ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

LAN Technologies: Impact, Design, Implementation and Management

Verified

Added on  2023/05/29

|26
|5223
|104
AI Summary
This article discusses the impact of LAN technologies, critical analysis of network topologies, robustness of LAN, hierarchical network over LAN, and design, implementation, and management of LAN infrastructures. It also includes IP mapping and VLAN switch configuration for a hierarchical Star topology.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
LOCAL AREA NETWORK
ASSIGNMENT
Student name:
Student ID:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Task 1 :Understand the impact of LAN technologies.....................................................................3
1.1 Critical Analysis among the Network Topologies for choosing the best for Design............3
1.2 Robustness of LAN................................................................................................................7
1.3 Imposing Hierarchical Network over LAN for Security, Reliability & Performance...........8
Task 2 :Be able to design LAN infrastructures.............................................................................10
2.1 Design network infrastructure to fulfill the requirement of above scenario........................10
2.2 Evaluation of network components and design...................................................................13
Task 3 :Be able to implement LAN infrastructures.......................................................................16
3.1. Build and configure the entire network...............................................................................16
Task 4 :Be able to manage LAN infrastructures...........................................................................23
4.1 Tools to Monitor LAN.........................................................................................................23
4.2 Immunity of LAN from attack.............................................................................................23
4.3 Improvement of LAN...........................................................................................................24
References......................................................................................................................................25
2
Document Page
Task 1 :Understand the impact of LAN technologies
1.1 Critical Analysis among the Network Topologies for choosing the best for Design
In a large building, or in a business area or in an office, all the systems are connected using Local
Area Network or LAN. In this section we will discuss about the analysis of the existing network
topologies with their sound attributes. After analysis is done, we will consider the particular
topology to be suitable for our design.
Bus Topology
This is most simple and widely used configuration where all the connecting devices are attached
with a single bus which is terminated at each end by terminator resistor. Ahmed and Farag
(2014), all the connected devices have equal access to the bus. It is very easy to install and the
number of devices can be modified according to our need and this is dependent upon the terminal
load.
Fig-1: Bus Topology
(Source: https://www.kullabs.com)
Advantages:
It is a small and less costly network.
Length of cable required is very small.
Configuration is lucid to build and understand and easy to modify.
Disadvantages:
Relatively slower for small cable length and greater load.
3
Document Page
If any part of the cable creates any problem for data transmission, the whole system
faces the similar problem.
Ring Topology
Another topology of importance is the Ring Topology. In this configuration, a ring of connection
is formed so that every device meets their exactly two neighbor devices. This is created by a
point-to-point link method. While data routing, the main server checks for the proper destination
address and when it is matched, it drops. Jiang (2014) stated it has a basic unidirectional data
transmission system but it can be made bi-directional using Dual Ring Topology architecture.
Fig-2: Ring Topology
(Source: https://www.kullabs.com)
Advantages:
Data transmission not affected by number of nodes
Installation cost is lower.
It can be modified easily as per our requirement.
Disadvantages:
If in this topology, any device fails, the whole system breaks down.
It is difficult for troubleshooting.
Star Topology
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
In this network architecture, each and every device is connected using Optical Fiber or Twisted
Cable individually with the central hub which works as a data repeater.
Fig-3: Star Topology
(Source: https://www.kullabs.com)
Advantages:
Speed of data transmission is very high for individual connection.
If any of the devices is failed, only that part affected but the rest part remains working.
Disadvantages:
The Central hub must be used with high enough capacity to undertake sufficient load.
Maintenance cost is very high.
Mesh Topology
In this network architecture, Central hub and all the devices are interconnected. There are
basically two models of Mesh, Routing model and Flooding model. Among the all, Davis (2018)
stated it is the fully connected and robust network. It will be in such cases where interconnection
of each device is required.
5
Document Page
Fig-4: Mesh Topology
(Source: https://www.kullabs.com)
Advantages:
It is secured and the fault can be diagnosed easily.
Individual connection carries their respective data.
Disadvantages:
High length of wiring is required.
Installation is difficult and fault finding is easy.
These are the moderate discussion for comparing the available topologies. Let we sort out the
main topics for our conclusion as below:
Table-1: Formal comparison among Bus, Ring, star & Mesh
Parameters Bus Ring Star Mesh
Dataflow
Efficiency
More Moderate More Highest
Cable Length Less Moderate More Highest
Security Less Less High Moderate
Traffic Less High Medium Not
Applicable
Robustness No No Yes No
Cost Low High High High
Failure Easy to solve Difficult to solve Easy to solve but
may be difficult if
Hub fails
Easy to
solve and
partially not
dependent
upon Hub
So, according to our comparison and looking to our requirement, we can say for this particular
architecture, we use Star Topology as the devices like PC, Printers are connected to each
6
Document Page
segment does not required to be interconnected but it is required to be connected with Central
Hub.
