LAN Infrastructure Design and Implementation for Foot-Fall Field Marketing Ltd

Verified

Added on Ā 2024/05/20

|37
|5933
|184
AI Summary
This report examines the design and implementation of a Local Area Network (LAN) for Foot-Fall Field Marketing Ltd, a medium-sized organization involved in marketing and sales. It critically evaluates different LAN technologies, analyzes traffic-intensive services, and addresses security concerns. The report details the LAN infrastructure design, including the selection of suitable components, and outlines the configuration process, including VLAN implementation and network security measures. It also includes a comprehensive review and testing of the LAN, along with recommendations for monitoring, management, and troubleshooting to ensure optimal performance, security, and reliability.

Contribute Materials

Your contribution can guide someoneā€™s learning journey. Share your documents today.
Document Page
LOCAL AREA NETWORK

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
LO 1.................................................................................................................................................2
1.1critically evaluate different LAN technologies.......................................................................2
1.2 critically analyse traffic intensive services and their performance........................................6
1.3 Discuss LAN concerns and make recommendations to sustain network security, reliability
and performance..........................................................................................................................9
LO2................................................................................................................................................12
2.1 design a LAN infrastructure for the company which will facilitate all of their requirements
...................................................................................................................................................12
2.2 critically evaluate the suitability of LAN components........................................................14
LO3................................................................................................................................................16
3.1 build and configure a LAN (including services) to meet a given requirement...................16
3.2 implement network security on a LAN...............................................................................20
3.3 critically review and test a LAN..........................................................................................24
LO4................................................................................................................................................27
4.1 critically discuss how this LAN infrastructure will be monitored and managed (via
troubleshooting) if there is any issue during post implementation period.................................27
4.2 Resolve LAN issues to improve security, reliability and performance...............................28
4.3 critically evaluate the performance of a LAN.....................................................................30
CONCLUSION..............................................................................................................................32
REFERENCES..............................................................................................................................33
Document Page
LIST OF TABLES
Table 1: Table representing test feature of the LAN.....................................................................24
Table 2: Table For Evaluating The Network Performance...........................................................30
Document Page
LIST OF FIGURES
Figure 1: Ethernet connection using the Ethernet cable..................................................................2
Figure 2: Wired Ethernet network using fibre optic cable..............................................................3
Figure 3: Wireless Ethernet Network using NIC.............................................................................3
Figure 4: Wireless LAN...................................................................................................................4
Figure 5: Interconnected devices using token ring..........................................................................5
Figure 6: Port security configuration script.....................................................................................9
Figure 7: ACLs used for network security....................................................................................10
Figure 8: Ingress and Egress of ACLs...........................................................................................10
Figure 9: Network Design For The Organisation..........................................................................12
Figure 10: Switch configuration...................................................................................................16
Figure 11: Configuration of a wireless router with Class C IP address.........................................17
Figure 12: Firewall configuration on server..................................................................................17
Figure 13: Window server manager's dashboard...........................................................................18
Figure 14: Table representing the address location in class C.......................................................19
Figure 15: Configuration of Local client device............................................................................19
Figure 16: Steps for configuring of VLAN membership...............................................................20
Figure 17: Implementation of ACLs..............................................................................................21
Figure 18: Configuration of DNS..................................................................................................21
Figure 19: Authentication of server service...................................................................................22
Figure 20: Configuration of a switch in first building...................................................................23
Figure 21:Configurations of network design.................................................................................23
Figure 22: Successful Ping test for connecting computers to same department and Ping test fails
when done for connecting computers of the management...........................................................24

