoles. The design of online
game could be of complex graphics or a simple text based environment (Orsino and et.al.,
2016).
Video telephony
Video telephony is a network service that allows transmission and reception of audio
video signals at different location for the real time communication between people. When this
technology is used by group and organization than it is termed as videoconferencing.
TASK 5
Identify one networking monitoring tool that Startech can use to ensure that network continue to
perform effectively
Solarwinds manufactured by the SolarWinds Inc. is an American company founded in
1999 in U.S. that develops software for network and information technology infrastructure. It
develops many products for networking like network performance monitor, netflow traffic
analyzer, network configuration manager and server and application monitor.
Solarwinds network monitoring tool keep eye on network traffic, device, servers, and
bandwidth usage. The monitor tool finds any kind of error, slow response time, it inform to
administration via email or text message and it enables to resolve network performance problem.
8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
It increases the service level, reduce downtime, speeds troubleshooting.
StarTech can use network performance monitor tool version 12.4 price starts from
$2955 and is a one-time licence including 1st-year maintenance and supply by SolarWinds Inc.
This tool helps to monitor necessary process and network performance and network
admin and teams view the overall quality of a network performance. It monitors hardware health
like monitor, alert, including temperature, fan speed, and power supply.
Drag-and-discover network performance charts it views real-time network performance
with the active chart and graphs (Ku, Chen and Liu, 2015). Automated capacity forecasting,
alerting and reporting is a good feature it automatically calculates exhaustion date using
customizable thresholds based on average and peak usage. The wireless network monitoring and
management analyze performance matrix for autonomous access points, client, and wireless
controllers. By monitoring fault, performance and availability it detects and resolves the network
performance issue quickly and network optimization software avoids downtime. The use of
dashboard, alert and report it improve the operational efficiency. It is highly recommend for
network because it is having ability to filter alert based on potential impact. That mean problems
will be ranked on basis of their priority and then fix. Intelligent maps have visualization of data
helps to identify root cause faster in complex environment.
Here, this tool provide crucial information to Startech such as CPU load, memory usage,
etc. which enables in identifying in network that which system is using most data. Also,
information such as network devices and packet loss is gathered through this tool. It supports in
making finding out where errors is and what can be done to improve network process.
9
StarTech can use network performance monitor tool version 12.4 price starts from
$2955 and is a one-time licence including 1st-year maintenance and supply by SolarWinds Inc.
This tool helps to monitor necessary process and network performance and network
admin and teams view the overall quality of a network performance. It monitors hardware health
like monitor, alert, including temperature, fan speed, and power supply.
Drag-and-discover network performance charts it views real-time network performance
with the active chart and graphs (Ku, Chen and Liu, 2015). Automated capacity forecasting,
alerting and reporting is a good feature it automatically calculates exhaustion date using
customizable thresholds based on average and peak usage. The wireless network monitoring and
management analyze performance matrix for autonomous access points, client, and wireless
controllers. By monitoring fault, performance and availability it detects and resolves the network
performance issue quickly and network optimization software avoids downtime. The use of
dashboard, alert and report it improve the operational efficiency. It is highly recommend for
network because it is having ability to filter alert based on potential impact. That mean problems
will be ranked on basis of their priority and then fix. Intelligent maps have visualization of data
helps to identify root cause faster in complex environment.
Here, this tool provide crucial information to Startech such as CPU load, memory usage,
etc. which enables in identifying in network that which system is using most data. Also,
information such as network devices and packet loss is gathered through this tool. It supports in
making finding out where errors is and what can be done to improve network process.
9
10
11
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TASK 6
Identify three possible issues that Startech will face and how they can provide appropriate
protection
Network security means to protect the network from the unauthorized access and changes
and check network performance in critical situation and ensure no harmful effect for user and
employee.
In network all system are connected with each other so any single mismanagement
effects the whole network.
Hacking
It is the most common issue that occurs in networking. In this confidential data and
information is leaked or steal by hacker. They target weak networks and then hack the process.
(Bi and et.al., 2015). This issue usually occurs in those networks where security is weak. Here,
hacker enters into network through unauthorised access. They steal data and information of
users.
