logo

LAN Technologies: Design, Implementation, and Management

   

Added on  2024-06-12

41 Pages5840 Words330 Views
 | 
 | 
 | 
LOCAL AREA NETWORKING TECHNOLOGIES
LAN Technologies: Design, Implementation, and Management_1

Table of Contents
Introduction.......................................................................................................................................................4
LO1 Understand the impact of LAN technologies...............................................................................................5
A.C 1.1 Critically evaluate different LAN technologies....................................................................................5
A.C 1.2 Critically analyze traffic intensive services and their performance.....................................................7
A.C 1.3 Discuss LAN concerns and makes recommendations to sustain network security, reliability and
performance...................................................................................................................................................9
LO2 Be able to design LAN infrastructures.......................................................................................................10
A.C 2.1 Design a LAN infrastructure for the company which will facilitate all of their requirements...........10
A.C 2.2 Critically evaluate the suitability of LAN components......................................................................11
LO3 Be able to implement LAN infrastructures................................................................................................14
A.C 3.1 Build and configure a LAN (including services) to meet a given requirement..................................14
To build a LAN:.............................................................................................................................................14
A.C 3.2 Implement network security on a LAN.............................................................................................21
A.C 3.3 Critically review and test a LAN........................................................................................................24
LO4 Be able to manage LAN infrastructures.....................................................................................................32
A.C 4.1 Critically discuss how this LAN infrastructure will be monitored and managed (via troubleshooting)
if there is an issue during post-implementation period................................................................................32
A.C 4.2 Resolve LAN issues to improve security, reliability and performance..............................................33
A.C 4.3 Critically evaluate the performance of a LAN...................................................................................34
Conclusion........................................................................................................................................................39
References........................................................................................................................................................40
LAN Technologies: Design, Implementation, and Management_2

List of figures
Figure 1 Traffic intensive services.......................................................................................................................7
Figure 2 Firewall Protection for LAN...................................................................................................................9
Figure 3 LAN infrastructure design...................................................................................................................10
Figure 4 Infrastructure of LAN..........................................................................................................................15
Figure 5 CLI command 1...................................................................................................................................16
Figure 6 CLI command 2...................................................................................................................................17
Figure 7 CLI command 3...................................................................................................................................18
Figure 8 CLI command 4...................................................................................................................................19
Figure 9 CLI command 5...................................................................................................................................20
Figure 10 VLAN configuration of the switch.....................................................................................................22
Figure 11 ACL of the router..............................................................................................................................22
Figure 12 Password protected router...............................................................................................................23
Figure 13 Password protected switch...............................................................................................................23
Figure 14 HTTP & DNS verification test case....................................................................................................25
Figure 15 Inter-department ping test case 1....................................................................................................26
Figure 16 Inter-department ping test 2............................................................................................................26
Figure 17 Inter-department ping test 3............................................................................................................27
Figure 18 Inter-department ping test 4............................................................................................................27
Figure 19 Inter-department ping test 5............................................................................................................28
Figure 20 IT manager and department ping test 1...........................................................................................28
Figure 21 IT manager and department ping test 2...........................................................................................29
Figure 22 IT manager and department ping test 3...........................................................................................29
Figure 23 IT manager and department ping test 4...........................................................................................30
Figure 24 IT manager and department ping test 5...........................................................................................30
Figure 25 Telnet access....................................................................................................................................31
Figure 26 Report for PDU list 1.........................................................................................................................35
Figure 27 Repost for PDU list 2.........................................................................................................................36
Figure 28 Test case 1 for pinging......................................................................................................................36
Figure 29 Test case 2 for pinging......................................................................................................................37
Figure 30 Test case 3 for pinging......................................................................................................................37
Figure 31 Test case 4 for pinging......................................................................................................................38
Figure 32 Router IP configuration.....................................................................................................................38
LAN Technologies: Design, Implementation, and Management_3

Introduction
The Football Field Marketing Ltd. Is a sales and marketing company at a small level? But now the
company has expanded its business and made offices on three floors and wants to use LAN network
to manage and implement the security issues. This report explains about the LAN, various types of
LAN technologies used, different IEEE standards for wired and wireless LAN and virtual LANs. It
explains different types of devices, topology used in LAN and cabling wires used to connect. In this
report, a network diagram is shown for our company that uses star topology and UTP cable. VLANs
are explained here that helps in connecting different computer of our company. Various security
issues and ways of securing LAN from this issue are also explained here. Different troubleshooting
commands and their functions are discussed in this report. It also explained what will be LAN
security problems that our company may suffer and how to resolve these problems.
LAN Technologies: Design, Implementation, and Management_4

