Effective Proficiency Monitoring Strategy for IT Professionals
VerifiedAdded on 2020/10/22
|8
|2286
|116
AI Summary
This assignment outlines six key actions to establish an effective proficiency monitoring strategy, including collecting baseline data, notifying stakeholders, reporting results, analyzing performance, sharing insights, and staying ahead of outages. It also emphasizes the importance of managing developing networks, recognizing security threats, and creating a great items list for most important systems. The assignment requires critical evaluation of LAN performance and identifies essential problems to manage the network effectively.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
LOCAL AREA NETWORKING TECHNOLOGIES
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
LO1 Understand the impact of LAN technologies
Task 1
A.C 1.1 critically evaluate different LAN technologies
An area place network (LAN) can be described as computer network that is designed to get a limited
geographic area for example a building or a campus. Even though a LAN can be used seeing that an
isolated network for connecting computers in a great company, most LANs today can also be linked to a
wide area network (WAN) or the Net. You will find different LAN technologies just like Ethernet,,, Token
Ring, Symbol Bus, FDDI, and CREDIT LAN but Ethernet is usually by just far the superior one.
In 1985, the Pc Society of the IEEE started a project, generally known as Job 802, to set standards to
allow intercommunication among equipment via a variety of manufacturers. The job specified functions
of the physical layer and the data website link layer of major LOCAL AREA NETWORK protocols. The
standard was implemented by the American National Criteria Institute (ANSI). In
1987, the International Organization intended for Standardization (ISO) furthermore permitted it as a
great intercontinental standard under the designation INTERNATIONALE ORGANISATION FÜR
STANDARDISIERUNG 8802.
A.C 1.2 critically analyse traffic intensive services and their performance
Logical Link Control (LLC)
In IEEE Project 802, flow control, error control, and part of the framing tasks are collected into one sub
layer called the logical hyperlink control. Framing is managed in both equally the LLC sub layer and the
MAC sub layer. The LLC provides a single data link control process for all IEEE LANs. In this manner, the
LLC is different in the media access control sub layer, which provides one of a kind protocols several
LANs. A single LLC standard protocol can provide interconnectivity between unique LANs because the
MAC is manufactured merely by it sub layer clear.
Mass media Access Control (MAC)
Task 1
A.C 1.1 critically evaluate different LAN technologies
An area place network (LAN) can be described as computer network that is designed to get a limited
geographic area for example a building or a campus. Even though a LAN can be used seeing that an
isolated network for connecting computers in a great company, most LANs today can also be linked to a
wide area network (WAN) or the Net. You will find different LAN technologies just like Ethernet,,, Token
Ring, Symbol Bus, FDDI, and CREDIT LAN but Ethernet is usually by just far the superior one.
In 1985, the Pc Society of the IEEE started a project, generally known as Job 802, to set standards to
allow intercommunication among equipment via a variety of manufacturers. The job specified functions
of the physical layer and the data website link layer of major LOCAL AREA NETWORK protocols. The
standard was implemented by the American National Criteria Institute (ANSI). In
1987, the International Organization intended for Standardization (ISO) furthermore permitted it as a
great intercontinental standard under the designation INTERNATIONALE ORGANISATION FÜR
STANDARDISIERUNG 8802.
A.C 1.2 critically analyse traffic intensive services and their performance
Logical Link Control (LLC)
In IEEE Project 802, flow control, error control, and part of the framing tasks are collected into one sub
layer called the logical hyperlink control. Framing is managed in both equally the LLC sub layer and the
MAC sub layer. The LLC provides a single data link control process for all IEEE LANs. In this manner, the
LLC is different in the media access control sub layer, which provides one of a kind protocols several
LANs. A single LLC standard protocol can provide interconnectivity between unique LANs because the
MAC is manufactured merely by it sub layer clear.
Mass media Access Control (MAC)
IEEE Project 802 provides built a sub layer referred to as multimedia systems access control that
identifies the specific access strategy for each LAN. For example, this defines CSMA/CD as the media
access method for Ethernet, LANs and the token passing approach for Token Ring and Token Bus LANs.
Compared with the LLC sub layer, the MAC sub layer contains numerous distinct modules; each explains
the access method plus the framing format specific for the corresponding LAN protocol.
