Database Security and Wireless Network Analysis

Verified

Added on  2020/10/22

|27
|6446
|460
AI Summary
The provided assignment is a research-based document that delves into various aspects of database security and wireless networking. It begins by discussing the implementation of negative databases as a security technique on a generic database system. The document then explores millimeter-wave enhanced local area networks, highlighting their potential for high-data-rate approaches in future wireless networks. Additionally, it touches upon security considerations in software-defined networks and presents an analysis of security attacks at IEEE 802.11 wireless local area networks. Overall, the assignment provides a comprehensive overview of database security techniques and wireless network systems.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Local Area Networking
Technologies
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
A.C 1.1 critical evaluation of different LAN technologies ...................................................1
A.C 1.2 Traffic intensive services and their performance......................................................2
A.C 1.3 LAN concerns and recommendations to sustain network security, reliability and
performance............................................................................................................................3
TASK 2 ...........................................................................................................................................4
AC2.1 Designing LAN infrastructure for FootFall field marketing Ltd................................4
A.C 2.2 Critical evaluation of the suitability of LAN components .......................................6
TASK 3............................................................................................................................................8
AC3.1 Building and configuration of LAN............................................................................8
A.C 3.2 Implementation of network security on a LAN ....................................................12
A.C 3.3 critically review and test a LAN.............................................................................15
TASK 4 .........................................................................................................................................16
A.C 4.1 Monitoring and management of LAN infrastructure ............................................16
A.C 4.2 Resolving LAN issues to improve security, reliability and performance ..............18
A.C 4.3 Evaluating LAN performance ................................................................................20
CONCLUSION..............................................................................................................................21
REFERENCES..............................................................................................................................23
Document Page
INTRODUCTION
Local area networking is considered as a network in which a combination of systems are
connected together and are sharing a common communication link (Narayanasamy and Pulla,
2017). It covers small area and range of network, so it can be classified as compatible enough for
schools, small buildings, offices etc. The local area connection can be wireless, wired or both as
well. The report discusses about various types of LAN's and factors associated with it. Also, it
involves the designing and implementation of the local area network for FootFall field marketing
Ltd. It also involves the designing and implementation of the security concerns of LAN.
Reviewing and testing of LAN will also be discussed in the report.
A.C 1.1 critical evaluation of different LAN technologies
The FootFall Field Marketing Ltd can use local area networking (LAN) to establish
interconnections between its computer systems and other devices. A wide number of LAN
technologies are available for the FootFall Field Marketing Ltd such as Ethernet, token ring,
FDDI, virtual LAN, voice over internet protocol internet technology, virtual LAN trucking
protocol and the DHCP serivces.
Voice over protocol
With the use of Voice over internet protocol the FootFall Field Marketing Ltd can use
internet by sending packets of voice data with the help of IP (Qiu andVasilakosJing, 2014). This
technology is able to manage calls and to translate the telephonic data into internet protocol
addresses. This technology reduces cost but during the interruptions or weak internet signals
service is lost. This technology will enable organisation to enhance its accessibility and quality
of voice. But it requires internet connection with high bandwidth. Thus, when FootFall Ltd
implements this technique then during high traffic it will become costly for the company to
manage its efficiency and cost.
Fibre distributed data interface (FDDI)
This LAN technology can provide better speed as compare to Ethernet and token ring
technologies. The organisation can also use this LAN technology as tool to interconnect Ethernet
and token ring. However, their cost is higher and are more fragile (Movassaghi and et.al., 2014).
FDDI is more suitable for the companies which have excessive network traffic so that its
excessive cost is in alignment with high quality. FootFall Ltd may find other options instead of
this technique which can provide solutions in low cost.
1
Document Page
Ethernet:
This technology can give the best solution to FootFall Field Marketing Ltd in terms of
expenses, speed and installation procedures. But their mobility is limited and more vulnerable to
crosstalk issues. As this is suitable for short distance only organisation may bear additional
charges in future for its expansion. This is one of the most suitable LAN technology which can
be implemented easily. The given organisation can also implement this. It will be the best
solution in terms of speed, cost and network traffic (Jing, Vasilakos and Qiu, 2014.). However,
the most advanced organisations does not use it because they prefer some more advanced and
secure techniques such as DHCP.
