Ask a question from expert

Ask now

The Use and Importance of Network Monitoring Tools

25 Pages5245 Words53 Views
   

Added on  2020-02-14

The Use and Importance of Network Monitoring Tools

   Added on 2020-02-14

BookmarkShareRelated Documents
Wide Area Networking Technology1Wide Area Networking TechnologyStudent’s Name: Instructor’s Name: Date:
The Use and Importance of Network Monitoring Tools_1
Wide Area Networking Technology2ContentsTask 1..........................................................................................................................................................2Wide Area Network.................................................................................................................................2The point to point connection.................................................................................................................3SWITCHING..............................................................................................................................................4Circuit Switching......................................................................................................................................4Packet switching......................................................................................................................................5WAN virtual circuits.................................................................................................................................6WAN dialups, devices and switches.........................................................................................................6WAN protocols........................................................................................................................................6Frame Relay Technology..........................................................................................................................6Private Line Technology...........................................................................................................................7NAT and PAT............................................................................................................................................7ATM.........................................................................................................................................................7WAN is open to many security threats and performance degradation; discuss WAN concerns in terms of network reliability, security and performance. Include a critical evaluation of different trust systems.....71.1 QoS....................................................................................................................................................71.2 WAN Problems..................................................................................................................................9Trust Systems in WAN.......................................................................................................................102.1 Design with the aid of diagram the WAN network infrastructure to meet the requirement of the above scenario..........................................................................................................................................10Connectivity Options – devices..............................................................................................................11Topology................................................................................................................................................12QoS profiles.......................................................................................................................................13Servers...............................................................................................................................................13DHCP Service Configuration...............................................................................................................14Inline Power.......................................................................................................................................142.2 Evaluation with respect to reliability, availability, cost and scalability [5].......................................143.1 The company director asked you to build and configure the WAN infrastructure to meet your designed WAN infrastructure....................................................................................................................15Device configuration..............................................................................................................................15Security..................................................................................................................................................16Technology............................................................................................................................................173.2 Finalize the process of implementation and show the suitability of your network design..................19
The Use and Importance of Network Monitoring Tools_2
Wide Area Networking Technology3Testing [7]..................................................................................................................................................194.1 There are many tools available in the market to monitor the performance and network security. Explain the use and importance of network monitoring tools. Include some examples of troubleshootingby using one of the tools you selected......................................................................................................204.2 Wide area network known to be open for many external threats, produce a report to improve on security, reliability and performance.........................................................................................................21References.................................................................................................................................................23Task 1We will cover the protocols and technologies that are involved in the implementation longdistance networks (WAN - Wide Area Network). This will touch on the basis for long-haulnetworks, types of services provided, and encapsulation Optional Links. We also discuss thepoint to point links, the switch packets and virtual circuits.Wide Area NetworkA WAN is a data communications network that operates beyond the field of LANs action. Widearea network is spanned over large geographic area and may comprise of several LAN’s.
The Use and Importance of Network Monitoring Tools_3
Wide Area Networking Technology4A WAN uses data links, such as Digital Networks Integrated Services (ISDN), ATM, DSL, X.25and Frame Relay to access bandwidth across a large area geographical. A WAN connects thedifferent units of a company, or connects different units to units belonging to other companies,external services (Databases, etc.), remote users. WAN connect LANs together, or remoteconnecting sites. It can be installed in several countries or worldwide. Ultimately, the WANsoperate beyond the geographical area of LAN. By this feature, the WAN transport a range ofinformation, such as data, voice, images, etc. Different WAN technologies are point to pointlinks, switching (packet switching and circuit switching), WAN virtual circuit, WAN dialupservices and devices. Some of them are discussed below:The point to point connectionThe point to point connection is fixed and permanent in nature to connect two computers spacedfrom each other in a network. It is also known as lease line. Pont to point connection is dedicatedconnection between to devices so that better speed and reliability in data transmission can beachieved. Figure 1 illustrates this type of connection.Figure: Diagram of a point to point connectionData can be transmitted through the connection in following two ways:(1) Datagram transmission: data is transmitted in packet of variable lengths so thatbandwidth can be used more appropriately.
The Use and Importance of Network Monitoring Tools_4
Wide Area Networking Technology5(2) Data stream transmission: data is transmitted as in form of continues byte streamswhich are buffered at receiver end to compose as a message.The advantage of using point to point connection link is that clients in organization gets thededicated connection which is fast but it is possible than whole bandwidth may not be used byclient. As a result, it is more expensive per client in comparison of switching technologies.SWITCHINGSwitching involves moving data to through a series of intermediate steps, or segments, ratherthan by direct displacement a starting point to a finishing point. The switching instead ofdepending on a permanent connection between the source and the destination, it relies on a seriesof temporary connections that relay messages from station to station. It serves to same purpose asthe direct connection, but with more efficient use of resources transmission. WANs (and localnetworks like Ethernet and Token Ring (token ring) depend first on the packet, but they alsomake use of the switching circuit, message switching, and more recently, high speed packetSwitching technology, known as the cell relay naming (Cell relay).Circuit SwitchingCircuit switching corresponds to the creation of a physical connection between the sender andrecipient which is preserved and maintained through the carrier network to provide thecommunication for the session. For it to happen, prior installation of connection and allocation ofbandwidth is necessary. Its main drawback is that of any unused bandwidth. Since the connectionis limited to two communicating parties, unused bandwidth can be "borrowed" by any othertransmission. Circuit switching is more like the telephone calls. ISDN is the example of circuit
The Use and Importance of Network Monitoring Tools_5
Wide Area Networking Technology6switching. It is also involved in some networks.Figure 1: Diagram illustrating the circuit switchingPacket switchingPacket switching is the another variant of switching technology in which all the network devicesare arranged to provide the point to point link between the source and destination so that packetcan be routed in the path. Asynchronous Transfer mode (ATM) and frame relay are the two wellknown example of packet switching.
The Use and Importance of Network Monitoring Tools_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment Health Care Informatics
|11
|2005
|131

BHIS 515: Biomedical and Health Information Sciences
|10
|2029
|40

Towards Wide Area Networking Technologies
|18
|5262
|451

Riordan Network Security Recommendations Assignment
|5
|923
|161

Networking Technology Revision Questions - Desklib
|2
|554
|210

Networking Fundamentals : Assignment
|3
|1964
|98