logo

LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide

   

Added on  2024-06-13

35 Pages5428 Words97 Views
 | 
 | 
 | 
Introduction:
LAN is termed as local area network. The LAN is interconnection of several devices. The devices are
situated at fixed location. The LAN is established at several places lie offices, schools, homes,
colleges and other areas. A LAN is of both types either wireless or wired.
After reading this local area network report the concept about the LAN is cleared. This report is
divided into four learning outcomes. In first learning outcome what is LAN, the types of LAN
technology and which technology is best among those is discussed. In second learning outcome how
the LAN is implemented and what are the suitable components are used in the infrastructure is
discussed. In third section of learning the LAN is build and implemented with some security features
in the infrastructure. The several tests are also performed to check the efficiency of designed
infrastructure. In last section of learning it detail about the tools used for monitor and troubleshoot the
LAN infrastructure. It will also detail about the issue related to reliability, security and performance
are resolved and how performance is evaluated in the infrastructure is discuses in the report.
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_1

LO1 Understand the impact of LAN technologies
Task 1
1.1 critically evaluate different LAN technologies
Local area network- LAN is a collection of computers or associated devices which have a common
communication link. Communication link is used to pass information between the multiple computers
and other devices. Local area network used in many applications (Techterms, 2018).
Figure 1 local area network
Source: (Tech Terms)
Types of LAN-
Wired LAN- wired networks are also known as Ethernet networks. Wired network is group of two or
many computers or printers. Ethernet has very high connection speed which is from 10 Mbps to 100
Mbps so Ethernet is the fastest wired network. There are 3 common network topologies which are
very useful such as star network, bus network and ring network.
Wireless local area network- wireless network uses very high-frequency radio waves for
communication between the nodes. Wireless network also used in home and business networking.
Organization use wireless network to increase their existing wired network. There are 2 types of
wireless networks such as ad-hoc and peer to peer.
IEEE standards for Wired LAN (Ethernet IEEE 802.3) - Ethernet, IEEE 802.3 are most useful
standard for general data communication or computer networking. 802.3 specify the working
characteristics or the physical media of Ethernet. Ethernet standard is used to fulfill the requirement
or needs of growing technology. Ethernet supports data rate of 10 Mbps. Ethernet is used for the
wired networks for computers and Ethernet also provide supports to many large or small data
communication system.
IEEE standards for Wireless LAN (Wi-Fi IEEE 802.11)- there are many specifications in 802.11
family.
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_2

802.11- 802.11 use DSSS and FHSS spectrums are provide one and two Mbps transmission in 2.4
GHz band.
802.11a- 802.11a applies to the wireless LANs & provides 54 Mbps transmission in 5GHz band.
802.11b- 802.11b also applies to wireless LANs and provides 11 Mbps transmission.
802.11e- 802.11e defines the QoS supports for local area network.
VLAN- VLAN is a logical collection of network devices, servers, or workstations. VLAN provide the
network in which the different users or the network of computers are allowed to communicate in the
environment where there can be a multicast domain & single broadcast. VLAN is applied to achieve
security, ease of network management, or scalability (Charriere, 2018).
There are 5 types of VLAN such as
1. management VLAN
2. data VLAN- data VLAN I also called as user VLAN. The user VLAN is select for user-generated
data.
3. voice virtual local area network
4. default VLAN
5. native VLAN (Charriere, 2018)
Benefits of virtual local area network:
Improved quality of services
Improved security- virtual local area networks improve security of system by reducing external or
internal threats.
Easier fault management
Repeaters- Repeaters works on physical layer. Repeaters are used to regenerate the signals before the
signals become weak.
Bridges- bridges works on data link layer. Bridge works same as repeater with some other functionality.
Bridges are used for interconnection of 2 LANs which are working on the common protocol. Bridge has
one input or one output port. Types of bridges
Source routing bridges
Transparent bridges
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_3

Figure 2 Bridge
Source: (Joe Onisick)
Hubs- hub is used to joint multiple wires which are coming from various branches. For example a
connector in the star topology which is used to joint various stations. Types of hubs
Passive hub
Active hub
Routers- Routers are devices same as switches that route data packet which is based on the IP
addresses. Routers are used to connect WANs or LANs together (Tyson, 2018).
Switches- switches are work on the layer of local area network. Switches are used for ‘forwarding
and filtering’ of data packets.
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_4