LO1 Understand the impact of LAN technologies
A.C 1.1 Critically evaluate different LAN technologies
LAN (local area networking) is a way for transmission of data sources between various networks or
system. This helps in transmitting our data in a building or small distance. LAN provides a
connection in both wireless and wired form. Local Area Network maintains a connection on a single
floor (small area) or in the whole building. This network has become spread all over the academic
and professional areas. Local Area Network helps in transferring data independently (Geeks, 2018).
WLAN or Wireless Local Area Network helps user to connect to a local area network through
wireless connections. For a wireless network, IEEE 802.11 developed by IEEE 802.11 uses carrier
sense numerous accesses with collision avoidance & Ethernet protocol for maintaining wireless
networks. Ethernet describes network devices can change the data formats for transmission to the
other network using data link layer protocol. CSMA protocol helps in avoiding collisions and
transferring the data sources whereas in Carrier Sense Multiple Access with collision detects
transfers the data after a collision occurred. Ethernet 802.3 is mostly used for communication
between two or more networks. Ethernet 802.3 helps in fast communication of data between two
channels. Ethernet connections are familiar because it is used in wired communication so far. This
provides a rapidly fast transmission of data. Ethernet protocol uses spanning tree protocol for
logical topology. Spanning Tree Protocol detects bridge free loops and broadcast radiation.
Spanning Tree Protocol maintains a spanning tree for layer-2 bridges and removes other links
(Techtarget, 2018).
IEEE Standard 802.11 is mainly used for implementing wireless connection networks. This uses a
frequency range of 2.4GHz, bandwidth range to 8000MHz.IEEE standard uses a range from 10 to
100m for transmitting data fastly. IEEE 802.11 standard transfers data with a speed of 866.7 or
6757Mbit/sec. The following standards mentioned transfer data with a high speed.
VLAN is known as Virtual Local Area Network. This is used to allow various networks to work as a
single LAN. VLAN is used for the sharing of network resources and helps to increase network
efficiency. VLAN reduces the time period between input and output in a transmission medium.
VLAN helps in increasing network security. This helps in easily relocate the network and easily
expand the related network functionality. VLAN Trunking Protocol (VTP) maintains a consistency for
LAN Technologies: Design, Implementation, and Management_5

transmitting data from one point to another. VTP is responsible for coinciding VLAN information in
the network for maintaining a stable network connection. VLAN contains switches and end stations
to connect in the network. VLAN offers some benefits in the network in both bridging and routing.
As seen in the case of switches VLAN also forward traffic which is related to Layer2 communication,
which is fast. VLAN performs various type of functionality and this helps in dividing roles by the type
of work which is performed by a particular VLAN.
1. Default VLAN is the first step of the switch where all the switch ports are the part of default
VLAN. Default VLAN enables all devices to be connected with other devices on switch ports.
2. Data VLAN is used to configuring user-generated traffic and helps in distinguishing user data
another type of VLAN.
3. Management VLAN is used to configure various types of management works in the network. By
this, it is connected to the switch and a subnet mask to maintain the network connectivity
throughout (Techopedia, 2018).
Switches used networking to connect devices on a computer network for receiving data, process
the data and finally transmit the amount of data to the resources. Switches help in transmitting the
data to both at data link layer and network layer. Switches used in transferring data in more than
one network and it forwards data only to those devices those are ready to receive it. Repeaters
mainly used for replicating the data. When transmitting data is lost then repeaters help in the
recovery of the data in both analogue and digital signals. Bridges mostly used to communicate in a
smaller network. But switches are used to maintain a connection in a larger network frame. Bridges
connect a small group of networks and convert it into a larger network. Bridges are less efficient
than switches. Hub is used as a single connection point to connect more than one network through
its multiple ports. Basically, hub connects various segment of Local Area Network. Routers maintain
connections between two networks it may be two LAN’s. Routers are available in that place where
two or more LAN connects. Several protocols are used in a network to maintain network
connectivity fast.
Coaxial cable is similar as we used in TV cables. These cables are used to maintain a network
connection between different LANS’s. Fibre optic cables wires also used for providing wired ca
communication in the network. These cables are similar to electrical wires but it also contains some
LAN Technologies: Design, Implementation, and Management_6

optical fibres which are used to travel light. These types of fibres are covered with plastic to protect
it from the environment.
A.C 1.2 Critically analyze traffic intensive services and their performance.
Network traffic generally refers to data traffic services. This term generally explains that how a data
move from one point to another on a single time instance. Network traffic mainly depends on the
bandwidth and its management. Most network traffic is defined in web-enabled services when a
large number of user hit on same type of event and within a short interval of time number of users
increase on the web. When a maximum number of users hit on the same type of data then the
speed of transmission of the source to destination varies. The speed of the connection for data
transmission mainly depends on the type of technology preferred. Bandwidth is the major aspect in
LAN services due to that network smoothness would be maintained and majorly monitoring the
performance of bandwidth consumption to avoid the problem of a bottleneck. Voice over IP defines
the Voice over Internet Protocol. This uses some internet protocols for transmitting the data over
the internet instead of using the Public Switched Telephone Network. When more than one call is
received on mobile phones then this protocol uses its services of call forwarding etc. Network traffic
is increased by media streaming on different web portals. Video on demand is increased network
traffic. In a network, multiple applications support live streaming and video streaming which share
a large amount of data on the network. QOS describe the performance of a network. Differentiated
Service Code Point is a method of managing QoS in its services. The 802.1Q is used to move data via
multiple LAN. IP precedence set the priorities of data for moving on a route for highly reliable
services (Geier, 2018)
Figure 1 Traffic intensive services
LAN Technologies: Design, Implementation, and Management_7

LAN Technologies: Design, Implementation, and Management_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
LAN Network Design and Implementation for Footfall Filed Marketing Ltd.
|43
|4996
|331

Local Area Networking Technologies: Design, Implementation, and Management
|59
|6776
|488

Local Area Network (LAN) Design and Implementation for Football Field Marketing Ltd.
|55
|6554
|219

LAN Network Design and Implementation for FootFall Field Marketing
|56
|7645
|229

LAN Network Design and Implementation for FootFall Marketing Field
|47
|6713
|211

Local Area Networking Technology: Design, Implementation, and Management
|44
|8567
|496