Dynamic Host Configuration protocol(DHCP):
This technology provides IP address to systems from a predefined range which is
configured for the network. It can easily manage the IP addresses and large network support. It
has higher dependency on server availability which serves as its biggest disadvantage. It is
considered as a network protocol that helps in assigning the IP to any system.
Also, this is considered as an effective way to assign the internet protocol to the systems.
Whether it is about some node, system or branch, dynamic host configuration protocol can help
in assigning IP to any of them. DHCP is mainly preferable for the companies which have large
operational area. FootFall Ltd is operating in one building only. Thus, this solution may not be
feasible and economic for the company (Coronel and Morris, 2016). However, in future when
company plans to expand its business through vast range then it may be suitable but as per
present case study this technology is not recommended for the given organisation.
A.C 1.2 Traffic intensive services and their performance
Network traffic is defined as the amount of data flow which is transmitted through a
network at any particular instant of time. There are certain services which occupies the majority
of network bandwidth and makes traffic occupied. As a result, time delay in transmission of
upcoming data increases. These traffic occupying services are known as the traffic intensive
services (Egbunike and Rajendran, 2017). Activities such as video streaming, voice over internet
protocols are intensive to network traffic because these activities have higher demand. Other
activities such as mailing conversations, browsing does not consume much network traffic
(Grandhi, 2017). For instance FootFall Field Marketing Ltd may have to deal with lots of calls
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
then these calls need to be at priority. If network usage priorities are set by traffic intensive
services then bandwidth of the network is effectively distributes and hence cost and speed factor
improves. The FootFall Field Marketing Ltd can use differentiated service code-point for
management and classification of network traffic related issues. It also provides quality of
service (QOS).
The most important parameters for measurement of quality of video and voice over
internet protocol are latency, jitters and path delay and the perception of the network quality by
organisation. Another tool for resolving the traffic intensive issues is to use TOS byte (Smith,
and et.al., 2017). When the performance of traffic intensive services are not evaluated then it
may be difficult for the company to maintain the networking quality. These methods make it
easy for the organisation to analyse the activities which increases the network traffic and hence
they help in improving speed parameters. For the companies which do not have specific methods
for its measurement traffic can cause delay in executing priority tasks. TYPE OF SERVICE
(TOS) byte is one of the attributes of IP packets. To achieve QOS we can only give a priority
request so that a low delay and reliable high throughput routing path can be provided. In TOS
byte 3 bits of beginning are precedence bits, following 4 bits are defined as TOS bits and last bit
is defined as the MBZ (must be zero) bit (Movassaghi and et.al., 2014). To deliver video and
audio stream FootFall Field Marketing Ltd can use streaming server for assuring regular flow of
audio-video across congested and slow network. During interference also it will try to sustain the
stream flow, by degrading the quality.
A.C 1.3 LAN concerns and recommendations to sustain network security, reliability and
performance
Concerns related to LAN implementation:
Apart from major security issues LAN network also suffers from installation issues, path
loss, battery longevity and interferences issues. The multipath propagation and interference
issues can corrupt the received signals. FootFall Field Marketing Ltd has indoor application
multiple path propagation can be a severe issue. This interference problems can be reduced by
implementing equalizers and antenna.
Networking threats:
3
Document Page
FootFall Ltd requires dealing with networking threats which are major concerns for the
authorities. Ineffective strategies to deal with these issues can lead to system crash and data
leakage. A firewall resource can be implemented as an initial router. For providing password
encryption security protocols. Secured LAN network must consider attributes such as switching
and layer 2 security, IP permission list, port authentication and related security (Waliullah,
Moniruzzaman and Rahman, 2015).
Unauthorised access:
The network security can be enhanced by preventing unauthenticated usage of network
traffic. For this purpose access control list (ACL) can be implemented by FootFall Ltd to prevent
the unauthorised access (Narayanasamy and Pulla, 2017). Thus, ACL's main task is to effectively
manage authentication issues in a fine grained manner. Another secure tool is to use media
access control (MAC) filtering. This security control tool allows blacklisting of certain networks
from accessing in order to prevent the unauthorised access. Since MAC can identify devices only
an authorised member will also need to be in white list for every system that will be used to
access the network. MAC filtering gives more effective results ins wired networking because in
wired networking it becomes more difficult to identify the authorised one. Hence, security of
LAN is increased.
TASK 2
AC2.1 Designing LAN infrastructure for FootFall field marketing Ltd.