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTRODUCTION
Local area network is a computer network that is used for linking computers over a restricted
geographical area that can be a building or an organisation. In the present report, FootFall Field
Marketing is considered as a case study for studying LAN. The organisation is medium sized that
is involved in function like marketing and sales. The report discusses about various LAN
technologies, traffic intensive services and security concerns related to LAN along with
recommendations regarding maintenance of the network in terms of reliability, security and
performance. The report discusses about the infrastructure of the LAN for the organisation with
suitability network components. The present report analyses the configuration of LAN for the
organisation along with the implementation of network security and testing of LAN in regarding
with expected and actual result achieved. Lastly, the report also studies about checking and
troubleshoot LAN errors. Proper recommendation regarding the issues related to LAN is also
discussed in the report for improving reliability, security and performance are provided in the
report.
1
Document Page
LO 1
1.1critically evaluate different LAN technologies
LAN stands for Local Area Network which is a part of computer network for connecting various
terminals located in a place or a building for proper communication among them to share
information and resources. Devices in the network can be connected either using or wires or
wireless. All the devices in the network can receive and send information that is addressed to it
specifically. Some of the examples of LAN technologies are Ethernet, WLAN (using 802.11),
and Token Ring. Standards are sets of rules that are followed for data transmission.
Ethernet
One of the most commonly used LAN technology is Ethernet because it is quite easy to
understand, implementing the network structure is simple and maintenance and implementation
is very less when compared with other LAN technologies. Under 802.3 of IEEE standards,
Ethernet is defined. In Ethernet computers are connected using cables and this network can
connect 1024 workstations and computers.
In terms of topology Ethernet is very flexible. Ethernet is capable of providing 100mpbs speed
but most of the network used only 10mpbs.
Figure 1: Ethernet connection using the Ethernet cable
2
Document Page
Figure 2: Wired Ethernet network using fibre optic cable
In wired Ethernet all the devices in the network are connected with one other using a fibre optic
cable and the network is mostly within 10km (Kumar and Malhotra, 2015). To resolve issues of
collisions for sending information CSMA/CD is used. While on other hand in wireless Ethernet,
systems are connected using NIC (Network Interface Card). NIC uses radio waves for
establishing communication using a wireless switch.
Figure 3: Wireless Ethernet Network using NIC
Wireless LAN (WAN)
3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WAN or wireless LAN is also called as LAWN (Local Area wireless Network) in this type of
network mobile devices is capable of connecting to a LAN using a wireless connection. WLAN
is defined by using radio or wireless connection (Rao et al 2017). It is well defined by IEEE
802.11. This network allows the user to move free around the coverage area of the network.
Figure 4: Wireless LAN
Every element of WLAN is considered as station that is categories as either clients or access
point. APs are the one that receives or transmits signals using radio frequency operating like a
router whereas client can be a workstation, computer or phones.
Token ring
Token ring network also falls in LAN; here all the computers in the network are interconnected
in star topology or in ring topology. And logical token are being passed from one host to other.
In a network using token ring does not support colliding of data packets as data here can be sent
by only the token holders. IEEE standard defining this network is 802.5. Data in this network can
be sent at speed of 4, 16 and 100Mpbs.
4
Document Page
Figure 5: Interconnected devices using token ring
5
Document Page
1.2 critically analyse traffic intensive services and their performance
QoS or Quality of service in the ability of network to provide maximum output by achieving
maximum possible bandwidth along with overcoming of other network issue related to
performance such as error rate, latency and uptime. Proper management of quality of service is
required in a network for proper management and controlling the resources by prioritising data in
the network (Ali, 2017). QoS of a network can effectively improve by using various techniques
of traffic shaping. Main aim of QoS technologies applied in a network is make video, voice and
data union more clear to all the end users. QoS is considered to be an essential element for an
efficient network convergence of video audio and various data in the network.
The first aim of the QoS policy applied in any network is to identify the traffic that needs
attention. Various marking tools are used for doing these some of them has been mentioned
below:
In Layer 2, Multiprotocol Label Switching Experimental Values, 802.1Q Class of
Service bits.
In Layer 3, IP Precedence, Differentiated Services Code Points and IP Explicit
Congestion Notification
In Layer 4 , TCP/UDP and source-destination ports
In case of Layer 7, Network Based Application Recognition is used for signing
applications.
802.1Q/p CoS
In layer 2, Ethernet frames can possibly be marked according to their importance. It can be done
effectively for which User Priority bits 802.1p is set from the header 802.1Qr. Marking is
possible for only 3 bits in 802.1p. In the Ethernet frame of layer 2 it is possible to set only 8
different classes of service.
DSCP
In modern 3 IP network qualities of services can be provided by using DSCP or Differentiated
Services Code Point. For classification of packets in the network, DSCP mainly uses 6-bit field
for Differentiated Services in IP header. DiffServ referred to a networking architecture. Here
6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
managing and classification of the traffic in the network in an organisation is done using a very
scalable and simple mechanism.
In the above figure the 1st six bit represents code-point which affects mainly per hob behaviour of
every node. When two devices are connected in a network, to achieve proper QoS those devices
must be connected and configured end-to-end.
IP precedence
ToS has 8 bit and the first three bits denotes precedence. When an IP pocket is more significant
then value of precedence is higher (Karakus and Durresi, 2017). If any kind of congestion is
found in the network, then the packet with low precedence will be dropped from the network by
the router. ToS is a network has the bit that denotes the kind of throughput, delay, reliability the
user wants.
IPP value Reserved
6 and 7 Network control traffic like routing
5 Voice
4 Video conferencing and streaming video.
3 voice control
2and 1 Data applications.
7
Document Page
0 default marking value
8
Document Page
1.3 Discuss LAN concerns and make recommendations to sustain network security, reliability
and performance
When a network is implement for transmitting data it is expected that the network to be secure
providing proper confidentiality of data, appropriate message authentication and to protect all the
transmitted data over the network so that no unauthorized changes can be made. Presently LAN
are not limited or restricted over a place, therefore its security has become a reason for concern.
Security threats in LAN comes are in various forms some of the common concerns are Viruses-
mail attachments, probes, Trojan horse, worms. Hence to avoid all the threats proper measure
must be taken some of them has been mentioned below-
Switch port control
Switchport security is one of a significant feature that is required for protecting the network from
being affected. Through switch port the addresses for sending the traffic in the network are
limited according to the requirement of the user. Switch port security in a network helps in
attaining network security by protecting computers that are connected along with the network the
devices are connected (Beberlein et al 2017).
Port security by default is disabled. Hence for enabling it switch port port-security command is
used. It stops the attacker by tying the MAC addresses for a particular port. When the link is
secure the MAC addresses associating the port disappear normally. The most recommended and
common setting for port security is dynamic mode where one MAC address is assigned for a port
to connect a single device.
Figure 6: Port security configuration script
9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ACLs
Access control list as the name defines is a list that controls the access of devices. These are the
filters that are used mainly by the router and switches for restricting unwanted data and allowing
the needed data. When an interface is configured with ACL then all the network devices analyses
the data by using the interface and then compare the list for flow of the data either to permit or to
restrict.
Figure 7: ACLs used for network security
Main objective of ACL is to provide network security. The functionality of ACL is for protection
of the devices and data for interfaces with high speed and if the firewall is unconfirmed
(Belhaouane,et al 2015).
Figure 8: Ingress and Egress of ACLs
10
Document Page
From the above figure it is cleared that ingress traffic is those that flows from host to router
while egress is those that flows from router to Host network. The list initialises from source
address at first while configuration and then to destination. Access control lists are considered to
be a significant component for maintaining security of the network hence it must be placed
accordingly for acquiring it efficiency.
Wireless security
Completers and data in it can be destroyed using wireless network by using software tool, hence
wireless security is an essential element. In general wireless security are of two different kinds.
First is Wi-Fi protected access and second is wired equivalent privacy. Therefore, applying
wireless security avoids risk from intruders.
Encryption
Data security can also be maintained by using data encryption techniques where the data are
encrypted that makes in unreadable for any user with a key for decryption (Alsahlany, 2014).
During communication encryption is essential with the purpose that information cannot easy
understood by the intruder with an intention of eavesdropping.
11
Document Page
LO2
2.1 design a LAN infrastructure for the company which will facilitate all of their requirements
According to the organisational requirement and suitability of a network system a LAN is
designed.
Figure 9: Network Design For The Organisation
Devices in the network:
12

