Networks

LAN Networks

GlobeConsult has overseen many LAN application installations and has the necessary resources to cover all aspects, including: router and server configuration; applications software analysis and specifications; and hardware deployment. A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link and typically share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) or as many as thousands of users (for example, in an FDDI network). Ethernet is the most widely-installed local area network (LAN) technology.

LAN Technology

VLPS:

Globeconsult has developed recent experience in a new LAN technology utilising the Internet instead of single private networks. This service called Virtual private LAN service (VPLS) is a technology that makes it possible to connect local area networks (LANs) over the Internet, so that they appear to subscribers like a single Ethernet LAN. A VPLS uses multiprotocol label switching (MPLS) to create the appearance of a virtual private network (VPN) at each subscriber location. A VPLS moves each subscriber's Ethernet packets seamlessly to other locations by tunneling them through the provider network, independent of traffic from other Internet users. Fault-tolerance ensures that each packet arrives intact at its intended destination. A VPLS is easy to use because subscribers do not have to connect directly to the Internet. Instead, they connect as if to an Ethernet network. A VPLS can provide point-to-point and multipoint services, as well as any-to-any capability. It is possible to build a VPLS over a wide geographic area, and the technology allows for subscribers to change locations easily. The service is also scalable. A VPLS can serve anywhere from a few subscribers up to hundreds of thousands. Virtual Private LAN Services, or Layer-2 VPNs, provide customers with an extension of their local network. The customer network does not see the provider network at all, and acts as if the provider network does not exist. This allows the customer's network administrator complete control over how the network should run.

Wireless LAN:

A wireless LAN (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus. Using electromagnetic waves, WLANs transmit and receive data over the air, minimizing the need for wired connections. Thus, WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs.

WiFi (short for "wireless fidelity") is a term for certain types of wireless local area network (WLAN) that use specifications in the 802.11 family. The term WiFi was created by an organization called the WiFi Alliance, which oversees tests that certify product interoperability. A product that passes the alliance tests is given the label "WiFi certified" (a registered trademark

Security is a great concern when deploying wireless technology in a government environment. Wireless networks, such as WiFi, have long been characterized as being more vulnerable to security risks when compared to wired networks. However, by implementing proper security measures and employing sophisticated authentication and data encryption technology, WiFi networks can be just as secure as wired networks.

As a result of recent guidelines, security should no longer be a concern with WiFi service. In the past from 2001, protocol in place offered WiFi users with only limited wireless access security. Since that date, four additional security guidelines were specified and an additional category is currently under review and expected shortly. However, care will have to be taken to ensure WSPs do some investigation with CSE or any other security group in government, so the system will comply with corporate security regulations. This includes; providing the Authentication and Authorization solution that conforms with IEEE 802.1X employing two factor EAP (Extensible Authentication Protocol RFC 5247) methods, including as a minimum EAP-TLS (RFC 5216) and Protected EAP (PEAP).