ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Optical Networking Technologies and Their Applications

Verified

Added on  2020/07/23

|32
|7082
|103
AI Summary
This assignment requires students to understand the current state of optical networking technologies and their practical applications. It involves analyzing the role of network infrastructure managers in designing efficient networks and identifying error conditions using software programs. Students must also consider the economic analysis of networking technologies for rural developing regions and explore the potential of social networking technologies in formal learning environments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Networking Technologies 1
Networking Technologies
Student's Name
Instructor's Name
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networking Technologies 2
Contents
INTRODUCTION........................................................................................................................4
TASK 1...................................................................................................................................... 4
1.1 Types and Topologies of Networking Systems...............................................................4
Networking Topologies.................................................................................................. 10
1.2 Impact of network technology, communication and standards...................................15
1.3 Utilization of networking systems by protocols...........................................................16
TASK 2.................................................................................................................................... 16
2.1 Roles of software and hardware components..............................................................16
2.2 Different Server Types and selection requirements.....................................................17
2.3 Interdependence of workstation hardware.................................................................18
Task 3..................................................................................................................................... 19
3.1. Design a network system diagram using MS Visio or any other tools of your choice for
the given case study. In the design you should consider current and future provisions in
terms of user requirements and the network infrastructure itself....................................19
LAN Design [2][3]................................................................................................................... 21
Using Ethernet Cabling.......................................................................................................21
The Access Layer............................................................................................................ 21
Establishing Storage Connectivity......................................................................................22
The Aggregation Layer....................................................................................................23
The Core Layer............................................................................................................... 23
Benefits in Using the Proposed Solution [1][2][3]..................................................................24
Challenges in the Proposed Beta Communication LAN Design..............................................25
Task 4..................................................................................................................................... 25
4.1 Implement a network systems based on the proposed design. You are required to use
means of simulation software, establish a network according to the design in task 3......26
Implementation of Proposed Design..............................................................................26
4.2. Test network systems to meet user requirements. Your testing includes functionality
of the network to ensure that your developed network will operate seamlessly in a
physical environment so that it can satisfy user requirements..........................................28
Testing the Solution [4]..................................................................................................28
4.3. Document and analyse test result against expected results. While carrying out task
4.2, the testing of the network has produced a number of results. List the results you have
found in task 4.2 by contrasting them with your expected results....................................30
Test Results........................................................................................................................ 30
4.4. Recommend potential enhancement for the networked systems. Your discussions
should include how your developed network will cope with future changing needs and
Document Page
Networking Technologies 3
should address possible enhancements of your network to satisfy needs of changing
future environment............................................................................................................31
Scalability [3][4]..............................................................................................................31
4.5. Design a maintenance schedule to support the network system. Your maintenance
schedule should address various factors like personnel allocation, backup and recovery
policy, maintaining security & integrity; and general administration to support the users.
........................................................................................................................................... 32
Network Maintenance................................................................................................... 32
References............................................................................................................................. 34
Document Page
Networking Technologies 4
INTRODUCTION
A network can be said as a group of computers sharing data and information with
each other using a data link. The computers on which sharing is being done are called nodes.
Networking Technologies are some mediums that helps in connecting with people lacking
geographical restrictions. These systems offer an easy way to share files. Also it proves
beneficial for resource sharing as devices like printers, modems, scanners can be shared over
all the computers in the network. These technologies gives flexible access to people as
accessing files from systems throughout the network is allowed. Some common types of
network consists of LAN ( Local Area Network), WAN ( Wireless LAN), PAN(Personal
Area Network) etc. The Beta Communication Ltd is a telecommunication company that deals
in telecom products. This report is about designing and implementing LAN in the Beta
Communication Ltd.
TASK 1
1.1 Types and Topologies of Networking Systems
As a Network Consultant, it is important to have a deep knowledge of all the types of
network because any customer can request for a different network any time depending on his
work schedules and lifestyle.
Some common types of network are:
1. Local Area Network (LAN) – LAN connects various network computers over short
distances. This connection can establish in buildings, schools, hostels or any place
where devices can connect over short distance (Luehmann and Tinelli, 2008). It can
also be said as a group of computers sharing a same communication line.
Benefits:
ď‚· We can send e-mails between different nodes.
ď‚· Centrally management of all the nodes attached is easy.
ď‚· Communication through a LAN network is cheaper than the other networks.