12
Identify three possible issues that Startech will face and how they can provide appropriate
protection
Network security means to protect the network from the unauthorized access and changes
and check network performance in critical situation and ensure no harmful effect for user and
employee.
In network all system are connected with each other so any single mismanagement
effects the whole network.
Hacking
It is the most common issue that occurs in networking. In this confidential data and
information is leaked or steal by hacker. They target weak networks and then hack the process.
(Bi and et.al., 2015). This issue usually occurs in those networks where security is weak. Here,
hacker enters into network through unauthorised access. They steal data and information of
users.
12
To prevent network form hacker we have many ways like two-factor authentication it is
the best way to protect network from hacker it is based on two step verification to access your
network, it provide the complete confirmation and higher level of assurance then single-factor
authentication.
The computer Operating system has built in firewall which prevent from the
unauthorized access to your network and give the alert message of any unauthorized attempts. If
you established a new connection it doesn’t forget to enable firewall, you can also buy firewall
hardware from different brand like Cisco, Sophos, and Fortinet. This firewall prevents your
network.
Use always updated operating system, application and browser. In every update include
fix security issue that prevent from the hackers. If you use new router it comes with unset
security setting so before use new router update the setting. Ignore spam because of some email
from unknown sender never click on link and don’t open attached document.
Performance Issue
This issue occur when you change in device setting and fault in hardware such as switches,
routers and firewalls. Many other network issue that impact the enterprise networks like
1. High CPU Utilization
2. Route Flapping
3. Network Link Failure
4. Packet Loss
5. Misconfigure Hardware And software
High CPU utilization is the most common issue when your CPU network is bogged down by
heavy traffic. Utilization increase when processes require more time to execute or lots of
network packets are sent or received (Shariatmadari and et.al., 2015). Due to high CPU
utilization switch or router fail to response or perform slow.
Router Flapping is any misconfiguration of router and hardware failure can cause Route
Flapping.
Network Link Failure is the period of continually packet loss, followed by changing delay after
link re-established.to solve that issue router is capable for find the alternate route if they find out
any link failure. Of this type of issue occur again and again that may be an indication of trouble
in equipment and power supply.
13
the best way to protect network from hacker it is based on two step verification to access your
network, it provide the complete confirmation and higher level of assurance then single-factor
authentication.
The computer Operating system has built in firewall which prevent from the
unauthorized access to your network and give the alert message of any unauthorized attempts. If
you established a new connection it doesn’t forget to enable firewall, you can also buy firewall
hardware from different brand like Cisco, Sophos, and Fortinet. This firewall prevents your
network.
Use always updated operating system, application and browser. In every update include
fix security issue that prevent from the hackers. If you use new router it comes with unset
security setting so before use new router update the setting. Ignore spam because of some email
from unknown sender never click on link and don’t open attached document.
Performance Issue
This issue occur when you change in device setting and fault in hardware such as switches,
routers and firewalls. Many other network issue that impact the enterprise networks like
1. High CPU Utilization
2. Route Flapping
3. Network Link Failure
4. Packet Loss
5. Misconfigure Hardware And software
High CPU utilization is the most common issue when your CPU network is bogged down by
heavy traffic. Utilization increase when processes require more time to execute or lots of
network packets are sent or received (Shariatmadari and et.al., 2015). Due to high CPU
utilization switch or router fail to response or perform slow.
Router Flapping is any misconfiguration of router and hardware failure can cause Route
Flapping.
Network Link Failure is the period of continually packet loss, followed by changing delay after
link re-established.to solve that issue router is capable for find the alternate route if they find out
any link failure. Of this type of issue occur again and again that may be an indication of trouble
in equipment and power supply.
13
Misconfigure Hardware and software effect the result retrieves from the LAN, The LAN
being overloaded and oversubscribed. By the multicast traffic misconfiguration the segment
(VLAN) easily overloaded by multicast traffic. It also affect the data transfer rate of all
connected users to the network.
Packet Loss issue can be occur by Network congestion, Software Bugs, Security Threats, and
Problem with network Hardware, prevent to network congestion you increase the bandwidth and
for solve the hardware related issue you replace the hardware.
