LAN Network Design and Implementation for FootFall Field Marketing

Verified

Added on  2024/05/20

|56
|7645
|229
AI Summary
This report details the design and implementation of a Local Area Network (LAN) for FootFall Field Marketing, a company with three offices in the same building. The report covers various LAN technologies, including wired and wireless networks, VLANs, and security measures. It also includes a detailed analysis of traffic intensive services and their performance, as well as a critical evaluation of LAN components. The report concludes with a discussion of monitoring and troubleshooting tools and techniques used to ensure the network's reliability, security, and performance.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
LOCAL AREA NETOWRK
0

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction:....................................................................................................................................4
LO1 Understand the impact of LAN technologies...........................................................................5
A.C 1.1 critically evaluate different LAN technologies.................................................................5
A.C 1.2 critically analyse traffic intensive services and their performance...............................15
A.C 1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance.......................................................................................................19
LO2 - Be able to design LAN infrastructures..................................................................................21
A.C 2.1 design a LAN infrastructure to meet a given requirement.....................................21
A.C 2.2 critically evaluate the suitability of LAN components...................................................24
LO3- Be able to implement LAN infrastructures............................................................................25
A.C 3.1 build and configure a LAN (including services) to meet a given requirement..............25
A.C 3.2 implement network security on a LAN..........................................................................33
A.C 3.3 critically review and test a LAN.....................................................................................42
LO4- Be able to manage LAN infrastructures................................................................................46
AC 4.1 Monitor and troubleshoot a LAN................................................................................46
AC 4.2 Resolve LAN issues to improve security, reliability and performance........................47
AC 4.3 Critically evaluate the performance of a LAN.............................................................49
Conclusion:.....................................................................................................................................50
References.....................................................................................................................................51
1
Document Page
List of Figures:
Figure 1: Wired LAN Network..........................................................................................................6
Figure 2: Wireless LAN Network......................................................................................................6
Figure 3: Virtual LAN Network.........................................................................................................8
Figure 4: Repeaters..........................................................................................................................9
Figure 5: Switches..........................................................................................................................10
Figure 6: Hub..................................................................................................................................10
Figure 7: Bridges............................................................................................................................11
Figure 8: Router.............................................................................................................................12
Figure 9: Coaxial cable...................................................................................................................12
Figure 10: Fibre optic cable............................................................................................................13
Figure 11: an Unshielded twisted pair...........................................................................................14
Figure 12: STP cable.......................................................................................................................14
Figure 13: working of Voice-over-IP..............................................................................................15
Figure 14: Video-on-Demand.........................................................................................................16
Figure 15: Audio and video streaming...........................................................................................17
Figure 16: Star Topologies.............................................................................................................22
Figure 17: Design View organization LAN Network.......................................................................26
Figure 18: Metadata part one........................................................................................................27
Figure 19: Meta Data part 2...........................................................................................................28
Figure 20: Metadata part 3............................................................................................................29
Figure 21: Metadata part 4............................................................................................................30
Figure 22: Metadata part 5............................................................................................................30
Figure 23: DNS (Domain Name Server) and HTTP service in the LAN network.............................31
Figure 24: DHCP Server in the LAN network..................................................................................31
Figure 25: Network Design on the Cisco packet tracer.................................................................32
Figure 26: Virtual Local Area Network in the network..................................................................34
Figure 27: Router 0 configuration part one...................................................................................35
Figure 28: Router 0 configuration part two...................................................................................36
2
Document Page
Figure 29: Router 0 configuration part three................................................................................37
Figure 30: Router 1 configuration part one...................................................................................38
Figure 31: Router 1 configuration part two...................................................................................39
Figure 32: Router 1 configuration part three................................................................................40
Figure 33: DHCP Configuration in the LAN network......................................................................40
Figure 34: DNS Configuration in the LAN network........................................................................41
Figure 35: Test Scenario one..........................................................................................................43
Figure 36: Test Scenario two.........................................................................................................44
Figure 37: Test Scenario three.......................................................................................................44
Figure 38: Test Scenario four.........................................................................................................45
List of Table
Table 1: Difference between Ethernet IEEE 802.3 and Wifi IEEE 802.11........................................7
Table 2: IP Precedence Table.........................................................................................................18
3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction:
LAN is a local area network which provides the service medium size area. It offered service in
school, college, small office or firm. LAN managed sharing, communication, and exchange in the
network. It may be useful for The FootFall Field Marketing organization. LAN will offer
interconnection between offices and their departments. I have designed a local area network
report for the FootFall Field Marketing organization. There are four sections in the report.
In the first section, I will be describing a different type of technology Technologies such as wired
and wireless LAN network. Then, virtual area network, the traffic intensive services, and LAN
components will be discussed which help to design the network. In the second section, I will be
creating LAN infrastructure according to client requirements and evaluate of LAN components.
In the third section, I will be implementing and configuration the LAN network. I will be
implemented security in the LAN Network and test the network. In the fourth section, I will be
explaining tools that will be monitoring and troubleshooting the LAN network. Then,
performance, reliability, and security issue of LAN network will be resolved and measured the
LAN performance.
4
Document Page
LO1 Understand the impact of LAN technologies
A.C 1.1 critically evaluate different LAN technologies
LAN is a local area network that built for the sharing of service and resources like as
applications, files, internet access, games, email, and printers. LAN network designs for the
home, office building, and school because it provides the service where a group of computers
near each other. In the Traditional network offered Single LAN service but Modern network
offered a number of LAN service in the building (Mitchell, 2017).
Type of LAN Network:
Wired LAN Wireless LAN
Wired network works on high bandwidth but
provides the low bandwidth variability.
Wireless network works on Low bandwidth
but provides the high bandwidth variability.
It can listen on the wire. It has hidden terminal problem
It uses high power machines and resources
machines.
It uses Low power machines and resources
machines.
Packet delay is low. Packet delay is high.
Wired LAN needs more security. Wired LAN needs more proximity.
5
Document Page
Figure 1: Wired LAN Network
Source: (Electrical Circuit Diagram Ideas, 2017)
Figure 2: Wireless LAN Network
Source: (Electrical Circuit Diagram Ideas, 2017)
Ethernet IEEE 802.3
Wired Network supports Ethernet IEEE 802.3 standards which defined for the physical layers
and MAC layer (Media Access control layer of the data link). It makes the physical connection
between nodes on the copper wire and fibre wire. LAN network used CSMA/ CD methods
Kurose and Ross, 2007).
Wi-Fi IEEE 802.11
IEEE 802.11 is a standard for the networking that is defined for the wireless network. It works
on Media Access Control, Quality of Service, and wireless networking security (Singh, 2017).
6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table 1: Difference between Ethernet IEEE 802.3 and Wifi IEEE 802.11
Standard Ethernet IEEE
802.3
Wi-Fi IEEE
802.11
Speeds 10 -100 54 MB/s
Ranges 40 KM 100 M
bandwidth 10 -66 MHz 20 MHz
frequencies 2-11 GHz 2.4 GHz
Virtual LAN Network:
Virtual local area networks is a switched network that offered segmentation services which
offered by routers during the LAN configurations in the traditionally LAN network.
Segmentation services are performed by the functions, applications, and project team. VLAN
does not need the physical location of users but runs on different architectures. VLAN network
used switch port which shares for the broadcasts. It improved the overall performance of the
network.
7
Document Page
Figure 3: Virtual LAN Network
Source: (Empress, 2014)
Type of VLAN:
Data VLAN: It is designed for the user-generated traffic that separate management and
voice traffic from data traffic. It is also known user VLAN.
Default VLAN: Switch ports are a member of the default VLAN that used for broadcast
domain. It allowed the network device to connect any switch port to other devices.
Cisco network offered a VLAN1 switch for the default VLAN.
Native VLAN: 802.1Q trunk port is designed for the Native VLAN which supports tagged
traffic and untagged traffic in the network.
Management VLAN: Management VLAN is configured to access the management
capabilities through the Switch. It managed HTTP, SNMP, SSH, and Telnet. VLAN 1 is a
bad choice for Management VLAN.
Voice VLAN: It designed for support Voice over IP and ensures voice quality. It has
Transmission priority during the network traffic (Rao, 2014).
Benefits of VLANs:
Security: It separated the sensitive data from the network which is increased
confidential information in the network.
8
Document Page
Cost Reduction: VLAN used efficiently the bandwidth and decrease the expensive
network which saved the cost in the network.
Higher Performance: it works in the multiple logical workgroups that reduce network
traffic and increased the performance.
Broadcast storm mitigation: VLANs network reduce the number of the device in the
broadcast storm because it divides the network (Rao, 2014).
LAN Data Communication Equipment
LAN network used repeaters, switches, hubs, bridges, and routers as Data Communication
Equipment.
Repeaters:
It is a physical device which connected two segments of the network that reduced the distance
for the transmission media. Repeater forwards every frame without filtering capability and
amplifier.
Figure 4: Repeaters
Source: (Matrox, 2012)
Switches:
9

