logo

Local Area Networking Technologies : Assignment

   

Added on  2020-10-22

27 Pages6446 Words460 Views
Local Area NetworkingTechnologies

TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1A.C 1.1 critical evaluation of different LAN technologies ...................................................1A.C 1.2 Traffic intensive services and their performance......................................................2A.C 1.3 LAN concerns and recommendations to sustain network security, reliability andperformance............................................................................................................................3TASK 2 ...........................................................................................................................................4AC2.1 Designing LAN infrastructure for FootFall field marketing Ltd................................4A.C 2.2 Critical evaluation of the suitability of LAN components .......................................6TASK 3............................................................................................................................................8AC3.1 Building and configuration of LAN............................................................................8A.C 3.2 Implementation of network security on a LAN ....................................................12A.C 3.3 critically review and test a LAN.............................................................................15TASK 4 .........................................................................................................................................16A.C 4.1 Monitoring and management of LAN infrastructure ............................................16A.C 4.2 Resolving LAN issues to improve security, reliability and performance ..............18A.C 4.3 Evaluating LAN performance ................................................................................20CONCLUSION..............................................................................................................................21REFERENCES..............................................................................................................................23

INTRODUCTIONLocal area networking is considered as a network in which a combination of systems areconnected together and are sharing a common communication link (Narayanasamy and Pulla,2017). It covers small area and range of network, so it can be classified as compatible enough forschools, small buildings, offices etc. The local area connection can be wireless, wired or both aswell. The report discusses about various types of LAN's and factors associated with it. Also, itinvolves the designing and implementation of the local area network for FootFall field marketingLtd. It also involves the designing and implementation of the security concerns of LAN.Reviewing and testing of LAN will also be discussed in the report.A.C 1.1 critical evaluation of different LAN technologies The FootFall Field Marketing Ltd can use local area networking (LAN) to establishinterconnections between its computer systems and other devices. A wide number of LANtechnologies are available for the FootFall Field Marketing Ltd such as Ethernet, token ring,FDDI, virtual LAN, voice over internet protocol internet technology, virtual LAN truckingprotocol and the DHCP serivces. Voice over protocolWith the use of Voice over internet protocol the FootFall Field Marketing Ltd can useinternet by sending packets of voice data with the help of IP (Qiu andVasilakosJing, 2014). Thistechnology is able to manage calls and to translate the telephonic data into internet protocoladdresses. This technology reduces cost but during the interruptions or weak internet signalsservice is lost. This technology will enable organisation to enhance its accessibility and qualityof voice. But it requires internet connection with high bandwidth. Thus, when FootFall Ltdimplements this technique then during high traffic it will become costly for the company tomanage its efficiency and cost. Fibre distributed data interface (FDDI)This LAN technology can provide better speed as compare to Ethernet and token ringtechnologies. The organisation can also use this LAN technology as tool to interconnect Ethernetand token ring. However, their cost is higher and are more fragile (Movassaghi and et.al., 2014).FDDI is more suitable for thecompanies which have excessive network traffic so that itsexcessive cost is in alignment with high quality. FootFall Ltd may find other options instead ofthis technique which can provide solutions in low cost. 1

Ethernet: This technology can give the best solution to FootFall Field Marketing Ltd in terms ofexpenses, speed and installation procedures. But their mobility is limited and more vulnerable tocrosstalk issues. As this is suitable for short distance only organisation may bear additionalcharges in future for its expansion. This is one of the most suitable LAN technology which canbe implemented easily. The given organisation can also implement this. It will be the bestsolution in terms of speed, cost and network traffic (Jing, Vasilakos and Qiu, 2014.). However,the most advanced organisations does not use it because they prefer some more advanced andsecure techniques such as DHCP. Dynamic Host Configuration protocol(DHCP): This technology provides IP address to systems from a predefined range which isconfigured for the network. It can easily manage the IP addresses and large network support. Ithas higher dependency on server availability which serves as its biggest disadvantage. It isconsidered as a network protocol that helps in assigning the IP to any system. Also, this is considered as an effective way to assign the internet protocol to the systems.Whether it is about some node, system or branch, dynamic host configuration protocol can helpin assigning IP to any of them. DHCP is mainly preferable for the companies which have largeoperational area. FootFall Ltd is operating in one building only. Thus, this solution may not befeasible and economic for the company (Coronel and Morris, 2016). However, in future whencompany plans to expand its business through vast range then it may be suitable but as perpresent case study this technology is not recommended for the given organisation. A.C 1.2 Traffic intensive services and their performanceNetwork traffic is defined as the amount of data flow which is transmitted through anetwork at any particular instant of time. There are certain services which occupies the majorityof network bandwidth and makes traffic occupied. As a result, time delay in transmission ofupcoming data increases. These traffic occupying services are known as the traffic intensiveservices (Egbunike and Rajendran, 2017). Activities such as video streaming, voice over internetprotocols are intensive to network traffic because these activities have higher demand. Otheractivities such as mailing conversations, browsing does not consume much network traffic(Grandhi, 2017). For instance FootFall Field Marketing Ltd may have to deal with lots of calls2