This is the infra structure of FootFall field marketing Ltd. It makes involvement of all the five
departments and IT department is connected to all the other departments of the organisation. The
basic requirement of the FootFall field marketing Ltd is that the manager of IT department
should be able to access the other systems that are connected over the network. So, it has been
centralised in a way so that it remains connected with all the other systems.
4
Document Page
For maintaining the security concerns, all the data and information of the systems have been
stored over the cloud. As per the requirement of the FootFall field marketing Ltd, which is to
store the data and information of all the employees on three floors, involvement of cloud is a
better option. It is because a cloud has enormous space for having a wide amount of data.
Therefore, this can be considered as an efficient way to cover the requirements of FootFall field
marketing Ltd.
Therefore, the LAN that has been designed and implemented can be termed as effective enough
because it covers all the basic requirements of FootFall field marketing Ltd.
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The implemented LAN system has an IP address of class C and along with that, for maintaining
the security concerns, cloud has been used for storing of all the information of the systems. In the
screenshot it is observed that IP address are allocated for the designed local area network. In the
general settings of TCP/IP properties users can choose the options such as obtaining IP address
or DNS server address automatically. In the screenshot attached IP address of class C are
selected as the preferable range and thus a suitable range of subnet mask is also filled.
A.C 2.2 Critical evaluation of the suitability of LAN components
The LAN components plays key role in determining the effectiveness of the implemented
LAN system. These components are:
Network adapter: It connects the computer system with network. Its main purpose is to convert
computer or binary data into electronic signals (Deng, Chen and Cheng, 2014). Instead of using
it the organisation can use virtual network adaptor. It will enable company to connect with
6
Document Page
internet and to make its functions more accurate and smooth. With the help of this the company
will be able to transmit its data and information from one system to other over network. Thus, it
will make data sharing easy and quick for the organisation and help to achieve its operational
task with ease.
Network Medium: The wired LAN network requires cables for interconnections. There are
various options available such as twisted pair cable, optical fibre cable, UTP cable or coaxial
cable. Twisted cable is also known as Ethernet or network cable. UTP cable has higher
bandwidth range and lower cost as compare to twisted pair or optical fibre. For wireless LAN
network data transmission is achieved by radio waves instead of cables. The data transfer rate is
very higher for network medium comprising optical fibres. They are transparent and expensive
hence their usage can increase the cost of implementation (Simmons, 2014).
Cable connector: These are also known as network or Ethernet port. RJ45 is the most widely
used connector. It mainly connects the twisted pair cable. Thus, for wired network this is an
important component. The use of cable connector for wired network increases the complexity of
design and implementation. If organisation will use these connectors then, there will be complex
network of cables. In cases when there is problem in specific cable then it becomes difficult to
select the one from the bunch of cables or from the cables which are transplanted in walls. The
Ethernet provided with cable connection can provide high speed as compare to the wireless
connection. It is because the wireless connection will involve more interference. Hence, for
better productivity the LAN design of the company must use wired connection.
Power supply: This one is the component which is implemented by both wired and wireless
networks. Organisation implementing wired network uses cables to transmit data in the form of
electronic pulse (Deng, Chen and Cheng, 2014). On the other hand in case of wireless network
the power supply is re requited to generate the radio waves which serves as the networking
medium.
Switch: Switch is also called hub or router. It provides routing path. Signals received on one port
of the switch is transmitted to all of its other ports. They provide a switching table in RAM. If
company will use hubs instead of these switches then, there will be great impact on latency and
speed of the LAN network. In comparison to hubs switches are more capable and provide high
speed. The company can prefer routers over switches. But in regards with the small size of the
LAN network of organisation switches will be more suitable from cost perspective. It will also
7
Document Page
provide additional advantage of providing sufficient bandwidth to each device connected with
the switch.
Network Software: This software application converts the data packets into segments and each
segment is converted into packets. These network software enhances the security of the system
and are of low cost. Each packet has its source and destination mentioned on it. These data
packets are interpreted by the receiver to convert into meaningful information and to transmit it
to the desired destination (Jing, Vasilakos and Qiu, 2014).
TASK 3
AC3.1 Building and configuration of LAN
It shows the configuration of LAN. AS the requirement of FootFall field marketing Ltd was to
assign class C IP address, so the same has been implemented. It will also help in the sub netting
of the network. There are five departments on overall basis. IT department of FootFall field
8
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
marketing Ltd have been centralised in a way that the manager of department can access all the
other department systems that are connected over the network.