ď‚· The data is stored on the server computer which makes it more secure.
ď‚· The same internet connection is served among all the users connected to the LAN.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Networking Technologies 5
Limitations:
ď‚· Less chance to move in a different location.
ď‚· Server maintenance is expensive. The set up cost used in the implementation and then
maintenance of a LAN is quite expensive (Burgess, 2009).
ď‚· This connection only covers a limited area as it covers short distances.
ď‚· The LAN administrator has permissions to check the files on any computer connected
to the server any time and somewhere it violates users privacy (Luehmann and Tinelli,
2008).
ď‚· A LAN administrator is always required as if sometime errors or any problems attack
the system, the administrator can solve it. His/her absence can lead to a huge loss of
time which can affect the company as well.
Document Page
Networking Technologies 6
(Source :Antsaklis and Baillieul,2004 )
As we can see in the picture above, all the servers i.e. file server, mail server, any output
device say printer and all the nodes are connected over a single communication line.
2. Wide Area Network (WAN) – A WAN is a network in which connected nodes may
be far apart i.e. within a radius of 1 Km. The biggest example of a WAN is Internet
which is covering the whole earth. It is a collection of various LANs connected
together. The connection between a LAN and a WAN is established by a router. A
VPN i.e. Virtual private network eases the connection between different WANs. These
connections can be wired as well as wireless. 4G which is in a huge demand
nowadays, comes under wireless WAN technology.
Benefits:
ď‚· Increase in bandwidth as in this network, leased lines are used instead of broadband
which gives high upload speed (Antsaklis and Baillieul, 2004).
Illustration 1: Local Area Network
Document Page
Networking Technologies 7
ď‚· IT infrastructure is centralised.
ď‚· It helps in sharing data within all the sites without sharing it over internet, which
boosts a user's privacy.
ď‚· ISDN i.e. Integrated Services Digital Network, can be eliminated from WANs as they
don't need ISDN for calls etc.
Limitations:
ď‚· Security Issues are being faced sometimes in this type of network.
ď‚· Issues in maintenance
ď‚· Setup cost of a WAN is higher than other networks as WANs are quite complicated.
ď‚· Maintaining a WAN is also not easy, it causes issues sometimes, which take time to be
solved.
(Source: )
3. Personal Area Network (PAN) – A PAN connects different nodes within a person's
personal habitat, within a range of 10 metres. It has some advantages but some
Illustration 1: Wide Area Network

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networking Technologies 8
disadvantages too. It is handy and safe but sometimes have a slow speed for data
transfer. Explaining with an example, If a person is travelling along with his tablet, a
PDA( personal digital assistant) and a printer that is portable, he can interconnect
them without any plug-in and take the output as well (Burgess, 2009). This makes
PAN different from other networks.
Benefits:
ď‚· There are no security issues in this network because it is limited to a very small area.
ď‚· A PAN network is movable. It is easy to move this network from one place to another.
ď‚· It can be established either wirelessly or by cables (Luehmann and Tinelli, 2008).
ď‚· Less technical skills required than the other networks because it is less complicated.
ď‚· Easy and simple to set up a PAN network.
Limitations:
ď‚· Instead it's simple to implement a PAN network but it is costly to use.
ď‚· It has a small Range of 10 metres only.
ď‚· Transmission speed is not so high in PAN. It is moderate.
ď‚· In this network, sometimes there are compatibility issues because WPAN techniques
are usually not compatible with each other.
Document Page
Networking Technologies 9
(Source : Luehmann and Tinelli,2008)
4. Metropolitan Area Network (MAN) - MAN connects different users over network
within a geographical area i.e. larger than the area covered by a LAN. It is a network
developed for a city or town. A huge collection of LANs makes a WAN. Fibre optical
cables are been used in this type for high speed data.
Benefits:
ď‚· It provides a good bandwidth as fibre optical cables have been used in this network.
ď‚· Files or resources on this network can be accessed more fast than other networks.
ď‚· Dual Bus is being used in MAN which provides transfer of data from both sides at the
same time.
ď‚· It acts as a high speed internet over the city.
ď‚· An example is High speed DSL by telephone companies.
Illustration 1: Personal Area Network
Document Page
Networking Technologies 10
Limitations:
ď‚· Security is less here as it is hard to protect the systems from hackers.
ď‚· It is a large network, which sometimes becomes hard to manage.
ď‚· While connecting it from one place to another, more cable is required.
ď‚· It stops working when being shifted to other city or area.
ď‚· Equipment cost is quite more than the other networks.
(Source : Antsaklis and Baillieul,2004)
Networking Topologies
As a Network Consultant, we often have to deal with the topologies. Network topologies
help in determining how different nodes on the network are connected to each other. I am
describing some as following:
1. Mesh Topology – It refers to the point to point connection over all the other nodes.
Data is transferred in this topology with the help of two techniques, Routing and
Flooding. This topology is mostly used for wireless networks.
Benefits:
ď‚· Connections are fully established.
Illustration 1: MAN network

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Networking Technologies 11
ď‚· Strong
ď‚· High security
ď‚· Many devices transmit data at the same time, so it handles huge amount of data.
ď‚· Any error or problem in one device does not affect the other devices in the network.
The other systems work keep going on without any issue.
ď‚· Addition of new devices does not interrupt the transmission in previous ones.
Limitations:
ď‚· In starting, configuring is quite tough.
ď‚· Cable used is costly.
ď‚· Implementing and then maintenance of this topology is hard.
ď‚· High implementation cost makes it a less wise option.
ď‚· Wiring in bulk is requires which adds more cost to it.
2. Star Topology – This topology says that all the nodes are connected through a single hub
which acts as a central node of the system.
Benefits:
ď‚· Troubleshooting is easy.
ď‚· Setup is easy and it is very simple to connect new nodes as it does not affect the rest
of the systems.
ď‚· This topology is Fast (Burgess, 2009).
ď‚· Far much better than Bus topology because of its performance.
ď‚· Monitoring the network is easy because of its centralised management.
Limitations:
ď‚· Installation cost high.
ď‚· Quite expensive (Luehmann and Tinelli, 2008).
ď‚· There is a centralised system. If it fails, the whole network and the devices have to
suffer.
Document Page
Networking Technologies 12
ď‚· As central device consists of a hub, switch and a router which makes it more costly.
ď‚· The central system manages the performance of new nodes.
(Source: Luehmann and Tinelli, 2008)
3. Bus Topology: A Bus topology is a topology of network where all the nodes are directly
connected to a single bus which is actually a half duplex link.
Benefits:
ď‚· Set up of a Bus network is easy and it is also very easy to extend the network.
ď‚· It is a very less cost topology.
ď‚· This network is commonly being used in small networks.
ď‚· Cable required in this topology is less than required in other topologies which makes
less cable cost.
Limitations:
ď‚· The bus on which all the nodes are connected if encounter any errors, the whole
network will have to suffer.
Illustration 1: Star Topology
Document Page
Networking Technologies 13
ď‚· Terminator use is must for dumping signals.
ď‚· With time, its cost for maintenance can get higher.
ď‚· It is not compatible with high traffic networks.
(Source: Burgess, 2009)
4. Ring Topology – In this topology, in a circular shape, all devices are connected to each
other. Both in LAN and WAN networks, this topology is used. Until the packet goes to its
final destination, it is moving around the ring.
Benefits:
ď‚· It is a very organised topology.
ď‚· Instead of a high load on the network, it performs better.
ď‚· No server is required to check the connectivity between different systems or nodes.
ď‚· If new nodes are being added, they do not affect the performance of other nodes.
ď‚· Resources are being accessed by each node equally.
Limitations:
ď‚· Like the bus topology, if any port gets down, the whole network gets affected.
ď‚· Every data packet must be passed through all the nodes over a network.
ď‚· This topology is very dependent on the wire connects different systems.
Illustration 1: Bus Topology

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networking Technologies 14
(Source: Sato and Hasegawa, 2009)
5. Tree Topology – This topology constitutes properties of bus and star topologies.
Connected nodes are in the form of branches of a tree.
Benefits:
ď‚· This topology is an extended version of Bus and Star topologies, so this topology can
be implemented where Bus and Star topologies can't because of scalability.
ď‚· Expanding this topology is easy (Sato, 2007).
ď‚· Detection and correction of errors is easy.
ď‚· Other nodes are not being affected from a single node damage in this topology.
Limitations:
ď‚· It depends majorly on the bus cable on which nodes are connected.
ď‚· Maintenance goes more difficult on addition of more nodes.
Illustration 1: Ring Topology
Document Page
Networking Technologies 15
(Source: Sato, 2007 )
1.2 Impact of network technology, communication and
standards.