1.2 Robustness of LAN
As we are about to construct an entire network for our advantage, it need to be robust enough to
face any difficulties like data overload, unethical attack etc. Thus we have chosen Star network
topology. As it is a point-to-point connection directly in between device and Hub, a partial
damage of a segment does not affect the entire system. In the same sense and view, if some
device will face some external attack, only this particular device will be under threat. In our
design methodology, if we use topology other than Star, the complexity and healthiness of the
network both goes down. Let we see an comparative analysis of these four topologies where
multisensory network will be used for networking (Quevedo et al. 2017)
et
Fig.5: Comparison of different topologies
In this figure, we can clearly see that in a multisensory network, when the number of sensors is
increased, Star topology works better there. In the similar way, when no of connection is
increased, the efficiency is decayed in case of Bus & Ring and the complexity is increased in
mesh network. But in case of Star topology, it will remain efficient for any of the instance which
makes it Robust.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
To reach a good Quality of Service and having enough availability of data flow throughout the
network securely, the central hub matters. If the number of connections is increased, surely, the
capacity of the central hub will have to be maintained in such extent so that the data loss will not
occur and this may an issue for all the topologies. When the traffic is greater like in peak hour,
the Central Hub must be capable of accessing and handling the content of data more efficiently.
If we take a look into this matter and precise it properly, surely Star network work better than
any other topologies exists in market.
1.3 Imposing Hierarchical Network over LAN for Security, Reliability & Performance
In individual LAN topology have their relevant advantages and disadvantages as discussed
earlier. For a large constituting network, not a single topology will work perfectly. So, there is a
need of combining them all or some of them taking their advantageous parts and designs, we can
make a hierarchical network which will be more reliable and secured and obviously, a secured
and reliable network work better. The performance enhancement of a hierarchical network is
related with the following attributes.
Security
A single topology cannot provide a good security issue. Switches in can be designed with
individual port security choices providing command over which gadgets are permitted to
associate with system. In addition, Jen et al. (2014), there is another approach that makes it
secure is the HTTP which is provided by its advanced version HTTS and controlled by system’s
HTTP server or WEB server. Moreover, the hierarchy provided an integrated security as it passes
through different layer to reach a device.
Performance
As the system is hierarchical, performance depends upon the intermediate switches. If the load is
increased, if the load capability is higher for the switches to able to handle more devices, star
topology works better. Asthana et al. (2016) the intermediate hubs have also the capability to
make a backup of data so that it can be reloaded when some system get break down.
8
Document Page
Reliability
Reliability is a very basic feature of hierarchical network. These configuration supports multi
layered data transmission. So, for each layer, Li et al. (2015) stated the data or packet is being
checked so that there is a reliable transmission of data routing may take place. For multi layer
data routing, each and every hub can store the report of the data transmission.
9
Document Page
Task 2 :Be able to design LAN infrastructures
2.1 Design network infrastructure to fulfill the requirement of above scenario
In our network design, as described in the instruction, is given here in Fig.6
Fig.6: Requirement for the design
To design the entire architecture, Network Lab Simulator of CISCO is used. A total of 121
Computers are used along with 4 Printers, 4 Servers for DNS/ Web/ E-Mail/ File Server purpose.
They will be arranged in their respective cluster so that their inter connection will be diminished.
The structure that is used is the Hierarchical Topology based on Star. The design and
connections for every section are as follows:
Finance:
In Finance Section, we have 9 computers and 1 Printer connected in LAN. These architecture is
implemented using STAR topology as shown below. They are not accessible to outside the
department as they are directly deals with the local router.
10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Fig.7: Finance Section
The connection is made using Ethernet connection with Ethernet crossover cable. Te routing
table for the Router connected is,
Show IP Route:
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route, o – ODR
IP Range: 1.1.1.0 – 1.1.1.9
Subnet Mask: 255.0.0.0
Topology: Star
HR:
HR Section consists of 4 computers and 1 printer and they are also connected in STAR topology
with a similar routing table described as Finance. They are not accessible to outside the
department as they are directly deals with the local router. The connection is made using
Ethernet connection with Ethernet crossover cable.
11
Document Page
Fig.8: HR Section
IP Range: 1.1.2.0 – 1.1.2.4
Subnet Mask: 255.0.0.0
Topology: Star
Design:
A mass load is faced in the design section. There are 40 computers and 1 printer. Here the entire
section is segmented into two parts, each consisting of 20 computers to minimize the load. Each
segment is connected with native switch in STAR topology. They are not accessible to outside
the department as they (both the switches) are directly deals with the local router. The connection
is made using Ethernet connection with Ethernet crossover cable.
Fig.9: Design Section
IP Range: 1.1.3.0 – 1.1.3.40
12
Document Page
Subnet Mask: 255.0.0.0
Topology: Star
Sales:
Lastly the Sales section introduces 68 computers. So there is a huge load. In that case there is a
huge load and the entire section is divided into four sections, each containing 17 computers.
Each subsection is controlled by local switch with STAR topology. Again these four switches are
connected with a sectional router. The connection is made using Ethernet connection with
Ethernet crossover cable.
Fig.10: Design Section
IP Range: 1.1.4.0 – 1.1.2.68
Subnet Mask: 255.0.0.0
Topology: Star
13