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The switch is a hardware device in the network that connected the number of computer in the
local area network. It identical to hubs but switch work more intelligence in the network.
Switch received the data packets and determines their destination device and source device
then tramismted.it optimized the network bandwidth which enhances the performance.
Figure 5: Switches
Source: (Carter, 2012)
Hubs:
It is network devices that are used for connecting number of Ethernet devices. Hubs work as a
single network segment. Hubs are work on a physical layer in the OSI model. It contained a
number of input/output (I/O) ports. Signals are introduced one input port and output appears
on each part except the input port (pillai, 2015).
Figure 6: Hub
10
Document Page
Source: (Trendnet, n.d.)
Bridges:
Bridges are two layers device that creates a number of LAN segments. LAN segments have a
separate impact domain. Bridges are allowed the connectivity with other segments in the
network and keep local traffic separated in the network. It used for the Frame filtering in the
network.
Figure 7: Bridges
Source: (Simpson, 2015)
Routers:
Router forwards data packets between computer internetwork and network. It connected data
lines from a different network. The router reads address information of data packets which
come from one data line and defined the ultimate destination. Router contained router table
that stored the information about packet network journey. It is a device that performed the
traffic directing functions in the networks (pillai, 2015).
11
Document Page
Figure 8: Router
Source: (Delaney, 2018)
LAN interconnecting media
Coaxial cable
It is widely used interconnecting. Coaxial cable contained two conductors that parallel to each
other. Cable centre conductor made of copper that can be stranded martial or solid wire and
outside of centre conductor coded with a non-conductive material
Figure 9: Coaxial cable
Source: (CB Antenna, 2017)
12

