3G, 4G, 5G and VPN concentrators

Critically evaluate the following WAN technologies; dial-up, broadband, Frame Relay (FR),

ADSL (Asymmetric Digital Subscriber Line), ISDN (Integrated Services Digital Network), MPLS

(Multiprotocol Layer Switching), interior routing protocols, exterior routing, static routing,

routers, layer 2 aggregators, servers, cabling systems, modems, transceivers, satellite uplinks,

3G, 4G, 5G and VPN concentrators

x Critically analyse the following WAN traffic intensive services and their performance; quality of

service management eg DSCP (Differentiated Service Code Point), IP precedence, queues, base

rules, congestion management; quality of service need eg Voice over IP, video streaming and

audio streaming

Evidence should be ready by week 2 for formative assessment.

Critically evaluate the following WAN security; MD5 hash (Message Digest algorithm 5),

broadcast reduction, filters, traffic rules, firewalls, access control lists, directed updates,

tunnelling

x Critically evaluate the importance of trust systems in WAN which include trust of intermediary

system, trust of remote systems and trust of networks on WAN.

Using Microsoft Word, plan, design and evaluate the number of devices, users, bandwidth (load

balancing), applications (software), scalability (future growth), technology (network design) and

security (protocols, authentication and tunnelling).

x Your answer should include a spreadsheet detailing the costing of your network & PC

hardware (do not include details of the labour charges for installation). You may assume Cat5e

(or higher specification) cable costs 20p per meter and FO cable costs £2.00 per meter (all

types). Include a costing for the Internet connection from your ISP.Using the plan designed in TASK 2 above, now use Cisco Packet Tracer to build and test your WAN

x Implement network security  on the WAN

Critically analyse your WAN performance with particular reference to network monitoring

tools, user access, traffic analysis, bandwidth monitoring, checking configuration, checking rules

to improve security, reliability and performance.

x Resolve any issues using troubleshooting methodology

x Critically evaluate your whole project/design and propose at least five recommenda

Reference no: EM132069492

GET HELP WITH YOUR PAPERS

GET THIS ANSWER FROM EXPERTS NOW

WhatsApp
Hello! Need help with your assignments? We are here
Don`t copy text!