|
LAN Networks
GlobeConsult has overseen many LAN application installations and has the necessary resources to cover all aspects,
including: router and server configuration; applications software analysis and specifications; and hardware deployment.
A local area network (LAN) is a group of computers and associated devices that share a common communications line or
wireless link and typically share the resources of a single processor or server within a small geographic area
(for example, within an office building). Usually, the server has applications and data storage that are shared in
common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home
network) or as many as thousands of users (for example, in an FDDI network). Ethernet is the most widely-installed local
area network (LAN) technology.
LAN Technology
VLPS:
Globeconsult has developed recent experience in a new LAN technology utilising the Internet instead of single private networks.
This service called Virtual private LAN service (VPLS) is a technology that makes it possible to connect local area
networks (LANs) over the Internet, so that they appear to subscribers like a single Ethernet LAN. A VPLS uses
multiprotocol label switching (MPLS) to create the appearance of a virtual private network (VPN) at each subscriber
location. A VPLS moves each subscriber's Ethernet packets seamlessly to other locations by tunneling them through the
provider network, independent of traffic from other Internet users. Fault-tolerance ensures that each packet arrives
intact at its intended destination. A VPLS is easy to use because subscribers do not have to connect directly to the
Internet. Instead, they connect as if to an Ethernet network. A VPLS can provide point-to-point and multipoint services,
as well as any-to-any capability. It is possible to build a VPLS over a wide geographic area, and the technology allows
for subscribers to change locations easily. The service is also scalable. A VPLS can serve anywhere from a few subscribers
up to hundreds of thousands. Virtual Private LAN Services, or Layer-2 VPNs, provide customers with an extension of their
local network. The customer network does not see the provider network at all, and acts as if the provider network does
not exist. This allows the customer's network administrator complete control over how the network should run.
Wireless LAN:
A wireless LAN (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for,
a wired LAN within a building or campus. Using electromagnetic waves, WLANs transmit and receive data over the air,
minimizing the need for wired connections. Thus, WLANs combine data connectivity with user mobility, and, through
simplified configuration, enable movable LANs.
WiFi (short for "wireless fidelity") is a term for certain types of wireless local area network (WLAN) that use
specifications in the 802.11 family. The term WiFi was created by an organization called the WiFi Alliance, which oversees
tests that certify product interoperability. A product that passes the alliance tests is given the label "WiFi certified"
(a registered trademark
Security is a great concern when deploying wireless technology in a government environment. Wireless networks, such as
WiFi, have long been characterized as being more vulnerable to security risks when compared to wired networks. However,
by implementing proper security measures and employing sophisticated authentication and data encryption technology,
WiFi networks can be just as secure as wired networks.
As a result of recent guidelines, security should no longer be a concern with WiFi service. In the past from 2001,
protocol in place offered WiFi users with only limited wireless access security. Since that date, four additional security
guidelines were specified and an additional category is currently under review and expected shortly. However, care will
have to be taken to ensure WSPs do some investigation with CSE or any other security group in government, so the system
will comply with corporate security regulations. This includes; providing the Authentication and Authorization solution that
conforms with IEEE 802.1X employing two factor EAP (Extensible Authentication Protocol – RFC 5247) methods, including as a
minimum EAP-TLS (RFC 5216) and Protected EAP (PEAP).
|