Figure 3 routers and bridges
Source: (Gael Charriere)
Coaxial cable- coaxial cables are used for the frequency signals because coaxial cable is work as a
communication line. Coaxial cables provide security of the signals from outside electromagnetic
interference. Coaxial cables are used in many applications such as microwave or RF transmission,
CATV distribution (Omnisecu, 2018) .
Fiber optic- fiber optics is a technology which uses glass or plastic threads for transmission of data.
Fiber optic transmits the data or information from one place to another place. Fiber optic cable
contains a packet of glass or plastic threads.
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_5

1.2 critically analyze traffic intensive services and their performance
Voice over internet protocol- voice over IP is a method which is used for the delivery of multimedia
sessions and voice communication over the IP networks.
Voice-on-demand – it is a programming system which permits customers to select & listen/watch to
audio or video content like TV shows and movies (Rogier, 2018).
Video and audio streaming- Storage size is derived from the length of media and streaming bandwidth
with the help of following method:
Storage size ( in mebibytes) = length ( in seconds) * bit rate ( in kbit/s) / 8388.608
Video bit rate ( in kbit/s) * estimate no. of people = no. of bandwidth ( in kbit/s)
Live streaming-
Length of video ( in seconds) * video bit rate ( in bit/s) / (8 * 1024 * 1024) = storage size ( in
megabytes)
Video bit rate ( in kbit/s) * estimate no. of people = no. of bandwidth ( in kbit/s)
Quality of service- QOS is the measurement and description of the complete performance of the
services such as cloud computing and computer network services. Quality of services is also used in
many application layer services like streaming video or telephony to define a metric which predicts or
reflects the quality of services.
Differentiated services and IP precedence- differentiated services classify the packets when the
packets enter into the local network. This classification is then applied to the flow of traffic. Flow is
explained by five elements; destination IP, Destination port, source IP, transport protocol and source
port (Rogier, 2018).
IP header has a TOS field which is placed among the total length field and header length field. IP
precedence is used first 3 bits of type of service to offer possible precedence value.
000(0)- routine
001(1)- priority
010(2)- immediate
011(3)- flash
100(4)- flash override
101(5)- critical
110(6)- internetwork control
111(7)- network control (Rogier, 2018)
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_6

1.3 Discuss LAN concerns and make recommendations to sustain network
security, reliability, and performance.
Latency- In an internet protocol network, latency is a time which is taken by a packet for entering and
leaving the network. The entering time of packet A = t0 and leaving time of packet A = t1. The
latency of packet A is t2= t1- t0.
Figure 4 Latency
Loss- when one or many packets of information or data are traveling across the network and fail to
reach at their destination, packet loss occurs.
Jitter- jitter is basically the variation in packet delay and it is used to measure the time differences in
packets inter and arrival times.
Bandwidth- bandwidth is the amount of information and data that is transmitted in particular amount
of time. Bandwidth is expressed in bytes per sec or bits per sec for digital devices (Chia, 2012).
Throughput- Throughput is the amount of data or material which is passing via a process and a
system.
Confidentiality, availability, and integrity are also called as CIA triad. CIA triad is a model which is
designed to guide procedures for information and data security.
Confidentiality- Confidentiality is defining as a set of instructions or rules that provide protection to
the personal information. Confidentiality is designed to prevent personal and sensitive information
from the unauthorized users.
Availability- availability gives guarantee of reliable access of the data by authorized user.
Availability checks only authorized user is able to access the data or information.
Integrity- integrity includes maintaining the accuracy, trustworthiness or consistency of data or
information over its complete life cycle.
Access control list- access control list is the network filter which is used by the switches or routers to
restrict & permit data flow into & out of the network interface (Chia, 2012).
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_7

Firewalls- firewall is a system or software which is used for network security. Firewall controls or
monitors outgoing & incoming network traffic.
Figure 5 Firewall
Source: (David K. Berchem)
LAN Infrastructure Design, Implementation, and Management: A Comprehensive Guide_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents