Subnet And Router Configuration With Netgear & Cisco Devices
Subnet Name |
Subnet address |
Subnet mask |
First Useable address |
Last Usable address |
Broadcast address |
Seoul |
138.11.0.0 |
/23 |
138.11.0.1 |
138.11.1.254 |
138.11.1.255 |
Hong Kong |
138.11.2.0 |
/23 |
138.11.2.1 |
138.11.3.254 |
138.11.3.255 |
Seattle |
138.11.4.0 |
/25 |
138.11.4.1 |
138.11.4.126 |
138.11.4.127 |
Osaka |
138.11.4.128 |
/25 |
138.11.4.129 |
138.11.4.254 |
138.11.4.255 |
Vancouver |
138.11.5.0 |
/26 |
138.11.5.1 |
138.11.5.62 |
138.11.5.63 |
Tokyo |
138.11.5.64 |
/26 |
138.11.5.65 |
138.11.5.126 |
138.11.5.127 |
San Francisco |
138.11.5.128 |
/27 |
138.11.5.129 |
138.11.5.158 |
138.11.5.159 |
SeoulServer |
138.11.5.160 |
/30 |
138.11.5.161 |
138.11.5.162 |
138.11.5.163 |
Osakaserver |
138.11.5.164 |
/30 |
138.11.5.165 |
138.11.5.166 |
138.11.5.167 |
Hong Kong- Seoul (w1) |
138.11.5.168 |
/30 |
138.11.5.169 |
138.11.5.170 |
138.11.5.171 |
Seoul –Seattle(w2) |
138.11.5.172 |
/30 |
138.11.5.173 |
138.11.5.174 |
138.11.5.175 |
Seattle -SanFrancisco(w3) |
138.11.5.176 |
/30 |
138.11.5.177 |
138.11.5.178 |
138.11.5.179 |
Seoul–Osaka (w4) |
138.11.5.180 |
/30 |
138.11.5.181 |
138.11.5.182 |
138.11.5.183 |
Osaka–Tokyo (w5) |
138.11.5.184 |
/30 |
138.11.5.185 |
138.11.5.186 |
138.11.5.187 |
Seattle –Vancouver(w6) |
138.11.5.188 |
/30 |
138.11.5.189 |
138.11.5.190 |
138.11.5.191 |
Vancouver -San Francisco(w7) |
138.11.5.192 |
/30 |
138.11.5.193 |
138.11.5.194 |
138.11.5.195 |
InternetSeoul |
203.203.17.44 |
/30 |
203.203.17.45 |
203.203.17.46 |
203.203.17.47 |
Subnets
Subnet Name |
DHCP Address |
Seoul |
138.11.1.145 -138.11.1.244 |
Hong Kong |
138.11.3.46 – 138.11.3.95 |
Seattle |
|
Osaka |
|
Vancouver |
|
Tokyo |
138.11.5.105-138.11.5.114 |
San Francisco |
|
SeoulServer |
|
Osakaserver |
|
Hong Kong- Seoul (w1) |
|
Seoul –Seattle(w2) |
|
Seattle -SanFrancisco(w3) |
|
Seoul–Osaka (w4) |
|
Osaka–Tokyo (w5) |
|
Seattle –Vancouver(w6) |
|
Vancouver -San Francisco(w7) |
|
InternetSeoul |
Router Interface
Router Interface |
|||
Location |
Interface |
IP Address |
Subnet Mask |
Hong Kong To Seoul |
S0/0 |
138.11.5.169 |
/30 |
Seoul To Hong Kong |
S0/0 |
138.11.5.170 |
/30 |
Seoul To Seattle |
S0/2 |
138.11.5.173 |
/30 |
Seattle To Seoul |
S0/0 |
138.11.5.174 |
/30 |
Seattle To San Francisco |
S0/1 |
138.11.5.177 |
/30 |
San Francisco To Seattle |
S0/0 |
138.11.5.178 |
/30 |
Seoul To Osaka |
S0/1 |
138.11.5.181 |
/30 |
Osaka To Seoul |
S0/0 |
138.11.5.182 |
/30 |
Osaka To Tokyo |
S0/1 |
138.11.5.185 |
/30 |
Tokyo To Osaka |
S0/0 |
138.11.5.186 |
/30 |
Seattle To Vancouver |
S0/2 |
138.11.5.189 |
/30 |
Vancouver To Seattle |
S0/0 |
138.11.5.190 |
/30 |
Vancouver To San Francisco |
S0/1 |
138.11.5.193 |
/30 |
San Francisco To Vancouver |
S0/1 |
138.11.5.194 |
/30 |
Servers of Seoul and Osaka |
|||
Location |
Server Name |
IP Address |
Subnet Mask |
WEB |
138.11.5.161 |
/30 |
|
|
138.11.5.162 |
/30 |
|
Seoul |
DB |
138.11.5.165 |
/30 |
USER |
138.11.5.166 |
/30 |
The weighted decision matrix (WDM) is a component utilized to discuss alternatives with recognize to various criteria of more than one levels of importance. It will be utilized to mark each other alternatives relevant to cannot changed reference and thus construct a half order of the alternatives.