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Fibre optic cable
It works on electrical signals for the transmit data. Fibre optic cable moves only one direction
during the two way communication so it takes time established the connection between the
two devices. It is two stands cables that responsible for one way communication. Fibre cable
centre stand is made of glass. Here, the single is moving according to reflective principals. For
the reflective, it used CLADDING material.
Figure 10: Fibre optic cable
Source: (Multicom, n.d.)
Unshielded twisted pair (UTP)
It common twisted pair cable that grade Voice and data according to the condition. UTP used
data cabling that is five levels. It less expensive compare than STP and easily used. UTP cable
has an impedance of 100 ohms (pillai, 2015).
13
Document Page
Figure 11: an Unshielded twisted pair
Source: (STRUCTURED CABLING, n.d.)
STP
STP referred as a Shielded twisted pair. It is a twisted pair cable which works as UTP but it
protects EMI which supports the higher transmission rate (pillai, 2015).
Figure 12: STP cable
Source: (Sites, n.d.)
14
Document Page
A.C 1.2 critically analyse traffic intensive services and their performance
LNAs provide the traffic intensive services such as video streaming, Voice-over-IP, and Video-
on-Demand in the network.
Voice-over-IP:
It is a technology that received the voice signal on the internet with the help of PSTN. VoIP
allowed two ways communication on the network broadband connection. VoIP converted voice
signal analogue signal to the digital signal then the transmitted the voice signal and distance
place again voice signal converted digitally to an analogue signal. It used Compression,
Encapsulation, and Routing for the voice transmission(Ullah, 2013).
Figure 13: working of Voice-over-IP
Source: (Yenra, 2004)
Video-on-Demand:
VoD is a multimedia system that works on the large video database in the network. In the
network, VoD works on cable. It has high transmission speed compare than the telephone line.
It used set-up box, video servers, Transmission protocols, and Audio/Video Standards.
15

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 14: Video-on-Demand
Source: (Maxwellstreaming, n.d.)
Audio and video streaming:
Streaming is a process that used for the deliverer of video, audio, and other multimedia content
on the LAN network. During the streaming process, files do not take space in the computer
system that ensures file does not download. Audio and video streaming optimized the
bandwidth in the broadband connection. Inherently streaming and inherently non-streaming
are the type of streaming during the Audio and video streaming in the network.
16
Document Page
Figure 15: Audio and video streaming
Source: (BeotelNet, 2017)
Quality-of-Service in LANS
In the LAN Network, Quality-of-Service offered on the data-link layer of the OSI Model. It
managed bandwidth and traffic prioritization that reduced the network delay. Classification,
scheduling, policing, Cost of Service and marking are used by the QoS for network delay
managed.
Implementation of Quality-of-Service in LANS
Differentiated Service Code Point:
DSCP is a significant bit in the DiffServ field. It managed network traffic that controls the quality
of service in the network. It implemented in the network through a simple and scalable
mechanism that offers low-latency to critical network traffic and web traffic.
802.1q frame tagging:
17
Document Page
It is a VLAN tagging standard which provides a protocol for the network, and interoperability.
802.1q frame tagging works as inter_ switch Link which encapsulated the ISL header and FCS
(Cisco, 2008).
IP precedence:
It contained 8 bits of Type of Service where first three bits are used for precedence. In the
configuration, IP precedence contained a higher value (Molenaar, n.d.).
Table 2: IP Precedence Table
18
Type of Service Port Number
Routine 000
Priority 001
Immediate 010
Flash 011
Flash Override 100
Critic/Critical 101
Internetwork
Control
110
Network Control 111

