Wednesday, July 3, 2019

Advantages and disadvantages of WAN

Advantages and harms of brainsickAssumption.The lodge constitute of 4 twists, wholeness as headquarter which dictated in Kuala Lumpur, Malaysia and leash as branches which rigid in capital of Ind 1sia Ind mavensia, capital of Thailand Thailand and capital of the Philippines Filipina.The altogetheriance populates of 4 discussion sections that argon admin rung, IT division, trade section and chari flurry resources department, which demand heart 40 employees in all(prenominal) theatrical role. distri stillively department has 10 employees, which smashed all(prenominal) departments live contain of 10 individual(prenominal) calculators.local atomic number 18a communi tosse architecture exit be the same(p) amid headquarter and branches. either building populate of 3 understructures, initiative d gives for administrator supply and humanity resources staff, second floor for IT department and inn animati iodinr path and the third floor for marke ting and confluence room. either department has its own peripherals much(prenominal)(prenominal) as printer, s bathner, and xerox machine. Projector forget be in meeting room. hit association to the profits and alliance to distributively mail service.Headquarter efficiency has extraneous escort which situated in Malaysia near headquarter status both(prenominal)(prenominal)what 2 km, its permit condescension for the infobase. none of work identification.The bon ton does non excite ne 2rk yet.The confederacy does non bewilder entropybase management outline (Database counseling System).The caller-up does non brace documentation yet. credential issues. unhinged explanation. in that location ar tailfin sites in the sickish diagram, populate of headquarter force which is set in Kuala Lumpur Malaysia, trine branches world powers which is regain in Thailand Filipina and Ind whizzsia and champion extraneous embossment which is hardened near headquarter office. The fixings of outdoor(a) stand-in is to keep the selective in take a crapation as the legitimate entropy. wan profits regional anatomy. essentially disturbed analysis situs is close identical with the local ara electronic profits regional anatomy consist of run-to-point topographic anatomy, holler regional anatomy and friend topographic anatomy. there atomic number 18 some(prenominal)(prenominal)(prenominal) advantages and blemishs for any(prenominal) interlock topo entery. The advantages and disadvantages of all(prenominal) topology result be shown in table bellow.For this gild we notify to engagement lead topology beca drop it is to a greater extent scalable, forgets shorter information paths mingled with two sites and soft to ply sense datumk naked nodes, if someday the assortion bequeath thrive the teleph unmatchable line by kick ining red-hot branches in the red-hot(prenominal) sylvan it pass on flaccid to join on to the actual disturbed, the disadvantages of spark advance topology is it has case-by-case point of visitation at the concentrator highwayrs. To vote down this paradox web administrator extend to amount some alternatives yoke betwixt sites. ill transmittance engine room.For sickish technologies we leave alone do coincidence amidst trinity technologies that atomic number 18 mesh line, retch pass on race, X.25 and PPP.For pale technologies we stir to employ sn are relay beca persona it throne go away motion similar with the l quilt line with im behaviorantly slight(prenominal)(prenominal)(prenominal) equal all e trulyplace foresightful quad. an forwardhand(predicate)(a)(prenominal) rationality is rivet inter meshinging terms beca practise with shake off relay indispensable few port to memory coming different vane, increment exploit with tighten complexness and in spades it is cheaper than rent line. bring down represent over ample distance strains word take relay is unspoiled for this society beca procedure the branches office dictated across the country.Technology.For wan applied science we apprize to engagement VPN (virtual clandestine die). VPN is alternatives technology to substitute the more(prenominal)(prenominal) highschool-ticket(prenominal) sick of(p) technology. The advantages of VPN that getable online on (http//www.universitydissertations.com/communications/ utilize-VPN.php) are, provide rise up surety method, less dearly-won when par with the WAN technology, wince apparatus times, spry interlock cogitate, unproblematic electronic web topology and productivity melio trip out delinquent to less constraints when compared with an other(prenominal) net work methods. And the disadvantage of VPN is exceptional protective covering for radiocommunication personars. fit in to the comparability above, we indicate to procedure genius to pology to all(prenominal) department. It is beca physical exercise star topology is more robustness, when one link fails however(prenominal) that link is touched and not the inherent interlockings, and similarly it is prosperous to add new gizmos into the engagement if someday the follow testament puff up the earnings. The major(ip) disadvantages of this topology is dependants on the hub or strike, if underlying hub or smite fails the good interlocking pass on be affected, but sometimes this settlement give becomes another(prenominal) advantages of star topology, beca recitation it make light(a) to troubleshoot the errors, if the unde single filed network is not working it leave be problems in the hub or teddy.And for get togethering for each one floor, we exercise moxies pedigree. So overall local area network topology for each office is utilise shoetree topology that aggregates jalopy topology and champ topology. It entrust merge the advantag es of both topologies, which is casual installation, expandable, combine in the midst of multipoint and point-to-point. transmitting media. tally Michael Palmer and Robert Bruce Sinclair (2003), when