Below I am describing some technologies and their communication standards:
1. Ethernet – Most commonly used LAN is known as Ethernet. In family of standards,
every network device is given a standard. Ethernet is given IEEE802.3 standard.
Initially it was developed to run over coaxial cables but now it uses twisted pair
cables. Ethernet is a cable through which people get internet connections. This cable
is special grade twisted pair cable or may be fibre optical also (Luehmann and Tinelli,
2008). Fibre optical cables provide a high speed data upload and download to the
users. As a Network Consultant, at the Beta Communication Ltd, while establishing
the LAN, I have to make sure to use twisted pair cable or fibre optical Ethernet as it
provides high speed internet.
2. Token Ring – It is a local area network where all nodes are connected in a star or ring
topology. The token that is holding some data can only send data. The token who has
no data received can't send any data. These rings help in non colliding of data packets
on a network. It is being standardised as IEEE802.5. These get more costly than
Ethernet at similar speeds. Ethernets have replaced the use of token rings. At Beta
Communication Ltd, we also go for Ethernet because token rings goes quite costly
than Ethernet.
3. FDDI (Fiber Distributed Data Interface) – A set of ANSI and ISO standards is FDDI.
Illustration 1: Tree Topology
Document Page
Networking Technologies 16
In a local area network, it is for transmission of data on fibre optic cables which helps
the range to extend upto 200 km. On the token ring protocol, FDDI protocol is
established. It consists of two token rings. The primary ring gives data and the
secondary carries data if necessary. This interconnects LANs using other protocols.
1.3 Utilization of networking systems by protocols
As a Network Consultant, I would like to first describe the purpose of protocols which is
described as following.
A special set of standard or rules is called a Protocol for the systems to communicate with the
others. A very common example is TCP/IP where TCP stands for Transmission Control
Protocol and IP stands for Internet Protocol. They are linked with each other but have
different purpose. It is a two layer program where TCP divides the file in smaller packets
which is transferred over the internet. After that TCP layer accepts it and then tacks it again
together in the original message. IP, the lower layer manages address of the packet's parts to
reach it the right destination.
After that, information about Routed protocols is necessary as well while establishing LAN in
Beta Communication Ltd.
A routed protocol routes the data. Some common examples are IP, Apple Talk, IPX etc.
Subnetting and addressing scheme are required for this type of protocols. Addressing scheme
helps in identifying the network to which the host belongs. Subdivision of an IP network is
called a subnet. Explaining the routed protocols as under:
1. IPv4 – The fourth version of the Internet Protocol is internet Protocol version 4. In
packet switching in OSI model, this protocol is being used (Burgess, 2009). It is a
connectionless protocol. It has five classes and it uses 32 bit addresses in Ethernet for
all five classes-A, B, C, D and E. The subnet mask for class A is 255.255.255.0 or /8,
for B- 255.255.0.0 or /16, C- 255.255.255.0 or /24.
2. IPv6 – It is an upgraded version of IPv4. Although the concepts of IPv4 and IPv6 are
almost same but this improved version increases the IP address from 32 bits to 128
bits. It supports both source and destination addresses.
TASK 2
2.1 Roles of software and hardware components
Software components are the components that assign an application's functional

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Networking Technologies 17
behaviour. The link between technology and applications is provided by the software. A
software component is a software package, a web service, a web resource or a module that
encapsulates a set of related functions or data.
Defining some software components below:
1. Client Software: A part of computer software or hardware is a Client. The server has
given some services and a client accesses that services (Antsaklis and Baillieul, 2004).
Many times, the server is placed on some other system. In that case the client accesses
the information by a network.
2. Server Software: On the server, it is a software which is to be used, operated and
managed. It is particularly made to interact with the infrastructure of a server's
hardware which includes memory, storage, input and output functions.
Some examples of Hardware components are as below:
1. Server: It is a program of computer which serves to the other programs of the computer.
The system in which the server programs runs is termed as a Server (Sato and Hasegawa,
2009).
2. Switches: A switch is a networking device that connects the devices together taking use of
packet switching. A network switch is also called a hub- switching or bridging hub. It uses
hardware addresses to function.
3. Routers: A layer 3, network gateway device is called a router. Networks are connected by
the help of routers. It is often covered as a network switch (Luehmann and Tinelli, 2008).
4. Cabling: It includes many types of cabling and every cable have different properties. AS
fibre optical have the highest speed uploads and downloads. They have very importance in
networking as every cable has its own benefits for networking of different types.
2.2 Different Server Types and selection requirements
As a Network Consultant, I am aware of all the different types of servers which are
discussed as below:
1. FTP Server – FTP stands for File Transfer Protocol. It is one of the oldest servers. It
transfers files from server to different nodes and vice versa. Security of the data is
ensured with this server and it provides better integrity of data during the transfer of
files. Web Servers use it generally. Using FTP clients, different users can upload,
modify or delete files from websites.
Document Page
Networking Technologies 18
2. Proxy Server – The proxy server is responsible for establishing a connection between
a client with an external server to filter requests, improve performance and share
connections (Antsaklis and Baillieul, 2004).
3. Web server – The web server is responsible for hosting website files and serves it up
through a web browser. It loads an individual file of a web page and loads it to display
in the browser as one complete page. HTTP i.e. Hypertext transfer protocol
communicate between server and web browser to load a web page.
4. Application Servers – Middleware is a software that establishes a connection
between two separate applications that are apart. A number of middleware products
can link a database system to a web server (Burgess, 2009). It enables the users to
request data from database by the help of those forms that are displayed on a web
browser and based on the users profit and request, allowing the web server to return
dynamic web pages.
2.3 Interdependence of workstation hardware
1. Network Interface Card: A Network Interface Card, also called a NIC is an
electronic device that connects a system to a network, usually by a LAN. It is
considered as a part of computer hardware. They let a computer exchange data
with the network. For achieving the connection, network cards use a suitable
protocol that is CSMA/CD. Network cards usually implement the first two
layers of the OSI model that is the physical layer and the data link layer. Most
network cards use Ethernet. Other types of network are ARCNET (Sato and
Hasegawa, 2009). There are many network cards which are compatible to only
respective software, depending on the computer architecture we have to find a
compatible network card. They are needed to access the internet and local
networks and thus they can function with custom network types.
2. Networking Cables: There are many types of cables that are used in
networking. Different types of network cables are coaxial cable, optical fibre
cable and twisted pair cable. They are used according to the requirement of the
connection and network. Patch cables are used for short distances e.g. in
offices etc. Connections that are electrical are made using twisted pair or
coaxial cable e.g. within a building (Sato, 2007). Optical fibre cable is used for
long distances and they provide the maximum high speed. Many centres use
Document Page
Networking Technologies 19
structured cabling to improve trustworthiness and maintenance.
3. System Bus: It is a pathway that consists of cables and connectors that are
used to carry data between a microprocessor and the main memory. A
communication path for the data is provided by the bus. The system bus
works by combining the functions of the three main buses: namely, the data,
address and control buses. Each of the three buses has its separate
characteristics and responsibilities.
CONCLUSION
Network Technologies provides many benefits to the users as there are different types
of networks for different purposes. There are LAN for local networks, WAN for wide
networks, PAN for personal networks etc. It is very comfortable for users that they can
establish a connection a connection according to their requirement. Various topologies as Bus
topology, Tree topology, Ring topologies etc. are there to be implement. Software
components includes clients, server software etc. and hardware components consists routers,
switches, cables. In networking, there are many cables which have different purposes. As
fibre optical is known for high speed transmission. Like that, every cable has its own
different features which users can use according to their particular requirements. In many
systems, data is being stored on the server computer. In some systems, other nodes are
dependent on the server while as on some are not dependent. These techniques and topologies
make networking more efficient for the users to use.
Task 3
3.1. Design a network system diagram using MS Visio or any
other tools of your choice for the given case study. In the
design you should consider current and future provisions in
terms of user requirements and the network infrastructure
itself.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networking Technologies 20
With the help of Cisco Packet Tracer, the network scenario for Beta Communication is designed. The
step by step procedure for building this network is given below:
To begin with, the router has to be connected to the service provider’s router. Next, the core switch
has to be configured and LAN technology should be implemented in it.
1) The core switch is connected to the distribution and access switch. The access switch gets
connected to the end users or workstations. The access switch is connected to all critical
devices and the server. The access switches are connected to the distribution layer switch.
2) The core switch router and all network devices are configured with a host name.
3) Three new VLANs are created. These VLANs will be the first step in establishing the Beta
Communication network. The VLANs represent the customer service department, Finance
department and engineering department. The core switch has a server VLAN too.