- Tri-band technology with smart connect bandwidth prioritizationis designed mainly for mobile device for domestic purpose.
- The Tri-Band has smart Wi-Fi Routers and Servers that is AC3200 offers outstandingly speed till to 3.2 Gbps and router of dual-band speed should be doubled.
- The Smart Connect technology orders the traffic through two Wi-Fi with the range 5 GHz to all devices to sustain the promising speed.
- Applications of High-Bandwidth are directed to 5 GHz with fast speed bands and the Lower-Bandwidth routed to 2.4GHz band.
- Tri-Band Smart wireless router AC3200 has three external antennas that is adjustable and three internal antennas that is fixed that gives the data with powerful streams to the devices and it ensures full coverage for the house(Bloor, 2010).
- This also creates to customize the wireless router and has three antennas that is replaceable and adjustable.
- The AC3200 is powered by the CPU (dual-core 1 GHz) and a total of penta-core processer with 2.96GHz with 3 integrating co-processor power.
- This means AC3200 has handling capacity of multiple data streams with high speed and the fast delivering process to more devices without weakening the speed and performance of individual devices(2010 IEEE International Conference on Cloud Computing, 2010)
- Beam forming technology in AC3200 is concentrates the device received the wireless signals and sends the Wi-Fi in a common direction(Babcock, 2010).
- This increases the efficiency of the network and it expand the range of the network.
Beam forming will use to increase wireless bandwidth and it will improve a wireless network’s rank. It will improve video streaming, voice range and another bandwidth with sensitive transmissions.
Devices that encourage beam forming target their signals facing every customer, focusing the information transformation hence that more than one data success the focused device rather than of radiating out into the atmosphere. NETGEAR
The NETGEAR ProSAFE is a 24-Port which has Gigabit Smart Managed alone with a Switch.
Features of NETGEAR (Buckley, 2010)
- This has higher performance
- Reliability
- Easy management
This is managed through graphical user interface (GUI) or with the help of Smart Control Center.
- VLAN supports for the segmentation in traffic
- For the bandwidth allocation, the rate gets limited(Furht and Escalante, 2010).
- The prevention measure from Auto-Denial of service, so called DoS.
- Prevention of Loop and control the storm of broadcast.
- Performing port mirroring for monitoring the network.
- For multicast optimization, IGMP snooping is used.
- Link aggregation in addition with jumbo support framework.
Highlights
It provides cost-effective 802.11n for connectivity. The range starts from 2.4-GHz and 5GHz
The single point of power over Ethernet is for connecting to its appropriate switch.
The port of PD permits to access the point powered by the backbone switch (Jhingran, 2010).
The work right out of box with easier steps of installation with simple web based techniques.
The overview of product
In the present world, the dynamic business environment with more number of employees are now having more collaboration than ever (Shroff, 2010).
For the purpose of staying protective, the products are dependable, the business classes helps in accessing the network applications all around the work area. The cisco WAP provides cost effective way for extending the security, the higher performance on mobile networking. This is done to the employees and the guests. This is because they can understand that they are connected anywhere. The flexible way of connecting dozens of employees. The scale is to accommodate the additional number of users and then they change the business needs (Crovella, 2010).
WAP131- is Cisco Wireless N dual Radio Access. This uses concurrent bands radios for the improvement coverage and the capacity of users.
The cisco WAP 131 Wireless N dual Radio Access. It is mainly to get the process run in minutes (SearchNetworking, 2018).
The attractive desktop with design is integrated and it stands alone.
Concurrent dual band supports up to 300Mbps. This has the maximum capacity. In addition to that, it has maximum coverage.
The single gigabit Ethernet LAN with interface that enables high speed uplink to the wired network system.
Router Interfaces
Robust in security feature that includes WPA2, with RADIUS and secure way of authentication.
The simple way of installing the initiative web based configuration techniques enable up the fast, the simple deployment technique.
The desktop design with integrating the stand, for easy access and the placement.
The intelligent system with Quality of Service(QoS) makes the network traffic the first and helps in keeping up the critical network applications run in better way.
Power saving in sleep mode with port control helps in maximizing the energy and its efficiency.
The work group mode lets the network without any wired connection and the second connection is given to the Ethernet.
Limited lifetime physical device warranty helps in proving the pace of mind.