Framework Format
The Ethernet framework contains seven fields: preamble, SFD, DENN, SA, period or type of protocol info
gadget (PDU), upper-layer info, and the CRC. Ethernet would not provide any unit intended for
acknowledging received frames, rendering it what is known as a difficult to rely on medium.
Acknowledgments must be put in place at the higher layers. The format of the MAC body is shown
below.
A.C 1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance
Typical Ethernet uses the I-persistent CSMA/CD. The acronym CSMA/CD signifies carrier-sense multiple
gain access to with collision detection and describes how the Ethernet, process regulates
communication among nodes. In other words, CSMA/CD is a pair of rules determining how networking
devices respond when two devices attempt to use an info channel simultaneously (called a collision).
This standard permits products to detect an effect. After detecting a car accident, a device waits a
random delay time and after the attempts to re-transmit the message. If the device finds a wreck again,
that waits as long to try to re-transmit the message two times.
LO2 be able to design LAN infrastructures
Task 2
A.C 2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements
There are four principal topologies used in LANs; Bus, Ring, Star and Tree topology
Bus topology: All gear are attached to a central cable, known as the backbone or shuttle. Bus
networks are economical and easy to install for compact networks relatively. Ethernet, devices
use a bus topology.
identifies the specific access strategy for each LAN. For example, this defines CSMA/CD as the media
access method for Ethernet, LANs and the token passing approach for Token Ring and Token Bus LANs.
Compared with the LLC sub layer, the MAC sub layer contains numerous distinct modules; each explains
the access method plus the framing format specific for the corresponding LAN protocol.
Framework Format
The Ethernet framework contains seven fields: preamble, SFD, DENN, SA, period or type of protocol info
gadget (PDU), upper-layer info, and the CRC. Ethernet would not provide any unit intended for
acknowledging received frames, rendering it what is known as a difficult to rely on medium.
Acknowledgments must be put in place at the higher layers. The format of the MAC body is shown
below.
A.C 1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance
Typical Ethernet uses the I-persistent CSMA/CD. The acronym CSMA/CD signifies carrier-sense multiple
gain access to with collision detection and describes how the Ethernet, process regulates
communication among nodes. In other words, CSMA/CD is a pair of rules determining how networking
devices respond when two devices attempt to use an info channel simultaneously (called a collision).
This standard permits products to detect an effect. After detecting a car accident, a device waits a
random delay time and after the attempts to re-transmit the message. If the device finds a wreck again,
that waits as long to try to re-transmit the message two times.
LO2 be able to design LAN infrastructures
Task 2
A.C 2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements
There are four principal topologies used in LANs; Bus, Ring, Star and Tree topology
Bus topology: All gear are attached to a central cable, known as the backbone or shuttle. Bus
networks are economical and easy to install for compact networks relatively. Ethernet, devices
use a bus topology.
Ring topology: All devices will be connected to one another in the form of a closed loop, so that
every device is connected immediately to two other goods, 1 on either side of the usb ports.
Ring topologies are expensive and difficult to install relatively, though they offer high music
group width and will span large distances.
Star topology: All devices are actually connected to a central hub. Star networks are easy to
install and manage quite, but bottlenecks can occur because most data must pass through the
hyperlink.
Tree topology: A tree topology combines features of linear bus and star topologies. It includes
groups of star-configured work stations linked to a linear bus anchor cable. These topologies
may also be mixed. For example, a bus-star network consists of a high band width bus, called
the spine, which connects collections of slower-bandwidth star segments.
A.C 2.2 critically evaluate the suitability of LAN components
LANs a new lot of advantages such as this allows the user to access to the network resources
from close to location within their primary social networking environment such as home or
perhaps workplace. The Mobility likewise, with the emergence of open public wireless
networks, the person can access the net even outside the work environment. For instance,
most of the coffee shops deliver their customers a wireless connection to the net. Its increases
the employee Output by joining to a Wi-Fi network can maintain a practically constant
affiliation using their network as they move on your travels. By this, the personnel could be
better on his or perhaps her work can be completed easily. Wireless networks Expandability can
serve an improved number of clients with the same existing units suddenly. Cellular networking
saves in price and labor associated by making a physical cables.
.
LO3 be able to implement LAN infrastructures
Task 3
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
Local Area Network (LAN).