4) Next, the VTP domain is configured in the core switch (this is the virtual trunking protocol)
5) The STP in core switches are configured. This would prevent the Beta Communication
network from facing looping issues.
6) All Access Switches will be programmed to flow through the trunk.
7) All Access switch ports will be in access mode.
Document Page
Networking Technologies 21
Configuring the network devices
Next, a list of subnet IDs, IP addresses and broadcast IDs should be developed for the different
departments in the company.
Beta Communication will use a private IP address within LAN. The same IP pool will be used to access
WAN and external networks.
For example, Subnet 1 allocation can start with 192.168.0.1 and end with 192.168.1.255. The subnet
mask will be 255.255.254.0. This will be for building 1.
IP Addresses
VLSM alias Variable Length Subnet Mask describes a single class C network, with more than one
subnet mask.
Finance department:
Address: 192.168.10.0
Subnet mask: 255.255.255.0 = 24
Wildcard: 0.0.0.255
Network: 192.168.10.0/24
Broadcast: 192.168.10.255
Starting host: 192.168.10.1
End host: 192.168.10.254
Hosts: 254
Critically Evaluating the Proposed Network
The Beta Communication network involves a complicated architecture. The entire network has
strong security systems. There are firewalls to take care of network communication hassles. In the
organization, free flow of data is very important. Firewalls serve as a secure bridge for
communication. When data is transferred between buildings, there are broken into smaller packets.
This allows packets of data to be encrypted and made secure.
Document Page
Networking Technologies 22
It is possible to achieve scalability in two different ways. Vertical scalability for Beta Communication
is by adding more nodes, processors and RAM. It is possible to introduce a load balancer too. The
load balancer helps in routing all important incoming calls based on the routing algorithm to
different servers. Vertical routing is all about how load in the network is handled. Horizontal routing
is a method for tackling parallel traffic. This is where the state, cache, sessions and memory are
managed. If the sessions are used to handle user information, more effort should be exerted. In fact,
it would be better to go stateless. That is where all incoming requests are responded by a single user
in parallel sessions.
Availability in Beta Communication is from the end users point of view. With the proposed topology,
the network will be fairly available at all times. Even if a component fails, the entire system will not
be disrupted. Availability handles the following scenarios too:
1) Temperature fluctuations
2) Downtime
3) Reboot time
Task 4
4.1 Implement a network systems based on the proposed
design. You are required to use means of simulation
software, establish a network according to the design in
task 3
Implementation of Proposed Design
# Create a dumbbell topology
$ns duplex-link $s(0) $n(0) 1Mb 5ms DropTail
$ns duplex-link $s(1) $n(0) 1Mb 5ms DropTail

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Networking Technologies 23
$ns duplex-link $n(0) $n(1) 1Mb 20ms RED/myRIO
$ns duplex-link $n(1) $n(2) 700Kb 25ms RED/myRIO
$ns duplex-link $n(2) $r(0) 1Mb 5ms DropTail
$ns duplex-link $n(2) $r(1) 1Mb 5ms DropTail
# Create sessions
proc build-fore-tcp{ idx size intvstime } {
global ns ftcpfsink
set ftcp($idx) [new Agent/TCP/Newreno]
set fsink($idx) [new Agent/TCPSink]
$ns at $stime "start-conn 1 $idx $intv $size"
}
proc start-conn { firsttimeidxintv size } {
global ns ftcpfsink s r
set now [$ns now]
if { $firsttime == 0 } {
$ns detach-agent $s([expr $idx%2]) $ftcp($idx)
$ns detach-agent $r([expr $idx%2]) $fsink($idx)
$ftcp($idx) reset
Document Page
Networking Technologies 24
$fsink($idx) reset
}
$ns attach-agent $s([expr $idx%2]) $ftcp($idx)
$ns attach-agent $r([expr $idx%2]) $fsink($idx)
$ns connect $ftcp($idx) $fsink($idx)
$ftcp($idx) set fid_ 0
$ftcp($idx) proc done {} "close-conn $idx $intv $size"
$ftcp($idx) advanceby $size
}
proc close-conn { idxintv size } {
global ns
set now [$ns now]
$ns at [expr $now + $intv] "start-conn 0 $idx $intv $size"
puts "at $now + $intv start next"
}
set forel_intv 1
set fores_intv 0.05
set ssize 4
set lsize 1000
build-fore-tcp 1 $ssize 1 0.1
build-fore-tcp 0 $lsize $forel_intv 0.5
Document Page
Networking Technologies 25
for {set i 0} {$i< 5} { incri} {
build-fore-tcp [expr 2*$i+3] $ssize $fores_intv [expr 1.2+$i*0.1]
}
The above code will help in developing the following node connections:
4.2. Test network systems to meet user requirements. Your
testing includes functionality of the network to ensure that
your developed network will operate seamlessly in a
physical environment so that it can satisfy user
requirements.
