Describe about the WAN Designing for a Multinational Grocery Chain?
with our modern era and havoc use of Internet, our modern communication has been facilitated and also offers advanced solutions to make transaction and other business processes much faster. Organizations and every individual in todays’ world are connected with each other via Internet withits different methodologies and topologies across the world. There are numbers of network topologies are used for different zones or part across the world those are used to connect different departments or parts of an organization located at different location. Those network topologies are namely WAN, MAN, LAN. There are numbers of network equipment are in use to connect different terminals with this type of network topologies. Being connected with each of these network infrastructures, each and every terminal or user equipment must require interface id and must contain their unique IP address to be known across the internet. All of these IP addresses are unique and these IP addresses are used to find the source and destination of some specific systems. There are numbers of adopted technologies and tools are there to let the employees or the security personal to be trained for the instalment of such devices that can provide the ultimate training and for new joiner and other less knowledgeable person to handle the network enabled devices more safely and effectively.
In previous times there are numbers of organizations across the world who were indulged in providing their information across the world some old methods such telegrams, sending letters through some recognized bodies or the organization. Though those methods take maximum of times to send some data or though bunch of papers or being present at different location form one geographic location at another geographic location (Chun, 2015). That has reinforced humans to focus upon different methodologies and technology driven aspect to adopt and on the other hand use of these technology driven systems have been instigated by the havoc use of internet. Nowadays numbers of organizations have adopted several technologies to connect their different portions of their organization with the help of LAN, MAN or WAN (Châtelain, Bélanger, Tremblay, Gagnon & Plant, 2009). These network topologies are much more useful connect different parts of the organization and share resources and file accordingly within fractions of time. This system on the other hand helps to increase the use of system resource among several users by decreasing the cost of engaging same resources more than one. Being connected with each of these network infrastructures, each and every terminal or user equipment must require interface id and must contain their unique IP address to be known across the internet (Cuda, Indre, Le Rouzic & Roberts, 2012). All of these IP addresses are unique and these IP addresses are used to find the source and destination of some specific systems. There are numbers of adopted technologies and tools are there to let the employees or the security personal to be trained for the instalment of such devices that can provide the ultimate training and for new joiner and other less knowledgeable person to handle the network enabled devices more safely and effectively (Deng et al., 2015).
There are numbers of network designs are there, for example, LAN, MAN and WAN. LAN is known as Local Area Network. LANs are connected within a limited geographical area. For example, use of network within the range of school, home, college and etc. Computers are situated within a limited area and linked with each other. LAN can be expanded over the limited distance, i.e. 1km in radius. It is possible to have communication between different terminals, i.e. form one computer to another computer (Faro, Giordano & Spampinato, 2012). As all of the computers are connected with each other with different interface and port and there are no central computer hence all are able to play similar job. On the other hand LANs are usually self-owned, managed and controlled by a single expertise or by an organization. There are numbers of network equipment are in use for LAN deployment, those are routers, switches, bridges and repeaters. LAN helps to communicate with the user and to transfer files much faster. It is possible to connect a single LAN with the WAN or other LANs (Giuliano, Gordon, Pan, Park & Wang, 2011).
WAN is denoted as Wide Area Network. WAN are generally used to connect large geographically areas such as a continent and countries across the world. WANs are spread all over the world that may contain the 100000 kilometre radius that is between the earth and satellite. There few numbers of devices are used in WAN are modems, server and routers. WAN are used to connect different LANs and provide access to the computers or to the other equipments and resource those are outside the coverage area general LAN system (Hrehorowicz-Gaber, 2015).
MAN is denoted as Metropolitan Area Network. MANs are used to connect several LANs in a common geographic region. MAN s can be expanded with within the range of 5 to 50 KM in diameter. MANs are not usually owned or deployed for a single organization rather they are owned by a group of users provided by a single network provider. Network providers sell services to a group of users. Man can be considered as the expanded version of LAN that will allow users form different groups to share their resources within a more expanded are compared to LAN (Ismail & Said, 2015).