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Users: On the basis of voice data and textual messages received and sent the performance and
quality of the network must be assured by the user. As per the expectation of the organization,
network is scalable and effective with the implementation of latest technology and devices used
in the organisational network.
Technology: While designing and implementing the network for the organisation various
technologies are been used. Exclusive host control protocol is used for device identification
individual for all the floors. It helps in proper management for elimination and low maintenance.
The network uses Switches for device grouping using VLAN in where the STP is implemented
so that breaches in package routing can be ignored (Chowdhury, 2013).
VLAN is used for sharing and connecting several LAN devices with the help of switches.
Systems can link with their required resources though Hybrid topology. Routers used in the
networking system are used for transmitting data packets or messages from a device to another
using proper credentials of the device site. Switches used in the network are mainly for its
extension and grouping so that network can be controlled and monitored effectively. For
avoiding security issues Network uses firewall.
Traffic intensive services: On the basis of the network traffic networking service must be
prioritised so that high performance and quality is attained. For the purpose of communication
different protocols are developed according to the requirement and expectation of the
organisation.
13
Document Page
2.2 critically evaluate the suitability of LAN components
For designing the network for Foot-Fall Field Marketing Ltd organization various technologies
and devices were used. For user contentment, number of technologies must be used according to
the specification and demand.
Hardware tools
Different hardware is used in the organisational network system for proper functionality of the
network.
Routers: A router is considered to be the main component of LAN. A router is used in the
organisational network for proper connectivity and data sharing along with the internet. It helps
in extension of network with different other device
Switches: Switches along with routers are used in the organisational network for integrating and
segmenting devices. Switches are effective to isolated network and segmentation of device is
essential for easy upkeeps. Switches also supports VLAN execution while applying IP addresses
for attaching additional devices using subnet mask.
Technology: For identification of all the devices connected within a range DHCP is applied
regardless of using any external system (Cisco Press, 2009). VLAN used in a network helps in
offering the information of device among various departments situated in different floors. For
increasing package routing, ad monitoring performance and resources utilization network uses
STP.
Firewall: Main purpose of firewall is to provide network security and to restrict any kind of
invalid requests made in the server devices. Both software and hardware component in the
network is configured with firewall and Access control list for their protection. An IT manager is
permitted to access other system through the access control lists.
Storage: Along with the internal storage system the organisation also chooses to have external
devices for storage mainly for data backup. Backup are helpful for searching data and
information in case of system failure or lost communication in case of any external outbreaks.
Software tools
14
Document Page
For achieving effective performance and functionality of the network various software tools are
also implemented in the network. Some of them has been discussed below:
IOS: For security and robust performance of the network, routers and switches has operating
system powered by Cisco. O.S of the devices helps in achieving the hardware level
configuration. The operating system is compatible even with graphical user interface.
Negios: It is one of the important tool used by the organisation for analysing the network
performance along with troubleshooting. Negios generates reports regarding security log that
helps in effective decision making. The tool also generates alerts in case of security breaches
helping in network management along with providing recommendation for improving the present
network.
15