Specifications
Table 1 lists the specifications, package contents, and minimum requirements for the Cisco WAP131 access point, and Table 2 gives RF performance information.
Table 1. Specifications for the Cisco WAP131 Wireless Access Point
Table 2. Cisco WAP131 Wireless-N Access Point RF Performance Table is shown below
Make your network dynamic, reduce the cost of application hosting, computing and content storage with Cloud Computing. Cloud Computing, a fast-growing trend adapted by businesses worldwide for storage of databases, software and networks is easily accessible as it provides data whenever and wherever with an added advantage of cost efficiency and productivity.
It is an efficient means for data storage as backing up data is made easier and provides room for data restoration in case of losses. With the implementation of cloud computing, the service provider becomes solely responsible for maintaining data security. Despite that Cloud Computing requires low maintenance and is cost effective, its benefits are bountiful. Cloud Computing improves business agility and enhances the flexibility of computing resources in the business landscape as managing computer servers, workstations and network becomes easy and handy. Cloud Computing can basically be implemented in three forms namely; Software as a service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service.
Cloud Computing when implemented in the Software as a Service (SaaS) form, it provides a platform for customer login as it allows for multiple, simultaneous logins. Big brands such as Google Docs, Microsoft make this platform available to their customers. When used as a Platform as a Service (PaaS), Cloud Computing provides customers with the leverage and tools for building their own applications. Azure Service Platform is one of such.
Furthermore, Cloud Computing, in the form of Infrastructure as a Service (IaaS), provides storage, database management and other computing capabilities which incorporate in lessening the workload demanded from by customers. To further explore the benefits of implementing Cloud Computing, here is a real-life scenario where Cloud Computing would suffice.
WDM and Beam Forming
In an instance where a network has 1000 workstations demanding an annual expenditure of approximately $800 per station and $80000 for a total of all stations, introducing operation of Cloud Computing can cut down cost, hence improving market returns.
Rather than replace all workstations within the organization with thin clients which will access a desktop environment provided by a private cloud infrastructure or continue in the use of existing workstations, it is advisable that the network rather opts to replace all workstations with thin clients which will access a desktop environment provided by a cloud service provider.
Integrating with security and managing it into the infrastructure.
Finish the virtualized or the web based infrastructure with more optical endpoints. This meets up the budget and requirements of the performance. When the datacenter (Wyse) solutions are coupled, Wyse is within the thin clients. The process of virtualization in desktop is quite easy. The main purpose is to build it for the VDI-virtual desktop virtualization. The environment provides maximum amount of security and the performance, Wyse within the clients come in more number of forms. The factors with different mounting options mainly includes mobile and all clients. Wyse endpoints will help the IT core.
This simplifies management and the level of security.
Make the Information Technology to reach higher steps.
Improving the rate of portability and the experience of user.
Maximizing the security and saves the time. The cost is lower with datacenter named Wyse from Dell.
The components should have higher range of security, the managements is performing in an efficient manner. The datacenter (Wyse) is designed for integrating the process in easier manner into a virtualized or a web based infra. Wyse datacenter with in the clients meets up the budget and the performance needs for any kind of application. This needs to provide further functionalities and raise the performance which reaches the needs of the applications.
Wyse Thin Client TCO Calculator is a simple and a dynamic tool. This help in calculating the cot benefits to the firm. This happens when the user deploys VDI along with Wyse datacenter thin clients. The user simply wants to enter the count of users and then adjust accordingly based on needs. The organization benefits when the user deploys VDI with Wyse thin clients.
The thin clients realizes a high level of security. The flexibility range and the management on citric® or those dell related platforms. This is much affordable and is efficient thin clients and its software.
Netgear ProSAFE Features
View Wyse products:
Thin clients, cloud desktops, software and the Wyse applications.
Wyse ThinOS
It is much needed to keep VD infrastructure in a safe manner. It is the secure OS all around the world. It is made especially for virtual desktops. This is certified with Citrix, Microsoft and VMWare.
Thin os provides the following features:
They are listed below with description
Higher range of security:
The thin os provides security from virus, the malware resistant with unknown Application programming interface. This also provides zero attack.
Thin OS also supports a 802.1x (robust). This wired and wireless way of authenticating a spectrum with m any security protocols.
Unified form of communication:
Lync 2010 and Lync 2013 along with skype for the business clients for Lync 2015. This is done via the citrix HDX.
The system booting is below 10 seconds.
Management: This also eliminates the necessity of Information technology staff for touching the physical devices. .
Flexibility rate: the rate of flexibility is managing 100000 devices with the Wyse WDM software.