Testing the Solution [4]
It is the role of the network infrastructure manager to schedule periodic tests on the network
services. The tests should focus on the operational conditions of the LAN network. It must
identify conditions that can be treated as normal for the network to function. A well-defined
test plan will help in predicting the overall functionality of the network.
The network infrastructure manager at Beta Communication should plan a comprehensive
test routine. The activity should happen periodically. Periodic tests will help the network

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networking Technologies 26
manager understand the overall operation at a particular load and anticipate potential
problems. The following characteristics of the LAN solution should be tested:
1) The total number of users who can handle the system.
2) The utilization levels and how performance is affected with high utilization
3) The utilization of applications in the network.
4) Beta Communication has three different enterprise buildings. Networks in each of
these buildings should be tested separately. The tests should have relevant criteria for
each enterprise building.
Few factors that should be uncovered during the tests are:
1) Will increasing bandwidth improve the rate at which data flows in the network?
2) As the number of issues in the network increases, should bandwidth be adjusted?
3) What are the operational protocols used by the current network?
4) Which application uses the network extensively? Is this taxing application critical?
How often is the taxing application executed?
Along with the network tests, a central database should be created. Test results and reports
must be stored in this database. The information should be maintained based on the enterprise
location, peripheral, router, bridge, segment and user. This will make maintenance and testing
easier.
4.3. Document and analyse test result against expected
results. While carrying out task 4.2, the testing of the
network has produced a number of results. List the results
you have found in task 4.2 by contrasting them with your
expected results.
Test Results
Document Page
Networking Technologies 27
A simple simulation of how data flows between the nodes:
1. Short flow of packets
2. Network congestion
3. Faster Red Packets
Document Page
Networking Technologies 28
4.4. Recommend potential enhancement for the networked
systems. Your discussions should include how your
developed network will cope with future changing needs and
should address possible enhancements of your network to
satisfy needs of changing future environment.
Scalability [3][4]
Beta Communication can scale its operations using many techniques. Virtualization is a great
tool to improve its business functionalities. This is a technology that helps in sharing
resources. A single resource can be broken down into multiple resources. Likewise, multiple
resources can be combined to form a single resource. Server virtualization can be achieved
using software programs like Microsoft Virtual Server and VMware. With these servers, Beta
Communication can reduce the amount of money it spends on expensive hardware devices.
Likewise, it can contribute to storage virtualization. This is a technique that helps in storing
data in huge arrays or pools. With the help of virtualization, the company will not have any
issues migrating or improving its resources. Additionally, the technique supports simplified
management.
The company can adopt to service oriented architectures. This is a simple architecture that
unifies business processes by developing large applications as a group of independent
modules. These modules are also known as services. Through this technique, IT at Beta
Communication will have the freedom to leverage technology assets easily. SOA does not
impact LAN bandwidth needs too. There will be ubiquitous access to various applications.
Additionally, the architecture supports the use of different levels of security.
Another interesting area where Beta Communication can contribute would be green and
environment friendly enterprise data centers. When new network infrastructures are
designed, engineers should make sure space and energy is used efficiently. This way, the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Networking Technologies 29
overall environmental impact can be reduced. The company suggests the use of Ethernet
cabling. It should be careful with the total number of Ethernet cables that are required for the
connectivity. All cooling, power and space requirements should be computed with the
environment in mind. This will make Beta Communication a better place to work. Green
initiatives will help the company use resources efficiently, track the way resources are used
and cut down carbon emissions.
4.5. Design a maintenance schedule to support the network
system. Your maintenance schedule should address various
factors like personnel allocation, backup and recovery
policy, maintaining security & integrity; and general
administration to support the users.