Suppose we have a grocery chain, CHILKART, CHILKART in US and it’s another branches are expanded across the different locations of Germany, Spain and India. To have a smooth flow of data across different parts of CHILLKART it is required to have the strong network infrastructure and to connect different parts of CHILLKART, no doubt it is required to have use of WAN and required network equipment. Before that it is required to connect local parts of the CHILLKART (Kliazovich & Granelli, 2007). To show the LAN design I will be choosing the local parts of CHILLKART within a single limited region. US branch of CHILLKART have different stores within different parts of US. To connect different parts of CHILLKART within the US we will router switches and also require transmission mediums across the organization to capture the network. These regional networks of CHILLKART are connected with the different parts of the organizations situated at different region of different nation (Kundu & Pradhan, 2015). For example, it is required to place a router within an organization located at US and a server that will provide different IP addresses for different system located at different place whether it is national wide or international wide. CHILLKART will be totally dependent upon the centralized data centre. If a WAN outage occurs, remote location will be unable to fetch data for the centralized data centres (Kuo, Ni, Sunderrajan & Manjunath, 2014).
The demand for the WAN bandwidth continues to increase day by day. Nowadays recent trend is more leaning towards the use of Ethernet as the WAN access media, so that it can deliver data with high bandwidth. Even there are numbers of performance sensitive applications those can easily be affected by the packet loss, delay and jitter (Li, Chen & Zhang, 2015). It is the functions of the network foundation to provide the fault-tolerant and effective application that can differentiate the traffic and can make the system intelligent enough to take load sharing decisions while congestions occur in the network. Without considering the WAN technology the WAN must be able to provide the intelligent prioritization network traffic and must be able to queue that traffic along the best possible route (Mouzehkesh, Zia, Shafigh & Zheng, 2015).
The CHILLKART will choose few of the WAN designing methodologies for transporting data to its destination for backup links and primary links:
Internet 3G/4G plan with the VPN enabled WAN.
Dynamic Multipoint VPN
Internet using VPN WAN
Layer 2 WAN with the association of VPLS or Virtual Private LAN Services or Metro Ethernet.
MPLS WAN in association with Layer3 Virtual Private Network (Nadarajah & Nirmalathas, 2011).
To control the operational cost it is required to take support of the WAN offered reliability and support. Because most of the WAN technology covers the functionality to transport the multidimensional data, such as voice, video, data via a single and centrally managed infrastructure. As organization is moving for the global business market, it is necessary for CHILLKART to adopt all these networking trends to be to attract numbers of employees and retain potential employees (Vahidnia, Palmer, Ledwich & Ghosh, 2015), i.e. use of WAN using VPN and use of MPLS which is Layer 2 WAN.
Nowadays companies are aimed to consolidate their data across the organization. Consolidating data from different terminal situated at remote location to a central data repository. This scenario helps when there is huge number of terminals get populated across the organization and authorities across the organization want access the log of the each system performance sitting at remote location.
On the other hand Application optimization can speed up network performance along with the much security and improved application delivery. For example, the CHILLKART will be using the Cisco WAN optimization technique, then CHILLKART is bound to use the Cisco Application Services or the Cisco WAAS, which is an architectural solution that consists set of tools and techniques that will work together in a systematic approach to offer the best possible solution across the industry by reducing overall cost (Yan, Zhang & Sun, 2015). Application optimization using WAN will provide numbers of advantage those are:
Advanced and user experience by enhancing the range of bandwidth and reducing the latency.
On the other hand routers are used to break the broadcast domain and connect different zones; in this case, Cisco routers give the best possible solution for the flexible deployment.
Centralized management of data and managing operations in a centralized way to give opportunity to optimize the devices (Zhang & Chen, 2012).
Wan optimization design model: The design for WAN optimization for the remote sites needs to be based on the site-specific characteristics. The general topology used for several remote sites is almost same while there is a chance to use WAN. Characteristics of several WAN get cleared, when configuration of WAN router takes place. There are 3 WAN aggregation design models:
The MPLS WAN-aggregation design involves two or more WAN edge routers. WAN edge routers are referred when it the context of making connection from sender to receiver. All of the WAN edge routers are connected into the LAN distribution layer (Zhang, Chi, Zhengbin & Anshi, 2012).
On the other hand the WAN transport options use the MPLS VPN considering it as a primary or secondary transport. Each of the transport connects to the dedicated CE router.
