24 x 7 Online Help
Switching And Wireless Networks
Get Free Samples Written by our Top-Notch Subject Experts For Taking Online Assignment Help Services
This report is based on the design of the network system in CISCO software and the behaviour analysis between the two different protocols of the network system. This entire report is divided into two different tasks. In task 1, the behaviour of the two different protocols is required to be analysed and design also should be done for the two different protocols. The two protocols have been designed in the LAN. In task 2, the designing and the implementation of the switch network has been done where the different switch has been used to connect the different access points of the different floors with the router of the respective floors.
In this particular section, the behaviour of the designed protocols has been analysed and the result of the analysis has been discussed in this particular section. Two different protocols have been created in the “Local area network”, and the behaviour of these two protocols has been analysed with the proper simulation. The sample PDU has been transferred from one protocol to the note protocols. It has been observed that the PDU has been sent to the switches, and then they are sent to the different routers for the respective floors. The PDU has been submitted to the other protocols that have been observed.
In the above figure, it has been observed that the behaviour analysis of the two different protocols have been visualized where the different sections have been seen for the respective floors. It has been seen in the above figure that the distribution layer has been modified where the PDU transfer from one protocol to the another protocol has been done. The successful analysis has been done and the successful package transfer can be seen between the two different protocols of the LAN connection network. The different results of the two different protocols have been observed and behavioural changes are seen in the designed network. The four different floors have been created for the between systems and the respective section of the different floors hsv been specified. That particular specification has been done to make the different floors more identical for the user.
This particular section comprises the different implementations and the designing of the switch network system within the LAN. The implementation has been done for different purposes to switch the entire network.
From the above figure, it has been observed that the different switches have been used for the respective floor. The different departments of the different floors have been specified where the different access points has been used. There are different elements present in the entire network system where the different switch and the different access point has been used. The multi-layers switches have been used to define the different layers of the entire network system of the organization.
In the mentioned figure it has been seen that the four different routers have been used for the different floors. These specific routers have been utilized to connect the different floors with each other. There are automatic connections that have been done between the routers. The routers of the respective floors have been connected with the multilayer switch that has been done to connect the access point’s layer and the distribution layer of the respective floors. The proper authentication of the user in the network system has been implemented where the user ID and password has been given for authenticity.
From the above figure, it has been observed that the simulation panel has been displayed for the designed network system. The simulation panel shows the usage of the different devices that are connected to the routes of the respective floors. The type of the signal has been seen in the panel of the simulation results. The different types have been specified like DTP, and STP. These two types of signals can be observed during the simulation process of the entire network system that is seen in the entire result of the simulation. The different devices rea in use of the network system where in the Lan connection the d two protocols have been used and the different advance arrangement has been implemented for the different types of challenges. The risk management of the network system is also a huge factor for the organization, the network should be secure enough so that the different cyber attacks cannot be done easily for the designed network system. There are different advanced tools that are easily available from the different types of hacking. The attackers are able to hack the entire network system if the network system is not secured enough for the respective challenges. Different analysis has been done for different analysis method. The behavioural change of the two different topologies have been observed for the LAN network system that is designed for the specific organization, The different challenge has been estimated solved during the designing of the system.
From the entire report, it can be concluded that the network diagram has been designed in the CISCO packet tracer software. The different floors have been used for the network diagram so that the entire design looks more realistic and also can be implemented in different real-life scenarios. The entire report has been divided into two different tasks. The main objective of the first task has been done successfully. In the first task, the behaviour analysis has been done where the behaviour changes of the respective protocols have been analysed. On the other hand, the objective of the second task also has been achieved where the different implementation of the switch network system has been done for the different analysis. The main objective of this report has been done and the result has been analysed for the entire network system. The different designing and the implementation has been done where the different analyses of the behavioural change have been observed.
Al-Khraishi, T., & Quwaider, M. (2020). Performance evaluation and enhancement of VLAN via wireless networks using OPNET modeler. arXiv preprint arXiv:2007.06997. Retrieved on: 06-06-2022, Retrieved from: https://arxiv.org/pdf/2007.06997
Hasan, M., Anik, M. H., Chowdhury, S., Chowdhury, S. A., Bilash, T. I., & Islam, S. (2019). Low-cost appliance switching circuit for discarding technical issues of microcontroller controlled smart home. International Journal of Sensors and Sensor Networks, 7(2), 16-22. Retrieved on: 06-06-2022, Retrieved from: http://article.ijossn.org/pdf/10.11648.j.ijssn.20190702.11.pdf
Hoang, T. M., Nguyen, B. C., Thang, N. N., Tran, M., & Tran, P. T. (2020). Performance and optimal analysis of time-switching energy harvesting protocol for MIMO full-duplex decode-and-forward wireless relay networks with various transmitter and receiver diversity techniques. Journal of the Franklin Institute, 357(17), 13205-13230. Retrieved on: 06-06-2022, Retrieved from: https://www.researchgate.net/profile/Ba-Nguyen-4/publication/346034279_Performance_and_optimal_analysis_of_time-switching_energy_harvesting_protocol_for_MIMO_full-duplex_decode-and-forward_wireless_relay_networks_with_various_transmitter_and_receiver_diversity_techniques/links/5fb790ad458515b79755e7c3/Performance-and-optimal-analysis-of-time-switching-energy-harvesting-protocol-for-MIMO-full-duplex-decode-and-forward-wireless-relay-networks-with-various-transmitter-and-receiver-diversity-techniques.pdf
Nguyen, C. T., Van Huynh, N., Chu, N. H., Saputra, Y. M., Hoang, D. T., Nguyen, D. N., ... & Hwang, W. J. (2021). Transfer learning for future wireless networks: A comprehensive survey. arXiv preprint arXiv:2102.07572. Retrieved on: 06-06-2022, Retrieved from: https://arxiv.org/pdf/2102.07572
Sur, S., Pefkianakis, I., Zhang, X., & Kim, K. H. (2018, October). Towards scalable and ubiquitous millimeter-wave wireless networks. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (pp. 257-271). on: 06-06-2022, Retrieved from: https://dl.acm.org/doi/pdf/10.1145/3241539.3241579
Tin, P. T., Nguyen, T. N., Tran, D. H., Voznak, M., Phan, V. D., & Chatzinotas, S. (2021). Performance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks. Sensors, 21(11), 3847. Retrieved on: 06-06-2022, Retrieved from: https://www.mdpi.com/1424-8220/21/11/3847/pdf
Tran, H. Q., Phan, C. V., & Vien, Q. T. (2020). Power splitting versus time switching based cooperative relaying protocols for SWIPT in NOMA systems. Physical Communication, 41, 101098. Retrieved on: 06-06-2022, Retrieved from: https://eprints.mdx.ac.uk/29647/1/TQH-Final.pdf
Vasjanov, A., & Barzdenas, V. (2018). A review of advanced CMOS RF power amplifier architecture trends for low power 5G wireless networks. Electronics, 7(11), 271. Retrieved on: 06-06-2022, Retrieved from: https://www.mdpi.com/2079-9292/7/11/271/pdf