14
being overloaded and oversubscribed. By the multicast traffic misconfiguration the segment
(VLAN) easily overloaded by multicast traffic. It also affect the data transfer rate of all
connected users to the network.
Packet Loss issue can be occur by Network congestion, Software Bugs, Security Threats, and
Problem with network Hardware, prevent to network congestion you increase the bandwidth and
for solve the hardware related issue you replace the hardware.
14
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES
Books and journals
Aijaz, A. and et.al., 2016. Realizing the tactile Internet: Haptic communications over next
generation 5G cellular networks. IEEE Wireless Communications, 24(2), pp.82-89.
Bi, S. and et.al., 2015. Wireless communications in the era of big data. IEEE communications
magazine, 53(10), pp.190-199.
Delmastro, F., Arnaboldi, V. and Conti, M., 2016. People-centric computing and
communications in smart cities. IEEE Communications Magazine. 54(7). pp.122-128.
Ku, M.L., Chen, Y. and Liu, K.R., 2015. Data-driven stochastic models and policies for energy
harvesting sensor communications. IEEE Journal on Selected Areas in
Communications, 33(8), pp.1505-1520.
Mecham, T. and et.al., 2016, October. High Speed Data Communications and High Speed Leak
Detection Models: Impact of Thermodynamic Properties for Heated Crude Oil in Large
Diameter, Insulated Pipelines—Application Pacific Pipeline System. In 2000 3rd
International Pipeline Conference. American Society of Mechanical Engineers Digital
Collection.
Orsino, A. and et.al., 2016. Energy efficient IoT data collection in smart cities exploiting D2D
communications. Sensors, 16(6), p.836.
Ratasuk, R. and et.al., 2015, February. Recent advancements in M2M communications in 4G
networks and evolution towards 5G. In 2015 18th International Conference on
Intelligence in Next Generation Networks (pp. 52-57). IEEE.
Shariatmadari, H. and et.al., 2015. Machine-type communications: current status and future
perspectives toward 5G systems. IEEE Communications Magazine, 53(9), pp.10-17.
Zeydan, E. and et.al., 2016. Big data caching for networking: Moving from cloud to edge. IEEE
Communications Magazine. 54(9). pp.36-42.
15
Books and journals
Aijaz, A. and et.al., 2016. Realizing the tactile Internet: Haptic communications over next
generation 5G cellular networks. IEEE Wireless Communications, 24(2), pp.82-89.
Bi, S. and et.al., 2015. Wireless communications in the era of big data. IEEE communications
magazine, 53(10), pp.190-199.
Delmastro, F., Arnaboldi, V. and Conti, M., 2016. People-centric computing and
communications in smart cities. IEEE Communications Magazine. 54(7). pp.122-128.
Ku, M.L., Chen, Y. and Liu, K.R., 2015. Data-driven stochastic models and policies for energy
harvesting sensor communications. IEEE Journal on Selected Areas in
Communications, 33(8), pp.1505-1520.
Mecham, T. and et.al., 2016, October. High Speed Data Communications and High Speed Leak
Detection Models: Impact of Thermodynamic Properties for Heated Crude Oil in Large
Diameter, Insulated Pipelines—Application Pacific Pipeline System. In 2000 3rd
International Pipeline Conference. American Society of Mechanical Engineers Digital
Collection.
Orsino, A. and et.al., 2016. Energy efficient IoT data collection in smart cities exploiting D2D
communications. Sensors, 16(6), p.836.
Ratasuk, R. and et.al., 2015, February. Recent advancements in M2M communications in 4G
networks and evolution towards 5G. In 2015 18th International Conference on
Intelligence in Next Generation Networks (pp. 52-57). IEEE.
Shariatmadari, H. and et.al., 2015. Machine-type communications: current status and future
perspectives toward 5G systems. IEEE Communications Magazine, 53(9), pp.10-17.
Zeydan, E. and et.al., 2016. Big data caching for networking: Moving from cloud to edge. IEEE
Communications Magazine. 54(9). pp.36-42.
15
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.