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
A.C 1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance
LAN performance measures on the Bandwidth, Latency, Jitter, Throughput, and Packet Loss.
Firewalls, VLANs and Access Control Lists are ways of LAN security.
Bandwidth: LAN covers the small area so no needs of high data transfer rates and
telecommunication lines. The bandwidth of network makes smooth the network. Performance
bottlenecks decreased the network performance. So PRTG bandwidth measurement is used to
long-term result. It manages the traffic and bandwidth that help in the management cost and
problems which are time-consuming.
Latency: It measured the delay in the network. Round trip delays are used in the two-way
communication which used in the TCP/IP network where data sends source wait for an
acknowledgement. Latency impact the network performance. It measured in mile sec.
Normally LAN network contained 10ms – 20ms Latency in the network (Duffy, 2015).
Jitter: It measured the time difference in the packet inter-arrival time. Jilter is deal with packet
switched networks where TCP/IP responsible for the Jitter that impact on communication. VoIP
and Voice traffic is the Jitters issued because of load-balanced on the similar paths.
Packet Loss: Packet Loss referred as one or more packets does not reach the destination place.
Reduced experience in the result occurred due to Packet Loss. Link Congestion, Performance of
Router, switch, Hub, and Firewall, Software bugs on the device, and Faulty Cabling or Hardware
are the reason for packet Loss due to LAN Network (Hurley, 2015).
Throughput: It measured the quality of send and received packets. TCP Congestion Window
may be impacted the LAN network Throughput. It also measured how many packets are sent
with given time intervals.
Secure LAN Network:
19
Document Page
Access Control Lists: Access Control Lists are the network filter that used by router or switch. It
allowed and prohibits data flow on the network interfaces. ACL configured on the network
interface after that device checked data flow through the network interface. According to ACL,
the Network device is either allowed the data flow or restrict it.
VLANs: Virtual local area network is a collection of LAN network that works on the broadcast
domain and physical location and defined the restriction for the network access. It received and
sent the untagged traffic form optional VLAN or trusted VLAN but from external VLAN is not
handle untagged traffic
Firewalls: Firewalls works as TCP/IP filter between the outside world and LAN Network. It
configured with defined restrictions against outside world and local user. It also called the
security gate of sorts that managed packets outcoming and incoming. It implemented on the
hardware or integrated into a router. It provides the security from the virus, hacker, and
malware (Berchem, 2000).
20
Document Page
LO2 - Be able to design LAN infrastructures
A.C 2.1 design a LAN infrastructure to meet a given requirement
Here, I have designed the LAN network for the FootFall Field Marketing organization that need
a network where three office and their department are communicated. LAN network
implemented on the Class C IP address with required protocols of the network that provides
reliable and efficient LAN infrastructure for the organization. It is also managed and control the
data flow and traffic on the organization network.
Technology:
I have designed the LAN network for the FootFall Field Marketing organization. There are
focused on the security, quality, and reliability. Organization need LAN network for the
communication between three offices and their departments. I have used wireless
infrastructure design and DHCP address allocation design technology for designed the Network.
Both Wired and wireless network designed for the Organization LAN Network. FootFall Field
marketing organization Network designed shown below:
IP Addressing:
The IP address is a unique address which recognized the computer or host on the LAN network.
It contained four octets fields which are separated by the decimal point. Each octets number
range is 0 to 255 numbers. Here I designed LAN infrastructure for FootFall Field Marketing Ltd
organized which contained three office in the same building.
Subnetting:
Each computer or host which are connected LAN network. Subnet used one octet that
contained 0 to255 number in the IP Address. When subnet contained Zero at the end that
represents unique host in the network (Addison, 2001).
Topologies:
21

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
I have used Star Topologies for the designed the LAN network of the network. Star topology is
commonly used in the network with Gigabit Ethernet, Ethernet and Fast Ethernet. Ethernet is
used as a dedicated link at the endpoint of connection and another end is connected to hub
and switch or multiple choice. It is the central network. Star network used an RJ-45 network
cable or coaxial cable as connecter. It is work as a client-server network where the central
network device is severed and peripheral devices are a client.
Figure 16: Star Topologies
Source: (THAKUR, 2014)
Advantage:
It is easy to installing and wiring.
It finds easily faults in the network and removes that part.
Single peripheral devices failures cannot affect the network performance
Disadvantage:
22
Document Page
It needs more wired that make network expensive.
If the hub fails (central network) then the entire system will be failed
(Pearsonitcertification, 2013)
23
Document Page
A.C 2.2 critically evaluate the suitability of LAN components
Here, I have designed the LAN network for FootFall Field Marketing organization using a router,
switch DNS server, DHCP servers, and web server. LAN component are evaluated on the
following term which is explained below
Security: The LAN network of FootFall Field Marketing organization is a complex architecture
which should need the strong security of the resolved communications and firewalls issues.
Here, firewalls work as a guard which provide a secure connection between sender and
receiver. Firewalls also offered the packet filter service. Packet (part of information) is only
accessible by an authorized user in the communication network. In the network, cryptography,
secured modems, and secure router are used for network security (Geier, 2014).
Scalability:
Vertical scalability: In the LAN network RAM size increased which balance the load that
help to route the incoming calls through routing algorithm to the various server. LAN
application handles more load in the network through shared the load. Horizontal Scalability: In the LAN network, Application managed the parallel traffic,
cache, memory secession, and state. Session maintained the user information which
contained heavy loads on the network server which need to check stateless states of
severs.
Availability: It is a factor that used for user point view that checked the proposed network
according to user needs or not. It also checks the network topography with the available user.
There is need a network where component failures do not affect entire system which offered
maximum availability in the network. Reboot time, temperature fluctuation, and downtime are
also factors of availability (Muller, n.d.).
24