9
Document Page
There are various classes of IP address but as per the requirement of FootFall field marketing
Ltd, class C IP address has to be implemented to the systems so that it can have an efficiency in
processing of operations and also, sub netting can be done easily. Therefore, for coping with the
requirements, class C IP address have been used accordingly. All the systems have been
connected over the network and IT department have been centralised in a way so that it can have
an access to all the other systems of other departments that are connected over the network.
10
Document Page
The IP address configuration and DNS allocation is shown in the above screenshots. It shows
that the systems connected in the network are configured with the DNS server and IP through
which they can communicate with each other.
11
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The LAN configuration of the organisation consist of details related to IP address, DNS server
and the maximum limit of DHCP servers in the designed network. Each floor of FootFall Ltd
consists of routers and firewalls. The computers of each department are connected with IT so that
information technology department can have access and monitoring to all of them. Each floor
has its own server which connects the system at that floor. Along with these servers all
departments are connected with the main server of the organisation.
A.C 3.2 Implementation of network security on a LAN
In order to improve the network security FootFall Field Marketing Ltd must ensure that
automatic software updates are enabled. Firewall and anti spam software must be installed in the
LAN network in order to prevent unauthorised access (Montemurro, McColga and McCann,
2018). Also, organisation must use antivirus as per its infrastructure. There are hardware and
software tools such as intrusion detection and prevention system which have abilities to sense the
12
Document Page
malicious cyber attacks. The cyber team of the FootFall Field Marketing Ltd must carefully
monitor the results of these tools.
One of the most important network security feature is virtual local area network (VLAN).
VLAN creates independent logical network within the given networks of computers. By
implementation of VLAN FootFall Field Marketing Ltd can divide different segments of real
networking groups into logical networking segment. One of the advantage of VLAN is that it can
be configured through software instead of hardware. Access control list (ACL) can also
contribute security task by filtration of network traffics. Internet protocol security(IPSec)
protocol set provides secure communication at the different layers of networking (Chu and et.al.,
2015). Its main advantages is that it is very flexible and it can provide the strong security features
to IP.
The command prompt window below show that LAN configuration has been implemented and
systems responds to each other.
13
Document Page
14
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
A.C 3.3 critically review and test a LAN
In order to review and test the performance of LAN, FootFall Field Marketing Ltd must
undergo vulnerability scanning process. These processors will first identify the open ports in
designed LAN of the organisation. It will also give the analysis of IP addresses, software and
operating systems which are being use by the FootFall Field. The obtained results will be then
compared with database. With this strategy FootFall Field Marketing Ltd can mark its LAN in
range from less vulnerable to high vulnerable. If vulnerabilities are present then based on their
strength either they can be ignored or a strict action can be taken against these vulnerabilities to
resolve them.
For testing that LAN system is giving required speed, LAN speed test tools such as
Totusoft's LAN speed test can be used. Another parameter for testing the performance of LAN is
to monitor the actions of network during audio-video streaming or file transferring action
(Clifford and et.al., 2015). This will give us complete analysis that what portion of bandwidth is
utilised and which one is spiked.
There are certain tools such as TCPview, iperf, jperf with the help of which we can even plot
bandwidth usage. Such tools will help FootFall Field Marketing Ltd to monitor the network. The
organisation must also ensure that vulnerability test should target network from within as well as
from public mode segment of network.
The FootFall Ltd requires managing the records of its employees, customers and details of each
of its functional department. The implemented LAN system allows organisation to share these
records with safe and secure mechanism. The company can monitor the type of data which is
transmitted through the network. This monitoring and analysis will help to avoid network traffic
and to minimise the time delay in processing data.
Test plan and its outcomes: The implemented LAN infrastructure can be tested by following test
plan.
Requirement specification: The organisation is implementing the infrastructure so that it can
execute its increasing operational activities with ease and more accuracy. FootFall Ltd wants
that its IT department must have authority to access all other departments. The security and
reliability concerns of the company are also mandatory to address in the designing step.
Test strategy and objectives: The LAN designing must meet the objectives as well as cost
15
Document Page
estimation. The design must be feasible so that it can be modified easily in future if company
requires some advancements. Test plan and testing will save the organisational resources and
security threats of their network (Rogstad and Briand, 2016).
