You are on page 1of 3

not reached.

In case of switches no collision will occur when data is passed


simultaneously. So it will solve the issue of low performance and hubs
disadvantages would also be replaced and will overcome the latency
problem. Gigabit Ethernet is much more efficient then simple Ethernet
normally transmits data at very high speed normally at the rate of three
times then simple Ethernet. Although it is not easy to shift from hubs to
switches as hubs are cheap but it requires simply the deployment of switches
over the previously present hubs or wiring and this replacement will handle
the speed provided by Ethernet or gigabit Ethernet. Gigabit Ethernet switches
are very useful they will also prevent high traffic between network and its
core. Gbe is a technology of LAN that can also be used for achieving high
performance in this scenario as Gbe can be applied to both in both cases to
switched backbones as well as routed backbones. (Chowdhury, 2013).
Task 2
TRAFFIC INTENSIVE SERVICES:
Traffic Internet Services (TIS) constitute of services like QoS (Quality of
Service) and these services attempt to bring out the best output out of the
available resources in a network. (E.g. Routers)
These are also very important services as far as a network for an organization
is concerned.
Quality of Service (QoS) is the traffic internet service for networks. It is
basically a set of standards and ways to ensure high quality and critical
performance of the critical applications like mentioned in the scenario. The
utilization of resources can be more efficient that are already present by
using this mechanism or procedure and the required performance level or
service required is achieved with over provisioning their networks or with
without expanding.
Basically, the quality of service means that all the network traffic is treated
equally in case of networks. The result of this is that the traffic of network
achieves the networks best effort and there are no guarantees for delay,
variation in the delay or other characteristics of performance. An application
with the single bandwidth with the best effort service of delivery may result in
inefficiency or poor performance for any application. Or we can say that the
performance level is unacceptable. This is the concept in which it is observed
that the requirements of users and some applications are critical than the
others, and this means that some traffic needs special and preferred
treatment.
The goal and major purpose of quality of service is to give the delivery
service which is preferential for any of the application which needs it by
ensuring it bandwidth which is sufficient for this, to control jitter or other
problems like latency etc. and reduces loss of data across application.
(Anon., 2003)

To control memory efficiency


There are two stages of introduction of new standards in memory that is
dynamic. The first stage includes different requirements like to improve the
bandwidth or cost per bit. And the target for the second one is double then
this generation.
The second stage is to duplicate the above mentioned generation
performance but it takes very low power. And these memories that require
low power are called as Low Power (LP) or Mobile DDR. (Mace, 2009)
Exploration of Performance
With the limitations of power and cost for the system of memory, there is
problem that the guarantee of latency to elements that are processing in the
system by over engineering the system and the bandwidth cant be offered
by the system architects. These both that is the latency and the bandwidth
depends on the traffic that is interconnected from other elements that are
processing in the system. So the major purpose or the key purpose of the
verification process should always consider variations in traffic profiles from
the elements that are processing. This will definitely increase the task of
verification. This efficiency will depend on the traffic characteristic that is
arriving at the controller of memory. This will include:
The length of burst
Distribution of address
Distribution of read and write
And the throughput
So the profile of traffic that is generated or produce to represent the
elements that are processing in the system share the characters that are
similar or identical. These characteristics are usually determined by the
characteristics of the elements that are processing and codes that are
executed on it. (Mace, 2009).
Some other facts that effect the performance are
The latency of disk can also effect the performance
Balance the loads of work among storage ranks
The performance of server can affect the storage
Task 3
Factors effecting LAN security
Wireless local area networks are different from the LANs that are hard wired.
This differs in the reference model in terms of physical and data link layers of
the open system interconnect reference model. In case of hired wired LANs

when they are attacked the perpetrator needs access to medium of


communication physically either through the cables or through the telephone
closet these cables basically connect the network. In contrast to this the
wireless LAN communicates through the air, it will emanates the signal in the
air and this will require more sophisticated techniques. There are several
different factors that should be considered while wireless LAN security is
being evaluated, these factors includes physical configuration, type of
transmission, and service availability.
The Physical Configuration
As we know that wireless LAN is better than wired one as it gives the user
more flexibility in changing the terminal configuration if we consider it rom
operational point of view. But when we consider this in terms of security this
flexibility in wireless LAN provides more risks of attacks that are very
potential in nature.

You might also like