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO3- Be able to implement LAN infrastructures
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
I have created a LAN network FootFall Field Marketing organization Three separate floors office
and their departments. LAN network used Router, IP routing (v4/v6), Switches, and VoIP for the
network implementation and designing. LAN network Implemented Cisco Packet Tracer
environments. Catalyst 2890 series switch and Cisco 2814 routers are used in LAN network
designed.
Installation of a communication device:
Switch, router, cabling, Network medium, Cable Connectors, Network software (packet
transference), and Wireless Access Points used as a communication device in the Footfall Field
Marketing organization LAN network.
Local client configuration:
Here, I have explained Local client configuration in the LAN network.
1. First, I have selected Networking then go to LAN network where selected the IPv4 LAN.
2. Then enter the hostname in the Host Name field. It takes number, letter, and hyphen.
3. Clicked the Save button.
Design View organization LAN Network
Here, I have presented the connection between three offices and their department.
Organization LAN network used eight switches, two routers, DHCP server and web server for
the connection between office and their departments. The first floor contained nine Pc. The
second floor contained nine computer systems. The third floor holds ten systems.
25
Document Page
Figure 17: Design View organization LAN Network
Metadata:
26
Document Page
Figure 18: Metadata part one
27

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 19: Meta Data part 2
28
Document Page
Figure 20: Metadata part 3
29
Document Page
Figure 21: Metadata part 4
Figure 22: Metadata part 5
30

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DNS (Domain Name Server) and HTTP service
Figure 23: DNS (Domain Name Server) and HTTP service in the LAN network
DHCP Server
Figure 24: DHCP Server in the LAN network
31
Document Page
Network Design:
The FootFall Field Marketing Ltd LAN network designed on the Cisco Packet Tracer tool. The
network used Router, switch, web server, DHCP server, and computer system. It designed for
three-floor building and their departments for the communication, and data sharing according
Figure 25: Network Design on the Cisco packet tracer
32
Document Page
A.C 3.2 implement network security on a LAN
Security is a play major role in the network designed because in the network travelled sensitive
data which affects the organization goals. Here, I have implemented network security on The
FootFall Field Marketing LAN network.
Port Blocking/ Filter
In the LAN network, information or data are present as packets. Firewall work as a guard which
managed the unauthorized person or device and intruders because they try to access the
important information. Internet connection may be harmed the internal security of the FootFall
Field Marketing organization. So here, I have used Firewall filters which filters irrelevant and
harmful information, and user (Draytek, n.d.).
Authentication
Authentication and authorization are two different things in the network. The authentication
process is ensured that right person is access the network so recognized the user. It is simple
processes that are not secure compare than authorization.
Encryption
Encryption is a secure process in the LAN network which used in the communication. It does not
allow accessing unauthorized user on the network. Cryptography is used for high
authentication. Information or data are needed encoded process because most of the
information is shared on the network. The encoded information is understood by sender and
receiver and also decodes the information. Encryption provides confidential and secure
information during the communication on the network (Carey, 2016).
Virtual Local Area Network (VLANs)
LAN network frequently shared the sensitive data through the broadcast process which
accessed by the network users or some time unauthorized users. So I have designed the VLAN
network which does not allow accessing the unauthorized users who try to get the sensitive
33

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
data from the network. It also controls set up firewalls, broadcast domains, restrict access and
inform of an intrusion. VLAN offered a number of functions such as the filtering packets, data
flow management, the direction of traffic, network management and scalability which help the
implement the security in the network (Jain, 1997).
Figure 26: Virtual Local Area Network in the network
Router configuration:
I have used two routers in The FootFall Field Marketing organization network. It offered the fast
packets forwards on the network. Router managed the traffic and their direction in the network
and provides the best path for the routing.
Router 0 configuration
34
Document Page
Figure 27: Router 0 configuration part one
35
Document Page
Figure 28: Router 0 configuration part two
36

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 29: Router 0 configuration part three
Router 1 configuration
37
Document Page
Figure 30: Router 1 configuration part one
38
Document Page
Figure 31: Router 1 configuration part two
39

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 32: Router 1 configuration part three
DHCP Configuration
DHCP is a network management protocol that used by DHCP server. It assigned network
configuration parameters and IP address in the network device for the communication (Fisher,
2018). DHCP Configuration in the FootFall Field Marketing organization is shown below:
Figure 33: DHCP Configuration in the LAN network
DNS Configuration
40
Document Page
DNS Configuration in the FootFall Field Marketing organization is shown below (Alexandres,
2012):
Figure 34: DNS Configuration in the LAN network
41
Document Page
A.C 3.3 critically review and test a LAN
Here, I have explained the test case which is performed by The FootFall Field Marketing
organization LAN network which is following
S.No. Test Scenario Expected Outcomes Actual Outcomes Remarks
1. Test working on
the Actual
control lines in
the network
Ping process should
be letting on the IT
support staff pc other
than the web server.
Ping process is letting on
the IT support staff
system other than the
web server.
Successfully
2. Ping Testing
between web
servers and IT
staff support
Data Packets should
be received and sent
perfectly webservers
and IT staff supports
Pc.
Data Packets are
successfully received and
sent perfectly between
web servers and IT staff
supports computer
system.
Successfully
3. Test the website
host
The website should
be hosted by a web
server which runs on
the staff computer
system.
The website should be
hosted by a web server
which runs on the staff
computer system.
Successfully
4. Ping Testing
between
different
department pc.
Data Packets should
be received and sent
perfectly between IT
staff support pc and
customer service
staffs Pc.
Data Packets are
successfully received and
sent perfectly between
IT staff support
computer system and
customer service staffs
Successfully
42