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO3
3.1 build and configure a LAN (including services) to meet a given requirement
Foot-Fall Field Marketing Ltd organization need to configure networking system. Hence, various
steps are required to be followed for meeting the requirement of the organization requirements:
Configuration of some of the common communication devices has been discussed below:
Switch configuration
Configuration of switches in the network can be done as per desired parameters along with IP
addresses according to VLAN requirements and network segmentation. Switch configuration is
accompanied by STP configuration for using the devices.
Figure 10: Switch configuration
Router configuration
Installation of Router in the network is requires for routing protocol and DNS services. The
process of router configuration is very similar to configuration of switch in a network. The
16
Document Page
default configuration must be change for security purpose. In an organization installation of
Router helps in interfacing (Nova Science, 2005).
Figure 11: Configuration of a wireless router with Class C IP address
Firewall
For a secure network and to avoid unauthorised access Firewall must be installed for the purpose
of filtration. Foot-Fall Field Marketing Ltd must to implement Firewall in the system for
protecting the whole network from any kind damage.
Figure 12: Firewall configuration on server
17
Document Page
Service installation
organization for service installation, must configure DNS (domain name services), directory and
email services for installing proper communication system among users.
Figure 13: Window server manager's dashboard
VLAN configuration
Configuration command of VLAN is given below:
Address allocation
18