Each of the design models uses connection of LAN as a collapsed distribution or core distribution layer or the dedicated distribution layer for WAN.
Ethernet has become the traditional way in the LAN technology and basically due to distance limitations of the available media and due to the unavailability of dedicated fibre or copper links.
Layer 2 WAN transports are available from service providers and are able to extend various layers to control traffic of different types over a Wide Area Network. The most common use of Layer 2 WAN are in use to provide the Ethernet over WAN implementation using either point to multipoint or point to point service (Zhu, Zhang & Mukherjee, 2005).
Service providers across the industry are indulged to implement these Ethernet services using numbers of methods. There are numbers of network topologies are in use by the service providers, for example use of several Ethernet switches in various topologies, so that it became possible to provide services on Ethernet LAN2. This service is also known as metro Ethernet.
Layer 2 WAN services supports a subscriber model in which service provider always stays clear and the organization implements routing form layer 3; this scenario on the other hand allows a more flexible WAN design and the interconnection between the remote sites (Cuda, Indre, Le Rouzic & Roberts, 2012).
On the other hand the point to point service allows the interconnection between two LANs. Point to multipoint LAN services allows the interconnection between more than two LANs. There are so many other services that include trunked and simple demarcation. With the help of trunk mode, the interconnection between LANs using 802.1Q VLAN–tagging that provide the transport of several VLANs on a single access truck.
The internet is an integration of large scale public WAN and multiple interconnected services providers are there. It has become possible for Internet to offer reliable high–performance connectivity between the various locations. Though it may lack any kind of clear guarantees for these kinds of connections, best effort services are available within the coverage area and the Internet is the best possible choice for the primary transport when it is not much feasible to transport via other medium. There are numbers of primary LAN service for WAN transport is there, for example use of Layer 2 WAN or use of MPLS are offered using Internet as an alternative transport options (Châtelain, Bélanger, Tremblay, Gagnon & Plant, 2011).
Being connected with the Internet, it includes discussion close to the internet edge. Remote–site routers need to have internet connection as a common fact, though Internet connections do not provide services of same breadth at every location. There are numbers of security reasons behind the routing of internet connections through the primary sites. Sometime industries across the world demand dedicated private connection with their client and they demand for the VPNs form the service provider. These VPNs are much secure than the publicly or openly used Internet connections such as use Wi–Fi or easily accessible LAN service (Faro, Giordano & Spampinato, 2011).
With havoc use of internet there are numbers of functionalities have been used made it easy to communicate with the peers and to other systems by decreasing the cost of duplicate system resources. The demand for the WAN bandwidth continues to increase day by day. Nowadays recent trend is more leaning towards the use of Ethernet as the WAN access media, so that it can deliver data with high bandwidth. Even there are numbers of performance sensitive applications those can easily be affected by the packet loss, delay and jitter. It is the functions of the network foundation to provide the fault-tolerant and effective application that can differentiate the traffic and can make the system intelligent enough to take load sharing decisions while congestions occur in the network. On the other hand use of these resources have introduced have numbers of ethical dilemma. With the advent of application developers and networks administrator, numbers of intruder have introduced their presence. Even there are numbers of tools and applications have been introduced to steal customer data and they make illegal use of them. Hence numbers of methodologies have been adopted to restrict the illegal use of system resources and data. For example, imposing security mechanism at command level interface and or applying executive level security mechanism in routers will enable restriction on the unauthorized use of system resources. There are numbers of patches are available for the each system application and iso of the routers. While security mechanisms are concerned, there are numbers of security mechanisms are in use, those are namely use of encrypted passwords for each of the interface of the router. Being connected with each of these network infrastructures, each and every terminal or user equipment must require interface id and must contain their unique IP address to be known across the internet. On the other hand use of IPV6 addressing can also increase the network and capacity and its tunnelling technique for transferring data from IPV4 router to IPV6 router is much more secure. All of these IP addresses are unique and these IP addresses are used to find the source and destination of some specific systems. There are numbers of adopted technologies and tools are there to let the employees or the security personal to be trained for the instalment of such devices that can provide the ultimate training and for new joiner and other less knowledgeable person to handle the network enabled devices more safely and effectively.