Test criteria: The developed network must be verifiable so that company can integrate it with
its various applications. The installation and uninstallation methods must be easy to manage and
must support the backup facility. The network must work smoothly under heavy volume of data
without compromising the security aspects.
Resource planning and testing environment: Certain test methods such as performance testing
and network monitoring does not require use of algorithms or coding. On the other hand
security concerns requires deep understanding of coding. So FootFall Ltd must ensure that
suitable resources are available for the testing procedures.
Schedule and estimation: The testing cost must be estimated and must include the aspects such
as types and generation of test data, network testing tools and their implementation for future
references (Chow and et.al., 2017).
Test outcomes for LAN structure of FootFall Ltd: From the testing results the network traffic
of organisation can be easily monitored. It will help company to manage its resources
appropriately. The testing procedures with variable test data type also provides the status of
security features of the designed network (Clifford and et.al., 2015).
16
Document Page
From the screenshot attached it is analysed that network traffic monitoring can help
organisation to review the status and effectiveness of hardware systems. It has also
demonstrated the number of switches in stack.
17
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The analysis of mostly used 10 applications is also obtained from the test outcomes. With this
organisation can analyse that which application is utilising traffic the most.
TASK 4
A.C 4.1 Monitoring and management of LAN infrastructure
Post implementation of LAN requires regular monitoring to assure smooth execution of
network. The FootFall Field Marketing Ltd must use a monitoring tool which completely
evaluates the network instead of evaluating certain paths. Video streaming and voice over
internet protocol requires high quality thus monitoring tool must be able to focus on these need
as well. To check the network usage these monitoring tools works in intervals. They send signals
to different ports of the system. These signals are also known as ping (Ghosh, Thomas and Nie,
2014). There is plenty of commercial and open source monitoring tools such as MRTG, Nagios,
OpenNMS, SolarWinds and Spice works IT Management.
FootFall Field Marketing Ltd must regularly create check rule for its most important
systems. On completion of this analysis organisation must develop a suitable strategy to change
network control procedure. FootFall Field Marketing Ltd must also monitor the
interdependencies of certain systems. With such monitoring if router failure occurs at one site of
network then organisation will be aware of other dependent sites as well (Chow and et.al., 2017).
For better management of LAN FootFall Field Marketing Ltd can also implement standard
networking management protocols. Such protocols not only gives an alert regarding system
failure or lowering but also provides additional information such as causes and possible solutions
for it. For troubleshooting cyber attacks FootFall Field Marketing Ltd must also keep an eye on
users and devices connected through the network. Such tracking system reduces risks of cyber
attacks greatly.
18
Document Page
The above screenshot shows that IT department can access the systems of other department. The
ping command verifies that there is data flow between both the systems.
19
Document Page
Criteria for evaluation: The choice of monitoring tools for FootFall Ltd depends upon number
of factors such as it must respond to notify the network failure. These tools must be able to
interact with the existing system capabilities of the network. The organisation can automate it as
per the requirements.
Tools for monitoring systems: Network motoring tools can be used for keeping record of traffic
which is affecting network performance. Microsoft network monitor tools, Nagios and open
NMS are examples of these tools. Network monitoring tools eliminates the risk of network
threats before they affect the system (Rogstad and Briand, 2016). LAN designing test data of
such vulnerabilities are used to analyse the behaviour of these tools. The test data such as
inaccurate data type or with repeated values can be used for such monitoring.
A.C 4.2 Resolving LAN issues to improve security, reliability and performance
It is essential for the company to address the following LAN issues so that the
performance and reliability of implemented system can be increased.
Issues related to network attacks:
The suspicious software and viruses are the key issue from the security perspective. To
enhance the performance FootFall Field Marketing Ltd must keep its network updated. A regular
timely update of all anti viruses and firewalls reduces the risks of system failures greatly.
Issues associated with system components:
Also, organisation must have deep knowledge of its infrastructure and system
components. Such approach gives FootFall Field Marketing Ltd a better measure during network
failure conditions, and hence helps in improving the system performance. The LAN network of
the organisation must be able to combine multiple connections, in order to improve the speed. In
case of system and network failure, issues should be automatically detected and network should
switch to back up connections to improve the speed. FootFall Field Marketing Ltd can
implement virtual LAN for grouping various ports and for permitting multiple access. An
approach to separate the network traffic on the basis of nature of its traffic type can enhance the
performance and security of the network (Scott-Hayward, Natarajan and Sezer, 2016).