High Speed, high performance, local area network over MS/TP with MCUs and OWSs
communicate with every several directly on peer to see basis in accordance with IEEE 802.
3/Ethernet Standard.
EMCS-LAN to get: BACnet Protocol
Each EMCS-LAN to be capable of supporting at a minimum 50 devices.
Support of combination of MCUs and OWSs directly connected to EMCS-LAN.
every device is connected immediately to two other goods, 1 on either side of the usb ports.
Ring topologies are expensive and difficult to install relatively, though they offer high music
group width and will span large distances.
Star topology: All devices are actually connected to a central hub. Star networks are easy to
install and manage quite, but bottlenecks can occur because most data must pass through the
hyperlink.
Tree topology: A tree topology combines features of linear bus and star topologies. It includes
groups of star-configured work stations linked to a linear bus anchor cable. These topologies
may also be mixed. For example, a bus-star network consists of a high band width bus, called
the spine, which connects collections of slower-bandwidth star segments.
A.C 2.2 critically evaluate the suitability of LAN components
LANs a new lot of advantages such as this allows the user to access to the network resources
from close to location within their primary social networking environment such as home or
perhaps workplace. The Mobility likewise, with the emergence of open public wireless
networks, the person can access the net even outside the work environment. For instance,
most of the coffee shops deliver their customers a wireless connection to the net. Its increases
the employee Output by joining to a Wi-Fi network can maintain a practically constant
affiliation using their network as they move on your travels. By this, the personnel could be
better on his or perhaps her work can be completed easily. Wireless networks Expandability can
serve an improved number of clients with the same existing units suddenly. Cellular networking
saves in price and labor associated by making a physical cables.
.
LO3 be able to implement LAN infrastructures
Task 3
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
Local Area Network (LAN).
High Speed, high performance, local area network over MS/TP with MCUs and OWSs
communicate with every several directly on peer to see basis in accordance with IEEE 802.
3/Ethernet Standard.
EMCS-LAN to get: BACnet Protocol
Each EMCS-LAN to be capable of supporting at a minimum 50 devices.
Support of combination of MCUs and OWSs directly connected to EMCS-LAN.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
High speed data transfer costs for alarm reporting, rapid report generation from multiple
controllers, and upload/download info among network devices. Bit price to be 10 Megabits every
second minimum.
Detection and accommodation of single or perhaps multiple flops of possibly OWSs, MCUs or
network media. In company equipment to remain to perform designated functions in event of
single or simply multiple failures effectively.
Commonly available, multiple sourced, network marketing business components and protocols
allowing system to co-exist to networking applications including workplace automation.
Dynamic Data Gain access to.
LAN to provide capabilities pertaining to OWSs, either network person or perhaps connected
remotely to reach point status and application report data or carryout control functions for other
sorts of devices via LAN.
Access to data to be dependent on logical identification of building devices.
Network Medium.
A.C 3.2 implement network security on a LAN
The 802. 11 standard likewise includes provision for security to protect the personal privacy
of wireless users.
Since car radio signals can fundamentally become picked up simply by anyone with a
proper receiver, those concerned about personal privacy and security should utilize
the encryption feature built into the program.
The basic secureness procedure is called Wired Equal Privacy (WEP) and uses the
RC4 encryption typical and authentication.
WEP may be turned off or simply in by the individual. It does supply a basic level of
dependability; yet, WEP has recently been chipped by hackers and is not really
totally secure from the majority of high-tech data thieves.
Two more efficient encryption standards known as Wi-Fi Protected Access (WPA)
and WPA2 are also easily available in several forms to further increase the
encryption process.
A.C 3.3 critically review and test a LAN
The performance can be affected by several factors. You may have learned 5 significant your:
The bandwidth
The true quantity of users
The transmission press
The error rate
The latency
The Contention rate is the ratio of users compared to available group width. A bestselling
choice for a wired network is to use copper 'Ethernet' cords to carry data using electric
powered signals.
controllers, and upload/download info among network devices. Bit price to be 10 Megabits every
second minimum.
Detection and accommodation of single or perhaps multiple flops of possibly OWSs, MCUs or
network media. In company equipment to remain to perform designated functions in event of
single or simply multiple failures effectively.