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Allocation of address of all the devices in the network is done using class C IP address. Subnet
mask address used is default value. Configuration of VLAN is done for meeting requirements in
device grouping so that communication among the devices can be effective.
Figure 14: Table representing the address location in class C
Configuration of Local client
Computers of the local client can be configured as given below. Moreover, both subnet mask
address and IP address is configured as per the scheme of addressing. Similarly, other devices
such as printer can be configured:
Figure 15: Configuration of Local client device
19
Document Page
3.2 implement network security on a LAN
Foot-Fall Field Marketing Ltd must have a secure and protected network. Therefore, the
organization must configure various devices in VLAN and access control list (ACLs) must be
effectively implemented.
Virtual Local Area Network membership:
To get VLAN membership switches are configured along with the use of interfaces and IP
address. The Subnet mask for the network is defined. Steps to be followed for configuration of
VLAN membership.
Step 1: Login is done for web configuration and navigation for VLAN membership, LAN and
networking is done.
Step 2: The option add row is selected so that configuration can add new row.
Step 3: Providing VLAN ID, description, inter VLAN routing and pot numbers by the user.
Step 4: Noting the status of inter VLAN routing either enabled or disabled.
Figure 16: Steps for configuring of VLAN membership
Access control list implementation:
Foot-Fall Field Marketing Ltd organization firstly need to configure firewall to get access for
controlling the network accessibility. Configuration of firewall in all the systems in the
organisational network is required to have control over the network regarding traffic control on
for data protection from illicit user. Firewall inspect any kind of suspects and malicious code in
the traffic. ACLs comprises two lists one that allow a user and other that deny.
20
Document Page
Figure 17: Implementation of ACLs
Domain name service:
The organisation must configure DNS for security purpose. Configuration of DNS translates IP
addresses and to know the network. DNS is useful for blocking and discarding unwanted and
unknown addresses from being translated so that end devices cannot receive data from the user.
Figure 18: Configuration of DNS
21

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Authentication:
Password and usernames can be set for securing the computers and other devices present in the
networking system. Hence, the network configures switches and routers for setting them along
with allocation of port numbers. Encrypted commands are used in the network for secure the
configuration of devices in the network.
Figure 19: Authentication of server service
Special configuration:
Configuration of Ethernet channel
Main objective of configuring Ethernet channels in organisational network is to attain enhance
performance and proper communication system.
22
Document Page
Figure 20: Configuration of a switch in first building
Configuration of STP
STP or spinning tree protocol is configured in a network for avoiding any kind of possible loop
formation between all the three floors of Foot-Fall Field Marketing Ltd. It helps in effective
broadcasting and for enhancing the communication services.
Figure 21:Configurations of network design
23
Document Page
3.3 critically review and test a LAN
For testing the connectivity among devices Ping command is used.
Figure 22: Successful Ping test for connecting computers to same department and Ping test fails
when done for connecting computers of the management
Table 1: Table representing test feature of the LAN
FEATURES RESULTS PREDICTED RESULTS ATTAINED
Security Security is expected in network
system for data privacy.
With firewall configuration and having
distinct network system for each of the
departments proper security is maintained.
Network Security is also retained by using
appropriate password policies for all the
devices in network.
Confidentiality Privacy must be maintained while
communication and sharing data.
The network uses VLAN and data encryption
for the purpose of information confidentiality.
The devices in the financial department are in
24

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TCP/IP and new advance technologies are
used for providing path for communication.
Reliability Network reliability is essential
within the confined cost.
The organisational network is very reliable
with proper configuration of all the devices
according to specific address scheme.
Configuration of the server support load
balancing.
Data Management Quick and functional Local servers are used in the network for
managing the load. All the data are
synchronized along with the main branch for
proper data management. Database are kept
locally for easy management of data within
the organisation (Comer, 2015).
Utilization of
Resources
Utilisation of resources must be high
for avoiding high price on the
resources.
Proper resources utilisation is maintained by
using proper load balancing and dynamic
routing.
Connectivity All the devices in the network but be
effectively connect.
Connectivity of the network is very efficient
because of proper bandwidth distribution.
Network Scalability Scalable network Scope for scaling number of users and
devices.
Performance High performance is expected as not
all the users are active in a specific
time.
Fibre and Ethernet cables are used for
connecting the devices in the network. Local
server are used for reducing the time required.
Communication
Effectiveness
Proper communication among all the
devices.
Good with dynamic routing and use of packet
switching technology.
According to the test result, it has been recommended to organization to implementing physical
security for securing the network devices form any kind of threats. The devices must implement
latest technology and all the software must be updated to their latest version. The systems in the
department of sales and marketing must be connected using wired connections.
25
Document Page
LO4
4.1 critically discuss how this LAN infrastructure will be monitored and managed (via
troubleshooting) if there is any issue during post implementation period
Local Area Network for the Foot-Fall Field Marketing Ltd must be monitored frequently for
managing and improving the network performance and functionality. Network monitoring helps
in increasing QoS (quality of services). For acquiring a reliable and secure network in the
organization some of the tools must be used for appropriate management of LAN:
Checking all the Configuration: All the devices in the network must be configured according to
the custom setting and parameters for default values so that targeted network cannot be
infiltrated. Hence, erroneous configuration will be avoided that will in turn enriches systems
performance.
Analysis of Bandwidth and Traffic: The network traffic is monitored by using network
monitoring tools for improving the bandwidth utilisation among devices and to minimise
resource load in the network by developing new and advance strategies. In case of high network
traffic, the organisation must opt for adding other devices that supports organisational operations
along with cable adaptation delivering appropriate bandwidth to all the end devices.
GFI LAN guard: Foot-Fall Field Marketing Ltd organization uses GFI LAN guard for
managing the organisational network (Delmar, 2009). GFI LAN guard is a commercial tool that
effectively monitors bandwidth utilisation by generating real time data, identifies threats and
improves network performance. GFI LAN guard helps in providing a reliable and secure
network.
Microsoftā€™s network monitor tool: These is one of the most commonly used monitoring tool.
It analyses the organisational network along with monitoring the performance. Microsoftā€™s
network monitor tool generates reports for network and performance.
26
Document Page
4.2 Resolve LAN issues to improve security, reliability and performance
The above proposed design of the network for Foot-Fall Field Marketing Ltd organization is
quite functional to meet all the demands and requirements of both sales and marketing
departments. However, there are few concerns that the organisation network faces that may even
lead to network failure causing various loss to the organisation. Few of the issues and their
solution that the organisation can adopt is stated below:
ISSUES DESCRIPTION AND SOLUTION
Security An organization faces lots of issues due to deficiency in
security features in the network in regarding to store data. For
security purpose access of the important organisational data
must be restricted to specific users. Systems as well the data
can be protected by examining the accessing requests and by
monitoring data packages, emails for any kind of malicious
codes in the traffic.
Connection errors In a network, all the devices may be connected either
physically or logically. In some cases, connection between the
devices in the network may be lost while making any changes
or while adding new devices in the network. Organisation can
face performance issues id the connection string is unable to
support more devices (Lemeshko et al 2015). Therefore,
alternative paths and cables of high quality can be used for
device connection in organisational network for resolving uses
of connectivity.
Weakening of network
performance
The organisation uses Bus topology as recommended for
connection of devices in the network that can lead to
performance deteriorating if new devices are added to the
network plan. Hence, routers and switches must be used in
Foot-Fall Field Marketing Ltd for connecting devices to
enhance and improve performance of LAN.
27

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
For enhancing the performance of the network system of Foot-Fall Field Marketing Ltd it is
requires to improve configuration of devices in the network. All the devices in the network can
be secured by appropriate and timely maintenance.
28
Document Page
4.3 critically evaluate the performance of a LAN
For evolution of the LAN for the organisation has been evaluated as below:
Table 2: Table For Evaluating The Network Performance
FEATURES DESCRIPTION
Hardware configuration and
utilisation
1. All the network components both hardware and software
can be tested for their performance within the network
though feedbacks taken from various users in organisation
in regular interval.
2. Switches and Routers used in the organisational network
helps in attaining performance dependability and stability
of the network (Mishra et al 2017).
Bandwidth It is very essential that all the devices in the network must have
equal and efficient bandwidth that can be achieved by using network
switches for connecting computers and devices together using
packet switching technique.
Access Control 1. Performance of LAN used in the organisation can be
influenced by the users who have the permission to access
file and file sharing among all the departments of the
organisation.
2. To enhance the performance of the organization in terms of
sales and profits ACLs or (access control list ) can be used
for both sales and marketing department.
Recommendations according to the above evaluation
1. To achieve effective performance of the network in the organisation it is recommended to
apply wired connection using Ethernet cables that will deliver quality service to the end
users within the network.
29
Document Page
2. It is suggested to use wireless devices in the network which can be maintained easily and
cost effectively. And for optimising the performance of the network the higher authorities
of the organization can use monitoring tools that can also regulator the flow of traffic in
the network (Porras, et al 2015).
3. Within the organisation LAN is effective in covering a wide area with operational range
of bandwidth among all the connected devices that are interconnected by using wireless
networks.
4. The organisation can have a good network if it chooses to appoint stuff members who are
well skilled and qualified according to the technologies used within the organisation.
30