Security issues: It is important for company to address these issues. The network security
concerns are one of the priorities in LAN implementation. In the absence of security features
such as wireless encryption, authentication based network access permission and firewall
configuration it is easy for the attackers to steal the sensitive information from the network. The
20
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
LAN security can be improved by using several steps such as timely configuration of firewall,
strong passwords and regular traffic monitoring (Patel, Han and Jain, 2016). The network
switches does not support the firewalls thus instead of them routers can also be used. However,
there cost is higher than switches but there is always a trade off between security and cost.
Performance and reliability issues: FootFall Ltd can increase achieve its business goal by
sustaining the reliability and performance of the LAN network. There are several concerns
related to the performance and reliability factors. The managed network switches helps in
controlling server ports and reduces interference. Through network analysers the company can
shape the traffic and can develop optimized paths for data flow. It will increase the network
performance in terms of speed.
Encryption and multiple accessing related concerns:
The use of IEEE 802.1Q support is the best suitable method for achieving that approach.
FootFall Field Marketing Ltd must also take care that complexity of the network should not hide
the data encryption and authentication issues. The data encryption and strong authentication
policies are a must for both wired and wireless network. The implementation of 802.1X
authentication also gives an advantage of dynamic assignment of users to virtual LAN network.
For implementation of 802.1X FootFall Field Marketing Ltd will necessarily require RADIUS
server(Remote authentication dial in user service). With the implementation of 802.1X and
VLAN also some network traffic may remain unencrypted. To provide protection to such data
organisation can use VPN which will give encryption to sensitive network traffic during
sensitive data communication (Jing, Vasilakos and Qiu, 2014).
A.C 4.3 Evaluating LAN performance
The LAN performance of FootFall Field Marketing Ltd can be evaluated by network
reliability research. This research analyses the reliability of data travel time, performance and the
reliability of connectivity. It involves great deal of capacity and network traffic. The foremost
criteria to evaluate the LAN performance is to analyse the network latency indicators. The
Synchronisation and acknowledgement packets (SYN and ACK) within TCP session are on
priority list by the LAN network (Haldar, 2015). The three way interaction path time is an
efficient signal for checking the network latency. In an ideal condition the impact of these
packets should be negligible. The performance can be measured by network analysers and traffic
management tools. These tools monitor the network so that its efficiency can be sustained. For
21
Document Page
example for monitoring the videos and audio FootFall Ltd has used voice over internet protocol.
It will stream the high bandwidth requiring data. For evaluating the security related performance
of developed system security tools are tested with test data types.
The organisation can evaluate its performance by using networking tools such as Iperf.
These tools measure the bandwidth, jitters, data loss during transmission as well as time delay
(Narayanasamy and Pulla, 2017). The analysis of these factors will evaluate the performance of
network. For the designed network of FootFall Ltd it is observed that video calls makes data
transmission time consuming. So company must have strict control that only useful videos are
exchanged. The speed of system is satisfactory and network analysers effectively manages the
traffic.
The local area network will provide effective networking solution to FootFall Ltd. It will enable
the company to share its resources and to share information between various departments. The
sharing will reduce its operational costs and time delay. Networking is an effective approach to
meet the growing business requirements by enhancing speed and accuracy (Bailis and et.al.,
2014). The LAN network suffers from various security and maintenance concerns. This security
concerns can be resolved by appropriate measurements such as firewalls and other security
enhancement methods discussed above.
22
Document Page
In the performance evaluation of FootFall Ltd the iperf tool can provide bandwidth and transfer
speed of the data. Thus, this tool can be used for measuring performance of implemented system.
The performance of LAN is also influenced by the round trip acknowledgement time. If latency
of round trip acknowledgement is slower an any end port of the LAN network then it indicates
that the network is overloaded and it can increase the processing time (Ghosh, Thomas and Nie,
2014). The FootFall Field Marketing Ltd must also consider the packet loss indications. When
data packets do not reach the intended destination due to some kind of error or they are lost due
to heavy traffic then it is very difficult to retrace them and hence user need to re transmit them.