Network Maintenance
Performing scheduled and proactive network maintenance is necessary to make sure there are
no productivity losses or costs. Network maintenance is important to avoid serious
replacement or downtime. Preventive maintenance is important for organizations like Beta
Communication.
With respect to network maintenance, the following should be taken care:
1) Desktop infrastructure
2) Storage infrastructure
3) Server infrastructure
4) Network equipment management
5) Security and backup management
6) Patch management (can be done on monthly basis)
7) Corrective actions on erroneous situations. Log file reviews on each server should be
carried out by the network infrastructure manager (this should be done in real time)
Document Page
Networking Technologies 30
8) Security and vulnerability tests
9) Anti-spam and anti-virus management
10) Account review and active directory review
11) Data file management and archiving
12) Test restoration and routine backup verification
13) Threshold trending and maintenance – network bandwidth, disk space, RAM and
CPU
14) Alerts and application interoperability
15) Asset management
16) Customized management efforts to meet all unique requirements of Beta
Communication
There are special types of software programs to help with periodic network management.
Also, the network infrastructure manager should define thresholds to understand (identify)
error conditions.
References
1. Thomas, T. 2010. OSPF Network Design Solutions (2nd Edition). TX, U.S.A.:
Cisco Press.
2. Luo, W., Pignataro, C., Chan, A. & Bokotey, D. 2004. Layer 2 VPN Architectures
1st Edition, Kindle Edition. U.S.A.: Cisco Press.
Document Page
Networking Technologies 31
3. Szigeti, T., & Hattingh, C. 2004. End-to-End QoS Network Design: Quality of
Service in LANs, WANs, and VPNs (Networking Technology) 1st Edition, Kindle
Edition. U.S.A.: Cisco Press.
4. White, R. & Donohue, D. 2014. The Art of Network Architecture: Business-Driven
Design (Networking Technology) 1st Edition, Kindle Edition. U.S.A.: Cisco Press.
5. Feng, W. C. And et.al., 2005. Panoptes: scalable low-power video sensor networking
technologies. ACM Transactions on Multimedia Computing, Communications, and
Applications (TOMM). Vol. 1(2). pp.151.167.
6. Sato, K. I. and Hasegawa, H., 2009. Optical networking technologies that will create
future bandwidth-abundant networks. Journal of Optical Communications and
Networking. Vol. 1(2). pp.A81.A93.
7. Luehmann, A. L. and Tinelli, L., 2008. Teacher professional identity development
with social networking technologies: learning reform through blogging. Educational
Media International. Vol. 45(4). pp.323.333.
8. Effenberger, F. J., Ichibangase, H. and Yamashita, H., 2001. Advances in broadband
passive optical networking technologies. IEEE Communications Magazine. Vol.
39(12).pp.118.124.
9. Young, S. D. and Rice, E., 2011. Online social networking technologies, HIV
knowledge, and sexual risk and testing behaviors among homeless youth. AIDS and
Behavior. Vol. 15(2).pp.253.260.
10. Ramaswami, R., 2006. Optical networking technologies: what worked and what
didn't.IEEE Communications Magazine, vol. 44(9).pp.132.139.
11. Mishra, S. M. And et.al., 2005. Economic analysis of networking technologies for
rural developing regions.Lecture notes in computer science.3828.pp.184.194.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networking Technologies 32
12. Young, S. D. and et.al., Social Networking Technologies as an Emerging Tool for HIV
PreventionA Cluster Randomized Trial. Annals of internal medicine, vol.
159(5).pp.318.324.
13. Sato, K. I., 2007. Recent developments in and challenges of photonic networking
technologies. IEICE transactions on communications, vol. 90(3).pp.454.467.
14. Rosenfeld Halverson, E., 2011. Do social networking technologies have a place in
formal learning environments? On the Horizon, vol. 19(1).pp.62.67.
15. Burgess, K. R., 2009. Social networking technologies as vehicles of support for
women in learning communities. New directions for adult and continuing education,
vol. 2009(122).pp.63.71.
16. Zanamwe, N., Rupere, T. and Kufandirimbwa, O., 2013. Use of social networking
technologies in higher education in Zimbabwe: a learners’ perspective. International
Journal of Computer and Information Technology, vol. 2(1).pp.8.18.
17. Antsaklis, P. and Baillieul, J., 2004. Guest editorial special issue on networked control
systems.IEEE Transactions on Automatic Control, vol. 49(9).pp.1421.1423.
1 out of 32
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]