In case of switches no collision will occur when data is passed
simultaneously. So it will solve the issue of low performance and hubs disadvantages would also be replaced and will overcome the latency problem. Gigabit Ethernet is much more efficient then simple Ethernet normally transmits data at very high speed normally at the rate of three times then simple Ethernet. Although it is not easy to shift from hubs to switches as hubs are cheap but it requires simply the deployment of switches over the previously present hubs or wiring and this replacement will handle the speed provided by Ethernet or gigabit Ethernet. Gigabit Ethernet switches are very useful they will also prevent high traffic between network and its core. Gbe is a technology of LAN that can also be used for achieving high performance in this scenario as Gbe can be applied to both in both cases to switched backbones as well as routed backbones. (Chowdhury, 2013). Task 2 TRAFFIC INTENSIVE SERVICES: Traffic Internet Services (TIS) constitute of services like QoS (Quality of Service) and these services attempt to bring out the best output out of the available resources in a network. (E.g. Routers) These are also very important services as far as a network for an organization is concerned. Quality of Service (QoS) is the traffic internet service for networks. It is basically a set of standards and ways to ensure high quality and critical performance of the critical applications like mentioned in the scenario. The utilization of resources can be more efficient that are already present by using this mechanism or procedure and the required performance level or service required is achieved with over provisioning their networks or with without expanding. Basically, the quality of service means that all the network traffic is treated equally in case of networks. The result of this is that the traffic of network achieves the networks best effort and there are no guarantees for delay, variation in the delay or other characteristics of performance. An application with the single bandwidth with the best effort service of delivery may result in inefficiency or poor performance for any application. Or we can say that the performance level is unacceptable. This is the concept in which it is observed that the requirements of users and some applications are critical than the others, and this means that some traffic needs special and preferred treatment. The goal and major purpose of quality of service is to give the delivery service which is preferential for any of the application which needs it by ensuring it bandwidth which is sufficient for this, to control jitter or other problems like latency etc. and reduces loss of data across application. (Anon., 2003)
To control memory efficiency
There are two stages of introduction of new standards in memory that is dynamic. The first stage includes different requirements like to improve the bandwidth or cost per bit. And the target for the second one is double then this generation. The second stage is to duplicate the above mentioned generation performance but it takes very low power. And these memories that require low power are called as Low Power (LP) or Mobile DDR. (Mace, 2009) Exploration of Performance With the limitations of power and cost for the system of memory, there is problem that the guarantee of latency to elements that are processing in the system by over engineering the system and the bandwidth cant be offered by the system architects. These both that is the latency and the bandwidth depends on the traffic that is interconnected from other elements that are processing in the system. So the major purpose or the key purpose of the verification process should always consider variations in traffic profiles from the elements that are processing. This will definitely increase the task of verification. This efficiency will depend on the traffic characteristic that is arriving at the controller of memory. This will include: The length of burst Distribution of address Distribution of read and write And the throughput So the profile of traffic that is generated or produce to represent the elements that are processing in the system share the characters that are similar or identical. These characteristics are usually determined by the characteristics of the elements that are processing and codes that are executed on it. (Mace, 2009). Some other facts that effect the performance are The latency of disk can also effect the performance Balance the loads of work among storage ranks The performance of server can affect the storage Task 3 Factors effecting LAN security Wireless local area networks are different from the LANs that are hard wired. This differs in the reference model in terms of physical and data link layers of the open system interconnect reference model. In case of hired wired LANs
when they are attacked the perpetrator needs access to medium of
communication physically either through the cables or through the telephone closet these cables basically connect the network. In contrast to this the wireless LAN communicates through the air, it will emanates the signal in the air and this will require more sophisticated techniques. There are several different factors that should be considered while wireless LAN security is being evaluated, these factors includes physical configuration, type of transmission, and service availability. The Physical Configuration As we know that wireless LAN is better than wired one as it gives the user more flexibility in changing the terminal configuration if we consider it rom operational point of view. But when we consider this in terms of security this flexibility in wireless LAN provides more risks of attacks that are very potential in nature.