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
computer system.
Figure 35: Test Scenario one
43
Document Page
Figure 36: Test Scenario two
Figure 37: Test Scenario three
44
Document Page
Figure 38: Test Scenario four
45

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
LO4- Be able to manage LAN infrastructures.
AC 4.1 Monitor and troubleshoot a LAN
LAN troubleshot and monitor process improved the network reliability and performance. There
is a number of the software which monitors and troubleshoots the network.
Monitoring Tools
LAN Network offered Event Monitor, Fault Monitor, Topology Services, and MiniRMON tools
that are a monitor on the network faults, ports, Links, and an event in the LAN network and also
performed the function which remotely monitors the network.
Troubleshooting Tools
LAN network offered VRF-lite, Netshow, and troubleshooting workflows tools that are
troubleshooting the connectivity of the network, recognize end host issue, diagnose device
issue, and authenticate end-to-end connectivity of VRF configured devices (Cisco, 2018).
Here, I have explained Monitor and troubleshoot software that is used in the LAN network.
PRTG: PRTG is software that designed for network components scanning and traffic monitoring.
It used by the small organization for LAN traffic Monitoring.
ManageEngine OpManager: It monitored SMS, Emails, and handy plugins traffic in the LAN
network. ManageEngine OpManager is costly software.
PulseWay: PulseWay is a real-time monitor and control software that monitored the system
from any time and anywhere. But it works as single dashboard which used by a number of the
user. It secures software system which monitored sensitive information on LAN network.
EventSentry: EventSentry is a lightweight monitoring tool that offered an event in log files,
Syslog, and real-time for the organization. It tracked networking device and components which
is a desktop-based system (Fearn, 2017).
46
Document Page
AC 4.2 Resolve LAN issues to improve security, reliability and performance
Here, I have explained reliability, security, and performance issue solution which occurred in
the organization LAN network.
Resolving security Issue:
Security is a major issue of the LAN network which resolved through antivirus, authorization,
and authentic process in the LAN network. I have implemented frameworks in the LAN network
which steps are following:
I have installed the antivirus latest version on the network. Frequently filter and
spyware system are used for LAN network and servers.
Proxy server monitored all application on the LAN network which created security
threads in the network.
The user used authorization, authentication, and encryption on passwords that make
the system secure.
Logging system is enabled on the LAN system and severs machine.
I have implemented a firewall on the LAN network.
Resolving the performance and Reliability Issues
Performance and reliability are major issues in the LAN network which is resolved through
subnet, LAN card, and LAN network device. Here, I have explained the process of resolving the
performance and reliability Issues which are following
Performed the LAN network division in the Subnet which balances the load in the
network.
The router is used in the network on the place of the unnecessary system because it
scanned the system rate.
LAN network device increased the RAM.
47
Document Page
Network device cleared their browser history, cookies and unnecessary files in the
network for the resolve the performance and Reliability Issues.
Uninstalled the application from the system which is not useful and creates load on the
network.
In the LAN network, separately arranged the gateway machine, print server, File server,
and proxy server. All these are loaded on each server of the network.
LAN card is installed to increase the network speed 10 – 100 Mbps.
LAN network used the switch to the network designed rather than a hub (Staff, 2014).
48