ChÃ¢telain, B., BÃ©langer, M., Tremblay, C., Gagnon, F., & Plant, D. (2011). Topological Wavelength Usage Estimation in Transparent Wide Area Networks. J. Opt. Commun. Netw., 1(1), 196. doi:10.1364/jocn.1.000196
Chun, K. (2015). The Effects of Metropolitan Industrial Complexes on the Relocation of Firm -Focused on Daegu Metropolitan Area. Jkpa, 50(2), 33. doi:10.17208/jkpa.2015.02.50.2.33
Cuda, D., Indre, R., Le Rouzic, E., & Roberts, J. (2012). Building a Low-Energy Transparent Optical Wide Area Network With â€œMultipathsâ€Â. J. Opt. Commun. Netw., 5(1), 56. doi:10.1364/jocn.5.000056
Deng, X., He, L., Li, X., Liu, Q., Cai, L., & Chen, Z. (2011). A reliable QoS-aware routing scheme for neighbor area network in smart grid. Peer-To-Peer Netw. Appl.. doi:10.1007/s12083-015-0331-5
Faro, A., Giordano, D., & Spampinato, C. (2010). Evaluation of the Traffic Parameters in a Metropolitan Area by Fusing Visual Perceptions and CNN Processing of Webcam Images. IEEE Trans. Neural Netw., 19(6), 1108-1129. doi:10.1109/tnn.2008.2000392
Giuliano, G., Gordon, P., Pan, Q., Park, J., & Wang, L. (2011). Estimating Freight Flows for Metropolitan Area Highway Networks Using Secondary Data Sources. Netw Spat Econ, 10(1), 73-91. doi:10.1007/s11067-007-9024-9
Hrehorowicz-Gaber, H. (2015). Role of green areas for space integration of KrakÃ³wâ€™s Metropolitan Area. Bulletin Of Geography. Socio-Economic Series, 28(28). doi:10.1515/bog-2015-0016
Ismail, W., & Said, I. (2015). Integrating the Community in Urban Design and Planning of Public Spaces: A Review in Malaysian Cities. Procedia - Social And Behavioral Sciences, 168, 357-364. doi:10.1016/j.sbspro.2014.10.241
Kliazovich, D., & Granelli, F. (2011). Packet concatenation at the IP level for performance enhancement in wireless local area networks. Wireless Networks, 14(4), 519-529. doi:10.1007/s11276-006-0734-6
Kundu, P., & Pradhan, A. (2015). Online identification of protection element failure using wide area measurements. IET Generation, Transmission & Distribution, 9(2), 115-123. doi:10.1049/iet-gtd.2014.0276
Kuo, T., Ni, Z., Sunderrajan, S., & Manjunath, B. (2014). Calibrating a wide-area camera network with non-overlapping views using mobile devices. ACM Transactions On Sensor Networks, 10(2), 1-24. doi:10.1145/2530284
Li, Z., Chen, M., & Zhang, G. (2015). Variable-rate transmission method with coordinator election for wireless body area networks. Wireless Networks. doi:10.1007/s11276-015-0917-0
Mouzehkesh, N., Zia, T., Shafigh, S., & Zheng, L. (2015). Dynamic backoff scheduling of low data rate applications in wireless body area networks. Wireless Networks. doi:10.1007/s11276-015-0929-9
Mouzehkesh, N., Zia, T., Shafigh, S., & Zheng, L. (2015). Dynamic backoff scheduling of low data rate applications in wireless body area networks. Wireless Networks. doi:10.1007/s11276-015-0929-9
Nadarajah, N., & Nirmalathas, A. (2012). Upstream access and local area networking in passive optical networks with a single reflective semiconductor optical amplifier. J. Opt. Netw., 7(5), 513. doi:10.1364/jon.7.000513
Vahidnia, A., Palmer, E., Ledwich, G., & Ghosh, A. (2015). Wide-area control through aggregation of power systems. IET Generation, Transmission & Distribution. doi:10.1049/iet-gtd.2014.1206
Yan, H., Zhang, Q., & Sun, Y. (2015). Local information-based congestion control scheme for space delay/disruption tolerant networks. Wireless Networks. doi:10.1007/s11276-015-0911-6
Zhang, Y., & Chen, J. (2012). Wide-area SCADA system with distributed security framework. J. Commun. Netw., 14(6), 597-605. doi:10.1109/jcn.2012.00025
Zhang, Z., Chi, Y., Zhengbin, L., & Anshi, X. (2012). Dual-fiber optical burst switching network: A novel architecture for metropolitan area networks. Photon Netw Commun, 24(1), 47-57. doi:10.1007/s11107-011-0366-3
Zhu, K., Zhang, J., & Mukherjee, B. (2011). Ethernet-over-SONET(EoS) over WDM in Optical Wide-Area Networks (WANs): Benefits and Challenges. Photon Netw Commun, 10(1), 107-118. doi:10.1007/s11107-005-1698-7
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2016). WAN Designing: Multinational Grocery Chain. Retrieved from https://myassignmenthelp.com/free-samples/wan-designing-multinational-grocery-chain.