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CONCLUSION
From the above report, it has been concluded LAN is effective in providing an effective network
for Foot-Fall Marketing Ltd organisation. The report has discussed various LAN technologies,
traffic intensive services and recommendation for maintaining the performance and security has
been discussed. The report has also discussed LAN design and suitability of the LAN
components has been provided. Implementation of the LAN infrastructures according to the
requirement of the organisation has been provided along with testing has been done to check the
effectiveness of the network. Finally, in the report LAN infrastructure has been reviewed and
managed. Recommendation has been provided in the report for solving issues associated with
performance, security and reliability of the organisational network .
31
Document Page
REFERENCES
Books and journals
Ali, H., 2017, April. Quality of service: Introduction of a new framework and a novel
measurement technique. In Information Management (ICIM), 2017 3rd International Conference
on (pp. 517-525). IEEE.
Alsahlany, A.M., 2014. Performance analysis of VOIP traffic over integrating wireless LAN and
WAN using different codecs. arXiv preprint arXiv:1407.2025.
Beberlein, L.T., Dias, G., Levitt, K.N., Mukherjee, B. and Wood, J., 2017. Network attacks and
an Ethernet-based network security monitor.
Belhaouane, M., Garcia-Alfaro, J. and Debar, H., 2015, August. On the isofunctionality of
network access control lists. In Availability, Reliability and Security (ARES), 2015 10th
International Conference on (pp. 168-173). IEEE.
Chowdhury, D.D., 2013. High speed LAN technology handbook. Springer Science & Business
Media.
Cisco Networking Academy ā€“ CCNA Exploration Course Booklet: LAN Switching and
Wireless, Version 4.0 (Cisco Press, 2009) ISBN-10: 1587132540
Comer, D., 2015. Computer networks and internets. Pearson.
Dean T ā€“ CompTIA Network+ 2009 In Depth (Delmar, 2009) ISBN-10: 1598638785
Karakus, M. and Durresi, A., 2017. Quality of service (qos) in software defined networking
(sdn): A survey. Journal of Network and Computer Applications, 80, pp.200-218.
Kumar, A. and Malhotra, S., 2015. Network Security Threats and Protection Models. arXiv
preprint arXiv:1511.00568.
Lemeshko, O., Ali, A.S. and Simonenko, O., 2015, February. A queue management model on
router of active network. In Experience of Designing and Application of CAD Systems in
Microelectronics (CADSM), 2015 13th International Conference The (pp. 419-421). IEEE.
32
Document Page
Mishra, V., Mathew, J. and Lau, C.T., 2017. Introduction. In QoS and Energy Management in
Cognitive Radio Network(pp. 1-37). Springer, Cham.
Porras, P.A., Cheung, S., Fong, M.W., Skinner, K. and Yegneswaran, V., 2015, February.
Securing the Software Defined Network Control Layer. In NDSS.
Rao, J.D.P., Rai, M.S. and Narain, B., 2017. A study of Network Attacks and Features of Secure
Protocols. Research Journal of Engineering and Technology, 8(1), pp.04-08.
Xiao Y, Pan Y ā€“ Wireless LANs and Bluetooth (Nova Science, 2005) ISBN-10: 1594544328
Online References
www.cisco.com
www.wb.nic.in/nicnet/lan1.html
33
1 out of 37
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]