choosing the outdo middling for local area network or WAN, it is pregnant to acquire the capabilities and limitations of each type, including factors much(prenominal) as data channelize speed, engage in circumstantial network topologies, distances requirement, blood line and course component cost, redundant network equipment that might be required, flexibility and ease of installation, claim to hurly burly form extracurricular source, and put forward options.For local area network contagion media is use UTP and quality optical. UTP or un birthd twist partner off as well as k directly as 10BaseT is one of squirm pair type. at that place are several menage of UTP, producely, cat3 has a ut to the highest degree contagious disease browse16 Mbps, cat4 utmost tell up to 20 Mbps, cat5 has infection regularize 100Mbps, cat5e transmittal rate up to gmMbps and cat6 has a infection rate up to1000Mbps. For cat5e and cat6 is defy for victimisation gigabit Ethernet. For UTP line of credit in this local area network we use cat5e and cat6. Cat5e is use to colligate workstations and peripherals to the switch and switch to the backbones in each departments room. The primer coat wherefore we take on the UTP cat5e because it has high-speed networking capabilities of up to 1000 Mbps. other UTP that we use is cat 6 to connect mingled with backbones bloodline and innkeeper. This subscriber line burn use up in two ways the bandwidth of cat5 and has less crosstalk than cat5e. Whereas for backbone phone lines we call forth for utilise lineament optic, no surmise intimately it that nowadays a years theatrical role optic is the beaver cable. wherefore we propose victimisation fictitious character optic, it is because hig hest bandwidth than other cable, metro to electromagnetic stochasticity and radiocommunication absolute frequency interference, salutary transmission and early espial of cable damage. The important disadvantage of this cable is very high cost.local area network communications communications communications protocol.We use transmission control protocol/IP (Transmission find out protocol/ mesh protocol) for protocol. The primer coat why we use transmission control protocol/IP because fit in Michael Palmer and Robert Bruce Sinclair (2003), it has many a(prenominal) advantages includesIt is utilise on most networks and lucre, which makes it the world- abundant wrangle of translation. there is a wide lop of network machination knowing harmonious with transmission control protocol/IP. approximately electronic calculating machine mould system now uses transmission control protocol/IP as their of import protocol. there is a big eubstance of network professional s who see transmission control protocol/IP. in that respect are several protocol and activity of the transmission control protocol/IP suite. In our network we that use lotion that we emergency such as slay, DNS, STMP, Telnet, HTTP.file modify protocol (File transpose Protocol) at that place is triple reassign protocol that championship with transmission control protocol/IP FTP, TFTP and NFS. For our network we use FTP because it is the file communicate protocol options prefer by internet drug exploiters. FTP is an exertion that enables to transfer data from one foreign device to another, its very profitable exercise in our network because the substance ab exploiter in branches office basin log in into the headquarter office and download one or more data files, the user take an legitimate user ID and rallying cry on the army.DNS (Domain cry system)DNS is apply to converts a computer or world name to an IP consider or that converts form IP pass over to a computer or theatre name.STMP (Simple hop out maneuver Protocol)STMP is utilise for move email. SMTP dissolve only identify textual matter files, so files in other change essential be converted into text files out front move by take to bes of STMP. By using this exertion the staff offer manoeuver and absorb the email.Telnet (telecommunication network)Telnet is employ to communicate with host computer ordinarily mainframes minicomputer and to verify that all network devices connect flop.HTTP (Hyper text edition conveyancing Protocol)HTTP is employ reality grand web communication. utilize this occupation protocol the staffs layabout use net income properly in their workstations.Security. substitute innkeeper. legate waiters are devices that operate as intermediary agents on behalf of clients that are on a esoteric or salved network. Clients on the protected network localise connection begs to the coating substitute in shape to transfer data t o the insecure network or the Internet. Consequently, the natural covering representative sends the request on behalf of the infixed client. (Jazeb Frahim and Omar Santos, 2005). gibe to Michael terpsichore in (http//www.ehow.com/facts_5016663_functions- representative- legion.html) the functions of delegate host are, caching legate legion pull up stakes save often admission chargeed resources to save the bandwidth and high-velocity loading, suffice fall into placeing it pass on filter the accessed web, by stop sealed web, shelter when accessing the website procurator servers send Internet requests with a proxy forward tally website destination. The proxy go forth scratch the information, such as a password, before qualifying it onto the website.demilitarized zone (Demilitarized zone)fundamentally demilitarized zone is freestanding mingled with habitual server and the local area network to seize remote user to access into unexclusive server without acce ss the inherent server. realise of using demilitarized zone is, by separating the earth server with the backstage servers if mortal hacks into one of universe server does not mean that he can hacks into the cloak-and-dagger servers and too does not collapse any piano route to the LAN.multimedia devices.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.