Health Systems, Inc. Maternity Wing LAN Project
Health Systems, Inc. Maternity Wing LAN Project
Installing a new local area network for an organization requires the technical people involved to make a plan for the project such that the requirements for the work will be rationally decided and acquired appropriately. This avoids wastage of resources and time. In this particular project, the new maternity wing has 115 employees, where 85 have desktops while the rest will be working using personal computers. The following is a summary of what was discussed with the CIO.
Hierarchical topology (tree topology)
The network topology to be employed in this local area network is the Hierarchical topology, also known as the tree network topology. This entails a hybrid that is composed of two or more star networks via a bus network (Ding et al., 2018). Each star network involves a local area network with a work station nodes server or central computer connected to it. The central computer of the star network is linked to the main network cable known as the bus. Every node of the tree network contains some child notes which can be added or removed from the work stations (Rainoff, n.d.).
Moreover, the whole star station can be removed without affecting others. The best aspect of this topology is that the failure of one work station cannot change the rest of the stations. Moreover, this network is relatively inexpensive and easy to set up. Furthermore, it provides functionality for the organization and subnetting of the IP address allocation within the network.
Devices to be used
A hub
One of the devices to be used is a hub. A hub entails a physical layer device that connects two or more user stations each through a dedicated cable. The centers create the physicalstar network while simultaneously maintaining the ring configuration or the logical bus of the local area network.A hub works at the physical layer (layer 1) of the OSI model(Rainoff, n.d.).
Repeater
The repeater is also another device that will be used in the project. It is a physical layer device that is used in linking the media sections of an extended network. It enables a series of cables to be treated like one single cable. A repeater can receive signals from one network section; they amplify it, retransmit and retime to a different segment, which leads to the prevention of signal deterioration caused by long lengths of cables. The repeater is found at the physical layer (layer 1) of the OSI model.
A LAN extender
This is a remote access switch with multiple layers which links to the host router. This device functions to forward the traffic from all the standard network layer protocols, for instance, IPX apple talk and IP, and they also filter traffic based on MAC address or the network layer type of contract. Th LAN extender is found in the second layer of the OSI(Rainoff, n.d.).
Bridges
The bridge functions in analyzing the incoming frames decide onforwarding based on the information contained in the frames, and also, the device forwards the frames towards their destination.In some cases, such as source-route bridging, the entire path to the destination is contained in each frame(Rainoff, n.d.). The bridges operate at the Data-Link Layer of the OSI Model. Bridges operate on MAC-Layer addresses.
Switches
The switches operate under the data link layer of the OSI model. Similar to the bridges, they enable the different physicalLAN segments to be linked to one single layer network. These devices also flood and forward traffic on the basis of the MAC address (Rainoff, n.d.). The switching is done in the hardware rather than the software is significantly faster.
Routers
The functions to accomplish two purposes which entail; transporting packets (information groups) and determining optimal routing paths via what is referred to as an internetwork. The course of the routing process transporting information groups is called switching. Although switching is not a sophisticated process, the part of determination is the complex one.
Protocols are needed on the network.
Suite -Ethernet- CSMA/CD- Data Link and Physical Layer- the Ethernet entails a set of protocols of a local area network (LAN). It serves the data link and physical layers. It utilizes a linear or a star type of topology and deals with the low level physical and data link layers. The Ethernet utilizes CSMA/CD in the process of transmitting information groups (Wan/Lan Protocols, n.d.).
Fiber Distributed Data Interface (FDDI) – This protocol issued to define transmission of LAN over a fiber cabling. The fiber cabling is used when long distances, for instance, between building floors or buildings. In our project, this protocol will be used since the facility entails a five-story building (Wan/Lan Protocols, n.d.).
Wireless LAN protocols i.e., WLAN and Wi-Fi- These operate as traditional LAN(Wan/Lan Protocols, n.d.). Never the less they utilize wireless signals between antennas to work as the medium as opposed to cabling. Most of the main protocols that are used nowadays entail 802.11n”802.11b,””802.11g” and “802.11a,”
The OSI Model
The OSI model is a server architecture system that is layered where every layer is defined by the role it plays in the system. The upper layers entail the software, while the lower layers entail the hardware. It involves seven layers.
The physical layer
The physical layer enables one to define the specifications in terms of physical and electrical specifications of the connection of data. At this level, the association between a device and the physical transmission medium is established(Mitchell, 2020). The physical layer has no link with protocols or such items.
Datalink layer
The layer works to correct errors that may occur at the physical layer. The layer enables the user to define the protocols that they need to establishand ends the link between two interlinked network devices. This layer is IP comprehendible, which enables one to define logical dressing such that any endpoint can be established. The layers also will allow the user to implement routing packets.
Transport layer
The layer builds on the network layer so as to enable transport of data from a process on a source machine to an operation on a destination machine. This layer is hosted using multiple or single networks. It also maintains the quality of service functions. The layer is also a determinant of the data quantity that should be sent at which destination, and it also determines the rate.
Network layer
The layer procedural and functional avenues of transferring sequences of data of variable length from one node to another are connected in varying networks. Message delivery at the network is not guaranteed as a reliable network layer protocol(Mitchell, 2020). The protocols are belonging to this layer entail; multicast group management, and routing protocols.
Session layer
This is the layer that controls the communication between computers. It enables the user to establish starting and terminating link between the remote and local applications. Therefore, this layer requests a logical connection that should be established at the requirement of the end-user. It handles essential log-on or password validation(Mitchell, 2020). This layer offers services such as dialog discipline.
The Presentation
This layer also called the syntax layer, permits the end-user to define the form in which data is to be exchanged between the two entities that are communicating. Encryption of data and data compression is also done here(Mitchell, 2020). The layer also functions to transform data into a form that is acceptable by the application. Moreover, it encrypts and formats the data that is expected to be sent across all the networks.
The Application Layer
The application layer functions to interact with an application program at the highest level of the OSI. This is the layer that is closest to the end-user. It allows the interaction of the softwareapplications and the user (Mitchell, 2020). Itinteracts with other applications to facilitate communication between them—the data interpretation by the application usually beyond the OSI model scope. Examples entail the email, file transfer, and remote login.
References
Ding, Y., Li, X., Tian, Y. C., Ledwich, G., Mishra, Y., & Zhou, C. (2018). Generating scale-free topology for wireless neighborhood area networks in the smart grid. IEEE Transactions on Smart Grid, 10(4), 4245-4252.
Mitchell, B. (2020, April 29). The OSI Model Explained in Easy Steps. Retrieved August 02, 2020, from https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
Runoff, M. (n.d.). Retrieved August 02, 2020, from https://www.idp.net/sysinfo/networking.asp
Wan/Lan Protocols. (n.d.). Retrieved August 02, 2020, from https://www.techwalla.com/articles/wanlan-protocols