Commonly available, multiple sourced, network marketing business components and protocols
allowing system to co-exist to networking applications including workplace automation.
Dynamic Data Gain access to.
LAN to provide capabilities pertaining to OWSs, either network person or perhaps connected
remotely to reach point status and application report data or carryout control functions for other
sorts of devices via LAN.
Access to data to be dependent on logical identification of building devices.
Network Medium.
A.C 3.2 implement network security on a LAN
The 802. 11 standard likewise includes provision for security to protect the personal privacy
of wireless users.
Since car radio signals can fundamentally become picked up simply by anyone with a
proper receiver, those concerned about personal privacy and security should utilize
the encryption feature built into the program.
The basic secureness procedure is called Wired Equal Privacy (WEP) and uses the
RC4 encryption typical and authentication.
WEP may be turned off or simply in by the individual. It does supply a basic level of
dependability; yet, WEP has recently been chipped by hackers and is not really
totally secure from the majority of high-tech data thieves.
Two more efficient encryption standards known as Wi-Fi Protected Access (WPA)
and WPA2 are also easily available in several forms to further increase the
encryption process.
A.C 3.3 critically review and test a LAN
The performance can be affected by several factors. You may have learned 5 significant your:
The bandwidth
The true quantity of users
The transmission press
The error rate
The latency
The Contention rate is the ratio of users compared to available group width. A bestselling
choice for a wired network is to use copper 'Ethernet' cords to carry data using electric
powered signals.
Error rate
One factor in measuring network performance is how many info mistakes happen over a given
period.
An 'error' happens when a binary 1 was dispatched, though a binary zero was received or the
several other way around actually.
Latency
Latency is the technical phrase for 'delay'. The larger the network, then the longer it will take
for a bit to travel from one point out another.
LO4 Be able to manage LAN infrastructures
Task 4
A.C 4.1 critically discuss how this LAN infrastructure will be monitored and managed (via
troubleshooting) if there is any issue during post implementation period.
New-technology deployment, the following six actions can help you help to make the fundamental
foundations of an effective proficiency monitoring strategy:
Collect
Baseline
Notify
Report
Analyze
Share
A.C 4.2 resolve LAN issues to improve security, reliability and performance
Stay in advance of outages
What causes THAT black outs? Human error, structure challenges, and environmental factors may all
contribute. Employing networking monitoring is one of the most basic and ways to prevent these black
outs from happening in the first place.
Repair issues more quickly
In a straight down situation, time is cash. Network monitoring makes problem-solving simpler and faster
intended for time-strapped network professionals.
One factor in measuring network performance is how many info mistakes happen over a given
period.
An 'error' happens when a binary 1 was dispatched, though a binary zero was received or the
several other way around actually.
Latency
Latency is the technical phrase for 'delay'. The larger the network, then the longer it will take
for a bit to travel from one point out another.
LO4 Be able to manage LAN infrastructures
Task 4
A.C 4.1 critically discuss how this LAN infrastructure will be monitored and managed (via
troubleshooting) if there is any issue during post implementation period.
New-technology deployment, the following six actions can help you help to make the fundamental
foundations of an effective proficiency monitoring strategy:
Collect
Baseline
Notify
Report
Analyze
Share
A.C 4.2 resolve LAN issues to improve security, reliability and performance
Stay in advance of outages
What causes THAT black outs? Human error, structure challenges, and environmental factors may all
contribute. Employing networking monitoring is one of the most basic and ways to prevent these black
outs from happening in the first place.
Repair issues more quickly
In a straight down situation, time is cash. Network monitoring makes problem-solving simpler and faster
intended for time-strapped network professionals.
Gain rapid ROI
IT clubs face heavy workloads and complex projects increasingly, typically without the ideal time,
personnel, or budget needed to full them. The right network monitoring tool can deliver quick ROI.
Without the need to manually drill down into network functionality, personnel have time back in all
their day to work on even more critical projects.
Manage developing, changing networks
With technology advancement and the rise in linked devices, today's THIS conditions are growing in size.
The real number of Internet-connected things is definitely expected to reach 20. Four billion by 2020,
relating to one Gartner report
Recognize security threats
When you don't budget for intrusion detection software program, but still want a tier one particular
strategy to help protect against info breaches, network monitoring can certainly help secure your
business-critical info.