Wyse Thin Linux and Wyse-enhanced Linux
The Wyse Thin Linux and the Wyse-enhanced Linux, when thin clients proposed the security, performance should be high, management ease, virtual desktops is used and flexible to internet browsing either local applications should be run with Linux surrounding. Then Linux client should be choose for
- Security
- Flexibility and Reliability
- Performance should be high
- Security
Thin client has no hard disk that contain key apps and the data center stores the content safely and protects the content, image and the application.
The Wyse enhanced Linux thin clients to keep the people always for productive and benefits from secure the content and easy to manage the virtual desktops. Follow the steps. Run the legacy either customize the apps either access the virtual desktop with the environment be Citrix, Microsoft and the VMware by the way of VPN connection(Ferkoun, 2018).
Access the apps locally from virtual desktops, then advances multi-core and single-core thin clients gives more power. CPU utilization should be reduce that will gets high performance as need.
Windows 10 with IoT Enterprise or Window with Embedded Standard
Combines flexibility, reliability and the high performance of Windows with Standard Embedded systems with management ease, security and the Wyse thin clients cost should be saved. Then choose the Windows 10 or Windows 7 thin clients with IoT enterprise gives solution for
- Scalable management
- Usability Rate
- Security
- Scalable management
Virtual desktop should be manage to use conveniently with the Client Manager and Wyse Device Manager, then the thin clients scale will increase from tens time of thousands. Microsoft system with center configuration of manager software also used(Apprenda, 2018).
Fluid the glide over the graphics of intensive applications with the accelerated processing unit (APU) that is quad or dual core. Also connects the wide range of applications of windows and the windows peripherals.
Data center is used to save the contents and applications safely. It supports a broad range of authentication handler that had a surface with smaller attack of PC5. There is Dell threat defense format in the threat protection with advanced option gives offer for protects the malware on the endpoints of WES and virtual desktops system.
Wyse gives offers to management software that creates it very much easy to configuration, monitoring process and also control the thin clients. The software is used for virtualizing the desktops and it applications and permits remote access.
References
| (2018). What is a Computer Network? Uses of Computer Networks.. [online] Ecomputernotes.com. Available at: https://ecomputernotes.com/computernetworkingnotes/computer-network/what-is-a-computer-network [Accessed 27 Jan. 2018].
2010 IEEE International Conference on Cloud Computing. (2010). Piscataway: IEEE.
Agocg.ac.uk. (2018). The uses of Networking. [online] Available at: https://www.agocg.ac.uk/reports/graphics/26/node9.htm [Accessed 27 Jan. 2018].
Apprenda. (2018). Uses of Cloud Computing – Apprenda. [online] Available at: https://apprenda.com/library/cloud/uses-of-cloud-computing/ [Accessed 27 Jan. 2018].
Babcock, C. (2010). Management strategies for the cloud revolution. New York: McGraw-Hill.
Blogger, R. (2018). Top 10 Common Uses for the Cloud for 2012 – The Official Rackspace Blog. [online] The Official Rackspace Blog. Available at: https://blog.rackspace.com/top-10-common-uses-for-the-cloud-for-2012 [Accessed 27 Jan. 2018].
Bloor, R. (2010). Cloud computing for dummies. Hoboken, NJ: Wiley Pub.
Buckley, P. (2010). The Rough Guide to cloud computing. London: Rough Guides.
community.yourstory.com. (2018). Five most important uses of cloud computing. [online] Available at: https://yourstory.com/read/ec4ace16b0-five-most-important-uses-of-cloud-computing [Accessed 27 Jan. 2018].
Crovella, M. (2010). Networking 2010. Berlin: Springer.
Ferkoun, M. (2018). Top 7 most common uses of cloud computing – Cloud computing news. [online] Cloud computing news. Available at: https://www.ibm.com/blogs/cloud-computing/2014/02/top-7-most-common-uses-of-cloud-computing/ [Accessed 27 Jan. 2018].
Furht, B. and Escalante, A. (2010). Handbook of cloud computing. New York [etc.]: Springer.
Jhingran, A. (2010). IBM business analytics and cloud computing. Ketchum, ID: MC Press.
Kim, T. (2010). Communication and networking. Berlin: Springer.
Lifewire. (2018). Take five minutes to learn the basics of cloud computing. [online] Available at: https://www.lifewire.com/what-is-cloud-computing-817770 [Accessed 27 Jan. 2018].
Partridge, K. (2011). Social networking. New York: H.W. Wilson.
Salesforce.com. (2018). Cite a Website – Cite This For Me. [online] Available at: https://www.salesforce.com/cloudcomputing/ [Accessed 27 Jan. 2018].
SearchNetworking. (2018). What is networking? – Definition from WhatIs.com. [online] Available at: https://searchnetworking.techtarget.com/definition/networking [Accessed 27 Jan. 2018].
Shroff, G. (2010). Enterprise cloud computing. Cambridge: Cambridge University Press.