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
AC 4.3 Critically evaluate the performance of a LAN
Local area network has a number of the problem which related network device, bandwidth,
speed and connection. Here, I have evaluated the performance of a LAN during the monitoring
and Troubleshooting process which help to enhance reliability, performance, and security of
the network.
For the maximum performance, I have checked switch port and router speed.
Some problem is one time or regular on the network so there are need to use right
monitoring tools that recognized the system which caused issue or error in the LAN
network.
LAN configuration and setting must be checked in the network which may be caused
some time error in the network.
LAN network has a number of the application which runs on the network. So there are
need to check application setting, configuration, and security that recognized the error,
issue, or threat in the application because they affect the LAN network performance.
LAN Network performance also depended on the network bandwidth because it may be
occurred saturation condition on the MPLS ports that is long or short period. Saturation
condition occurred during large file transfer.
In the LAN network, each router contained routing table which is a help to selected best
routing path. Routing Path may be affected the LAN network performance. LAN
network performance degrades if multiple time chose the wrong path in the network.
LAN network contained backup systems which affect the network working. If the
network backup system is not working smoothly then there is data synchronization
problem in the network.
LAN network used SNMP stream for the identified router problem which may be
statistics and long-term problem in the network device. It affects the LAN network
performances (Netsout, 2015).
49
Document Page
Conclusion:
Here, I have implemented the LAN network on the Cisco Packet Tracer tool for the FootFall
Field Marketing Ltd organization. Cisco Packet Tracer is software that is used connecting and
adding the different type network device. LAN network of organization resolved reliability,
network security and performance problem and offered the connection between offices and
their departments that are same building but the different floor.
In the report, I explained LAN network, their type and technologies which are useful for FootFall
Field Marketing Ltd organization. Then I have proposed a LAN network according to
organization requirement and evaluate of LAN device. Further, I have implemented LAN
network with security standards and checked the working of LAN network. In the end, I
performed the troubleshooting process to recognize the reliability, security, and performance
problem and then resolved in the network. I have also explained LAN network performance.
50
Document Page
References
Addison, D. (2001). Setting up a Local Area Network. [online] Ibm.com. Available at:
https://www.ibm.com/developerworks/library/l-lan/index.html [Accessed 23 Mar. 2018].
Alexandres, J. (2012). DNS at the local area network level. [online] The Spiceworks Community.
Available at: https://community.spiceworks.com/networking/articles/2849-dns-at-the-local-
area-network-level [Accessed 23 Mar. 2018].
BeotelNet. (2017). Media streaming - audio and video. [online] Available at:
https://www.beotel.net/streaming [Accessed 23 Mar. 2018].
Berchem, D. (2000). Firewalls and LAN Security. [online] Cse. Available at:
http://www.cse.uconn.edu/~berchem/ [Accessed 23 Mar. 2018].
Carey (2016). Encryption: An Introduction to Protecting Your Data. [online] Upwork. Available
at: https://www.upwork.com/hiring/development/introduction-to-encryption-data-security/
[Accessed 23 Mar. 2018].
Cisco. (2008). Implementing Quality of Service Policies with DSCP. [online] Available at:
https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-packet-marking/
10103-dscpvalues.html#dscpandassuredforwardingclasses [Accessed 23 Mar. 2018].
Cisco. (2018). Monitoring and Troubleshooting With Cisco Prime LAN Management Solution 4.1
- Chapter 1: Overview of Monitoring and Troubleshooting [Cisco Prime LAN Management
Solution 4.1]. [online] Available at:
https://www.cisco.com/c/en/us/td/docs/net_mgmt/ciscoworks_lan_management_solution/4-
1/user/guide/monitoring_troubleshooting/mnt_ug/mnt-overview.html [Accessed 23 Mar.
2018].
Draytek. (n.d.). How to block the service by using the firewall to block the certain port?. [online]
Available at: https://www.draytek.com/en/faq/faq-security/security.firewall/how-to-block-the-
service-by-using-the-firewall-to-block-the-certain-port/ [Accessed 23 Mar. 2018].
51