"WAN Designing: Multinational Grocery Chain." My Assignment Help, 2016, https://myassignmenthelp.com/free-samples/wan-designing-multinational-grocery-chain.
My Assignment Help (2016) WAN Designing: Multinational Grocery Chain [Online]. Available from: https://myassignmenthelp.com/free-samples/wan-designing-multinational-grocery-chain
[Accessed 19 February 2020].
My Assignment Help. 'WAN Designing: Multinational Grocery Chain' (My Assignment Help, 2016) <https://myassignmenthelp.com/free-samples/wan-designing-multinational-grocery-chain> accessed 19 February 2020.
My Assignment Help. WAN Designing: Multinational Grocery Chain [Internet]. My Assignment Help. 2016 [cited 19 February 2020]. Available from: https://myassignmenthelp.com/free-samples/wan-designing-multinational-grocery-chain.
MyAssignmenthelp.com strives towards providing exceptional essay help at an affordable price. Students, from various parts of Australia, prefer our servicers because we provide high-quality essay assistance at a pocket-friendly price. We receive numerous requests 'help me do my essay' or 'can someone write my essay' from students every day. We efficiently fulfill those requests and provide students needed essay writing help art an affordable price.
Answer: Background Information This assignment tests your understanding of and ability to apply the programming concepts we have covered in the unit so far, including the usage of variables, input/output, data types, selection, iteration, functions and data structures. Pseudocode As emphasised in the case study of Module 5, it is important to take the time to properly design a solution before starting to write code. Hence, this assignment...Read More
Answer: Business Rules for the system The business rules for the system are: The system should be able to gather information about the players in the system and the players in the system would be identified by their unique ID. Records of all the games and the sections are to be stored in the database along with their scores. The winner of each game is to be stored in the system. The ranking of the teams is to be stored in the system. T...Read More
Introduction Software testing is done so that bugs can be removed from the program code. Software testing can be classified as unit testing, system testing and integration testing. All these kinds of testing can be done by use of various software testing techniques which include white box testing, black box testing and grey box testing (Khan, & Khan, 2012). In black box testing we are able to test the UI part of the software itself wher...Read More
Answer: Introduction The Collin Bank wants to make its bank services an automatic service for providing good service to their customers. The customers of the Collin’s Bank faces difficulties to reach the bank for do their simple transaction (Bahill & Madni, 2017). To mitigate the problem of bank rush, the bank wants to develop an ATM system that is helpful to both, the customers and the employees involved with the bank system. The e...Read More
Answer: Introduction Data and system integration has combined data from different sources, the technologies are stored in various sources and data has unique view. System integration as bring the component of sub-systems from one aggregation of cooperating subsystems so the system have able to deliver an overarching functioning and ensure a subsystems function. In data and system integration the mashups and restful services concept has done i...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Fast and good work done. It was up to mark and written in a good flow while following the instructions asked by me. The agent was also very helpful.
I AM VERY EXCITED WITH MY GRADE I GOT AN A THANK YOU VERY MUCH! I WILL recommend IT TO EVERYONE.
I GOT AN A I AM VERY excited, THANK YOU VERY MUCH, I REALLY appreciate YOUR HARD WORK. THANKS AGAIN.
Excellent JOB! I GOT AN A IN THIS assignment I AM VERY satisfied. THANK YOU VERY MUCH I appreciate YOUR HARD WORK.