A.C 4.3 critically evaluate the performance of a LAN
It can be pricey and time consuming implementing network management units which claims to do
everything. This results in headaches for network executives and can result in wasted cash. In my view,
you have to find the basics right before you consider purchasing one of the many types of networking
management systems that presently exist. This list sets out the top 10 problems that you must do to
manage your network effectively.
Create a fantastic items of your most important systems.
Build a noticeable change control method
Be aware of compliance standards.
Experience a map with position icons
Look at dependencies
Set up alerting
Decide on security and standards for getting network details
For all significant systems and applications
Don't forget about your network perimeter
Have a process or perhaps system for tracking units and users
Reference
[1] William Stallings, 2005, Wireless Communications and Networks, 2nd Edition,
Pearson Prentice Hall
[2] Jorge Olenewa, Mark Ciampa, Wireless# Guide to Wireless Communications,
IT clubs face heavy workloads and complex projects increasingly, typically without the ideal time,
personnel, or budget needed to full them. The right network monitoring tool can deliver quick ROI.
Without the need to manually drill down into network functionality, personnel have time back in all
their day to work on even more critical projects.
Manage developing, changing networks
With technology advancement and the rise in linked devices, today's THIS conditions are growing in size.
The real number of Internet-connected things is definitely expected to reach 20. Four billion by 2020,
relating to one Gartner report
Recognize security threats
When you don't budget for intrusion detection software program, but still want a tier one particular
strategy to help protect against info breaches, network monitoring can certainly help secure your
business-critical info.
A.C 4.3 critically evaluate the performance of a LAN
It can be pricey and time consuming implementing network management units which claims to do
everything. This results in headaches for network executives and can result in wasted cash. In my view,
you have to find the basics right before you consider purchasing one of the many types of networking
management systems that presently exist. This list sets out the top 10 problems that you must do to
manage your network effectively.
Create a fantastic items of your most important systems.
Build a noticeable change control method
Be aware of compliance standards.
Experience a map with position icons
Look at dependencies
Set up alerting
Decide on security and standards for getting network details
For all significant systems and applications
Don't forget about your network perimeter
Have a process or perhaps system for tracking units and users
Reference
[1] William Stallings, 2005, Wireless Communications and Networks, 2nd Edition,
Pearson Prentice Hall
[2] Jorge Olenewa, Mark Ciampa, Wireless# Guide to Wireless Communications,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
2nd Edition, Thompson Course Technology. ISBN-13 978-1-4188-3699-3
[3] William Stallings, 2004, Data & Computer Communications, 7th Edition,
Prentice Hall
[4] William C. Lee, 2005, Wireless and Cellular Telecommunications, 3rd edition,
McGraw Hill
[5] Fred Halsall, 2005, Computer Networking and the Internet, Addison Wesley
[6] T.S. Rappaport, 2002, Wireless Communications: Principles & Practice, 2 nd
Edition, Prentice Hall
[7] W.C.Y. Lee, 1998, Mobile Communication Engineering
[8] Abramson, N., THE ALOHA SYSTEM: another alternative for computer communications. In
Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston,
Texas, November 17 - 19, 1970). AFIPS ‘70 (Fall). ACM, New York, NY, 281-285.
[9] Berners-Lee, T., Information Management: A Proposal, March 1989
[10] Baran, P., On distributed communications series,
http://www.rand.org/about/history/baran.list.html,
[3] William Stallings, 2004, Data & Computer Communications, 7th Edition,
Prentice Hall
[4] William C. Lee, 2005, Wireless and Cellular Telecommunications, 3rd edition,
McGraw Hill
[5] Fred Halsall, 2005, Computer Networking and the Internet, Addison Wesley
[6] T.S. Rappaport, 2002, Wireless Communications: Principles & Practice, 2 nd
Edition, Prentice Hall
[7] W.C.Y. Lee, 1998, Mobile Communication Engineering
[8] Abramson, N., THE ALOHA SYSTEM: another alternative for computer communications. In
Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston,
Texas, November 17 - 19, 1970). AFIPS ‘70 (Fall). ACM, New York, NY, 281-285.
[9] Berners-Lee, T., Information Management: A Proposal, March 1989
[10] Baran, P., On distributed communications series,
http://www.rand.org/about/history/baran.list.html,
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.