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Duffy, G. (2015). What is network latency and how do you use a latency calculator to calculate
throughput?. [online] Sas. Available at: https://www.sas.co.uk/blog/what-is-network-latency-
how-do-you-use-a-latency-calculator-to-calculate-throughput [Accessed 23 Mar. 2018].
Fisher, T. (2018). What Is DHCP? (Dynamic Host Configuration Protocol). [online] Lifewire.
Available at: https://www.lifewire.com/what-is-dhcp-2625848 [Accessed 23 Mar. 2018].
Geier, E. (2014). 8 ways to improve wired network security. [online] Network World. Available
at: https://www.networkworld.com/article/2175048/wireless/8-ways-to-improve-wired-
network-security.html [Accessed 23 Mar. 2018].
Hurley, M. (2015). 4 Causes of Packet Loss and How to Fix Them. [online] Annese. Available at:
https://www.annese.com/blog/what-causes-packet-loss [Accessed 23 Mar. 2018].
Jain, R. (1997). Virtual Local Area Networks. [online] Cse. Available at:
https://www.cse.wustl.edu/~jain/cis788-97/ftp/virtual_lans/index.html [Accessed 23 Mar.
2018].
Maxwellstreaming. (n.d.). Video on Demand (VOD) Streaming Services London, Manchester,
Oxford, UK. [online] Available at: http://www.maxwellstreaming.com/uk/video-on-demand-
service-london-uk.php [Accessed 23 Mar. 2018].
Molenaar, R. (n.d.). IP Precedence and DSCP Values. [online] NetworkLessons. Available at:
https://networklessons.com/quality-of-service/ip-precedence-dscp-values/ [Accessed 23 Mar.
2018].
Muller, N. (n.d.). Reliability and Availability Design Issues for LANs. [online] Pdfs. Available at:
https://pdfs.semanticscholar.org/be9d/a1a8a2e209ddd56d67f4a7047b4deba30f05.pdf
[Accessed 23 Mar. 2018].
Pearsonitcertification. (2013). LAN Technologies. [online] Available at:
http://www.pearsonitcertification.com/articles/article.aspx?p=101697 [Accessed 23 Mar.
2018].
52
Document Page
THAKUR, D. (2014). Star Topologies – What is Star Topologies?. [online] Ecomputernotes.
Available at: http://ecomputernotes.com/computernetworkingnotes/computer-network/star-
topologies [Accessed 23 Mar. 2018].
Ullah, H. (2013). Voice Over IP (VoIP). [online] Slideshare. Available at:
https://www.slideshare.net/habib_786/voice-over-ip-voip-26670219 [Accessed 23 Mar. 2018].
Yenra. (2004). Qwest VoIP. [online] Available at: https://yenra.com/how-voip-works/ [Accessed
23 Mar. 2018].
Carter, A. (2012). Different Types of Switches - Network Switches. [online] eeweb. Available at:
https://www.eeweb.com/profile/andrew-carter/articles/different-types-of-switches-network-
switches [Accessed 23 Mar. 2018].
CB Antenna. (2017). A Complete Guide to CB Coax Cable - Strykerradios. [online] Available at:
https://strykerradios.com/cb-coax-cable/ [Accessed 23 Mar. 2018].
Delaney, J. (2018). The Best Wireless Routers of 2018. [online] PCMag UK. Available at:
http://uk.pcmag.com/wireless-networking-products/8151/guide/the-best-wireless-routers-of-
2018 [Accessed 23 Mar. 2018].
Electrical Circuit Diagram Ideas. (2017). Wired Vs Wireless Network. [online] Available at:
http://eidetec.com/wired-vs-wireless-network [Accessed 23 Mar. 2018].
Empress. (2014). Empress Software Inc. ~ Empress Embedded Database. [online] Available at:
http://www.empress.com/marketing/customstory/CommunicationCiscoRDBMS.htm [Accessed
23 Mar. 2018].
Kurose, J. and Ross, K. (2007). Week16 lec2. [online] Slideshare. Available at:
https://www.slideshare.net/syedhaiderraza/week16-lec2 [Accessed 23 Mar. 2018].
Matrox. (2012). Matrox Graphics - Products - Legacy Products - Veos - Veos Repeater Unit.
[online] Available at: http://www.matrox.com/graphics/en/products/legacy/veos/vsrptr0f/
[Accessed 23 Mar. 2018].
53
Document Page
Mitchell, B. (2017). What's a LAN (Local Area Network)?. [online] Lifewire. Available at:
https://www.lifewire.com/local-area-network-816382 [Accessed 23 Mar. 2018].
Multicom. (n.d.). Draka - ezSPAN - ADSS Long Span Fiber Optic Cable (2-288 Count). [online]
Available at: https://www.multicominc.com/product/draka-ezspan-adss-long-span-fiber-optic-
cable-2-288-count/ [Accessed 23 Mar. 2018].
pillai, H. (2015). networking devices. [online] Slideshare. Available at:
https://www.slideshare.net/harishpillai2/networking-devices-43427747 [Accessed 23 Mar.
2018].
Rao, V. (2014). Virtual local area network. [online] Slideshare. Available at:
https://www.slideshare.net/VeenaRao7/virtual-local-area-network [Accessed 23 Mar. 2018].
Simpson, N. (2015). Network Components By Kagan Strayer. Network Components This
presentation will cover various network components and their functions. The components that. -
ppt download. [online] Slideplayer. Available at: http://slideplayer.com/slide/9079787/
[Accessed 23 Mar. 2018].
Singh, G. (2017). Wireless Network Explanation & IEEE-802.11 Standards and Wi-Fi glossary.
[online] Youmegeek. Available at: https://www.youmegeek.com/education/wireless-network-
explanation-ieee-802-11-standards-wi-fi-glossary/ [Accessed 23 Mar. 2018].
Sites. (n.d.). Tipo de Cable de Redes - Cableado de Redes. [online] Available at:
https://sites.google.com/site/inacapcableadoderedes/tipo-de-cable-de-redes [Accessed 23
Mar. 2018].
STRUCTURED CABLING. (n.d.). What is UTP Cable. [online] Available at:
http://structuredcabling.com/what-is-utp-cable/ [Accessed 23 Mar. 2018].
Trendnet. (n.d.). 4-Port Network USB Hub - TRENDnet TU2-NU4. [online] Available at:
http://www.trendnet.com/products/proddetail?prod=260_tu2-nu4 [Accessed 23 Mar. 2018].
54

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Staff (2014). 6 Problems That Plague WANs and How to Address Them. [online] Technology
Solutions That Drive Government. Available at:
https://statetechmagazine.com/article/2014/02/6-problems-plague-wans-and-how-address-
them [Accessed 23 Mar. 2018].
Netsout (2015). 8 Simple Steps for Troubleshooting Your WAN | NETSCOUT. [online]
Enterprise.netscout. Available at: http://enterprise.netscout.com/cio_brief/8-simple-steps-
troubleshooting-wan [Accessed 23 Mar. 2018].
Fearn, N. (2017). Top 5 best network monitoring tools and software of 2017. [online] TechRadar.
Available at: https://www.techradar.com/news/top-5-best-network-monitoring-tools-of-2017 [Accessed
23 Mar. 2018].
55
1 out of 56
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]