then these calls need to be at priority. If network usage priorities are set by traffic intensiveservices then bandwidth of the network is effectively distributes and hence cost and speed factorimproves. The FootFall Field Marketing Ltd can use differentiated service code-point formanagement and classification of network traffic related issues. It also provides quality ofservice (QOS). The most important parameters for measurement of quality of video and voice overinternet protocol are latency, jitters and path delay and the perception of the network quality byorganisation. Another tool for resolving the traffic intensive issues is to use TOS byte (Smith,and et.al., 2017).When the performance of traffic intensive services are not evaluated then itmay be difficult for the company to maintain the networking quality. These methods make iteasy for the organisation to analyse the activities which increases the network traffic and hencethey help in improving speed parameters. For the companies which do not have specific methodsfor its measurement traffic can cause delay in executing priority tasks. TYPE OF SERVICE(TOS) byte is one of the attributes of IP packets. To achieve QOS we can only give a priorityrequest so that a low delay and reliable high throughput routing path can be provided. In TOSbyte 3 bits of beginning are precedence bits, following 4 bits are defined as TOS bits and last bitis defined as the MBZ (must be zero) bit (Movassaghi and et.al., 2014). To deliver video andaudio stream FootFall Field Marketing Ltd can use streaming server for assuring regular flow ofaudio-video across congested and slow network. During interference also it will try to sustain thestream flow, by degrading the quality. A.C 1.3 LAN concerns and recommendations to sustain network security, reliability andperformanceConcerns related to LAN implementation: Apart from major security issues LAN network also suffers from installation issues, pathloss, battery longevity and interferences issues. The multipath propagation and interferenceissues can corrupt the received signals. FootFall Field Marketing Ltd has indoor applicationmultiple path propagation can be a severe issue. This interference problems can be reduced byimplementing equalizers and antenna. Networking threats: 3

FootFall Ltd requires dealing with networking threats which are major concerns for theauthorities. Ineffective strategies to deal with these issues can lead to system crash and dataleakage. A firewall resource can be implemented as an initial router. For providing passwordencryption security protocols. Secured LAN network must consider attributes such as switchingand layer 2 security, IP permission list, port authentication and related security (Waliullah,Moniruzzaman and Rahman, 2015). Unauthorised access: The network security can be enhanced by preventing unauthenticated usage of networktraffic. For this purpose access control list (ACL) can be implemented by FootFall Ltd to preventthe unauthorised access (Narayanasamy and Pulla, 2017). Thus, ACL's main task is to effectivelymanage authentication issues in a fine grained manner. Another secure tool is to use mediaaccess control (MAC) filtering. This security control tool allows blacklisting of certain networksfrom accessing in order to prevent the unauthorised access. Since MAC can identify devices onlyan authorised member will also need to be in white list for every system that will be used toaccess the network. MAC filtering gives more effective results ins wired networking because inwired networking it becomes more difficult to identify the authorised one. Hence, security ofLAN is increased. TASK 2 AC2.1 Designing LAN infrastructure for FootFall field marketing Ltd.This is the infra structure of FootFall field marketing Ltd. It makes involvement of all the fivedepartments and IT department is connected to all the other departments of the organisation. Thebasic requirement of the FootFall field marketing Ltd is that the manager of IT departmentshould be able to access the other systems that are connected over the network. So, it has beencentralised in a way so that it remains connected with all the other systems. 4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Local Area Networking Technologies - Doc
|22
|5996
|215

Local Area Networking Technologies PDF
|8
|2286
|116

LAN Infrastructure Design and Implementation for Foot-Fall Field Marketing Ltd
|43
|6920
|485

LAN Network Design and Implementation for FootFall Marketing Field
|47
|6713
|211

LOCAL AREA NETWORKING TECHNOLOGIES: A Comprehensive Guide for FootFall Field Marketing Ltd.
|32
|7017
|300

Data Communication and Networks Assignment (Solved)
|8
|1408
|187