WAN traffic intensive services – My Assignment Tutor

Critically evaluate the following WAN technologies; dial-up, broadband, Frame Relay (FR), ADSL (Asymmetric Digital Subscriber Line), ISDN (Integrated Services Digital Network), MPLS (Multiprotocol Layer Switching), interior routing protocols, exterior routing, static routing, routers, layer 2 aggregators, servers, cabling systems, modems, transceivers, satellite uplinks, 3G, 4G, 5G and VPN concentrators x Critically analyse the following WAN traffic intensive services and their performance; quality of service management eg DSCP (Differentiated Service Code Point), IP precedence, queues, base rules, congestion management; quality of service need eg Voice over IP, video streaming and audio streaming Evidence should be ready by week 2 for formative assessment. Critically evaluate the following WAN security; MD5 hash (Message Digest algorithm 5), broadcast reduction, filters, traffic rules, firewalls, access control lists, directed updates, tunnelling x Critically evaluate the importance of trust systems in WAN which include trust of intermediary system, trust of remote systems and trust of networks on WAN. Using Microsoft Word, plan, design and evaluate the number of devices, users, bandwidth (load balancing), applications (software), scalability (future growth), technology (network design) and security (protocols, authentication and tunnelling). x Your answer should include a spreadsheet detailing the costing of your network & PC hardware (do not include details of the labour charges for installation). You may assume Cat5e (or higher specification) cable costs 20p per meter and FO cable costs £2.00 per meter (all types). Include a costing for the Internet connection from your ISP.Using the plan designed in TASK 2 above, now use Cisco Packet Tracer to build and test your WAN  x Implement network security  on the WAN Critically analyse your WAN performance with particular reference to network monitoring tools, user access, traffic analysis, bandwidth monitoring, checking configuration, checking rules to improve security, reliability and performance. x Resolve any issues using troubleshooting methodology x Critically evaluate your whole project/design and propose at least five recommendations to improv


Leave a Reply

Your email address will not be published. Required fields are marked *