Such retransmission and delivery failure of data packets can cause the increase in network traffic
burden. For high performance the server processing time should be minimum. The average
response time experienced by network also depends on volume and quality of data.
CONCLUSION
It can be concluded from the report that FootFall field marketing Ltd can make the
designing and implementation of LAN in order to achieve their requirements. Different aspects
and concerns of security of LAN have also been achieved in the report. A proper implementation
of LAN has been done and IP have been allocated to the same as per the requirement of the
system. There are also various issues associated with security, reliability and performance of
LAN, so proper measures for resolving the same have also been implemented in the report.
23
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journals
Bailis, P., Fekete, A., and et.al., 2014. Coordination avoidance in database systems. Proceedings
of the VLDB Endowment. 8(3). pp.185-196.
Chow, P., Bhagavatula, R., and et.al., 2017. Systems and methods for traffic load balancing on
multiple WAN backhauls and multiple distinct LAN networks. U.S. Patent 9,847,944.
Chu, L., Zhang, H., and et.al., 2015. Medium Access Control for Multi-Channel OFDM in a
Wireless Local Area Network. U.S. Patent Application 14/538,573.
Clifford, A., Emanowicz, K., and et.al., 2015. Test data generation and scale up for database
testing using unique common factor sequencing. U.S. Patent 9,171,026.
Coronel, C. and Morris, S., 2016. Database systems: design, implementation, & management.
Cengage Learning.
Deng, D. J., Chen, K.C. and Cheng, R. S., 2014, August. IEEE 802.11 ax: Next generation
wireless local area networks. In Heterogeneous networking for quality, reliability,
security and robustness (QShine), 2014 10th international conference on(pp. 77-82).
IEEE.
Egbunike, C. and Rajendran, S., 2017, April. The implementation of negative database as a
security technique on a generic database system. In Circuit, Power and Computing
Technologies (ICCPCT), 2017 International Conference on (pp. 1-8). IEEE.
Ghosh, A., Thomas, T.A. and Nie, S., 2014. Millimeter-wave enhanced local area systems: A
high-data-rate approach for future wireless networks. IEEE Journal on Selected Areas in
Communications. 32(6). pp.1152-1163.
Grandhi, S. A., InterDigital Patent Holdings Inc, 2017. Group transmissions in wireless local
area networks. U.S. Patent 9,585,043.\
Haldar, S., 2015. SQLite Database System Design and Implementation. Sibsankar Haldar.
Jing, Q., Vasilakos, A. V. and Qiu, D., 2014. Security of the Internet of Things: perspectives and
challenges. Wireless Networks. 20(8). pp.2481-2501.
Montemurro, M. P., McColgan, B. E. and McCann, S., BlackBerry Ltd, 2018. Methods and
apparatus for peer-to-peer communications in a wireless local area network. U.S. Patent
9,949,305.
24
Document Page
Movassaghi, S., Abolhasan, M., and et.al., 2014. Wireless body area networks: A survey. IEEE
Communications Surveys & Tutorials, 16(3), pp.1658-1686.
Narayanasamy, S. and Pulla, I. R., Brocade Communications Systems Inc, 2017. Virtual machine
and application movement over local area networks and a wide area network. U.S. Patent
9,781,052.
Patel, K., Han, H. and Jain, A.K., 2016, October. Cross-database face antispoofing with robust
feature representation. In Chinese Conference on Biometric Recognition (pp. 611-619).
Springer, Cham.
Rogstad, E. and Briand, L., 2016. Cost-effective strategies for the regression testing of database
applications: Case study and lessons learned. Journal of Systems and Software, 113,
pp.257-274.
Scott-Hayward, S., Natarajan, S. and Sezer, S., 2016. A survey of security in software defined
networks. IEEE Communications Surveys & Tutorials. 18(1). pp.623-654.
Simmons, J.M., 2014. Optical network design and planning. Springer.
Smith, J.P., Miller, R.J., and et.al., 2017. An Implementation of a Database Management System
for Real-Time Large-Lake Observations. Marine Technology Society Journal.51(6).
pp.5-9.
Waliullah, M., Moniruzzaman, A. B. M. and Rahman, M. S., 2015. An Experimental Study
Analysis of Security Attacks at IEEE 802. 11 Wireless Local Area Network. International
Journal of Future Generation Communication and Networking. 8(1). pp.9-18.
25
chevron_up_icon
1 out of 27
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]