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2.2 Evaluation of network components and design
Evaluation:
As the design is made using Star topology and all the sections are holding the same infrastructure
and their interconnection are also designed using te same, this particular structure is referred as
Tree-Topology which is actually a hierarchical Star Topology
As the sectional view, there is some individual switch; this connection is referred by VLAN or
Virtual LAN or more specifically, Virtual Switch. This VLAN for one segment is shown below:
Fig.11 VLAN Switch Configuration
So, in our structure, there are the connection are established. We have checked in our simulation
for the effectiveness of the LAN we have applied. In our design IP are set to define the PC and
the printers. Let we see list of all assigned IP as in range fashion. In the preceding section we
will list down the details for the IP Mapping.
Section: “HR"
HRC0 – HRC3 IP = 201.100.011.001- 201.100.011.005
Mask = 255.255.255.000
Gateway = 201.100.011.001- 201.100.011.005
Section: “FINANCE"
FC0 – C1IP = 199.006.013.001- 199.006.013.009
14
Document Page
Mask = 255.255.255.000
Gateway = 199.006.013.001 - 199.006.013.009
Section: “DESIGN”
DS0-DS40 IP = 204.204.007.001 - 204.204.007.0040
Mask = 255.255.255.000
Gateway = 204.204.007.001 - 204.204.007.0040
Section: “SALES”
SC0-SC68 IP = 212.206.010.001 - 212.206.010.0068
Mask = 255.255.255.000
Gateway = 212.206.010.001 - 212.206.010.0068
Security & Applications:
So, this architecture will route the data from the sectional segment to the LAN. As influenced by
Tripathi and Hubballi (2015), they are assigned by individual IP, the possibility of IP conflict
will be minimized and the another reason is that each and every section has its own gateway
structure using Switch and corresponding Router who are connected in Star topology and
moreover as the Tree Architecture, the Point-to-Point connection will be secured.
Users & Scalability:
In this structure, the total user than can work together is 121. Each having access to the switch
and each computer is individually tracked by the local switch / router. Each local segment is
connected with the external servers for DNS, EMAIL, FILE and WEB. So, all the computers and
the local printers have a access to the cloud but for user security and scalability, no two
computers are directly connected. So, computers of a department cannot be accessed by external
department. But the domain server can access the individual computers if they want to do so.
15
Document Page
Task 3 :Be able to implement LAN infrastructures
3.1. Build and configure the entire network
In this section we will discuss and show the complete interconnection of the computers with
local switch / router and the connections among the routers that are controlling segments. Below
the configuration is demonstrated.
Fig.12: Complete Architecture of LAN
Configuration:
In our configuration, all the segment switch are connected to the computers using Fast Ethernet
connection. We have used DNS Server, WEB Server, EMAIL Server andFILE Server which are
16

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
connected with respective router of the system. The servers having their gateway routing address
as follows:
DSN Server: 6.6.8.4 (IPv4)
WEB Server: 8.8.2.2 (IPv4)
EMAIL Server:214.42.103.78(IPv4)
FILE Server: 201.112.165.31 (IPv4)
All the switches are secured with the technique such that, the accessibility of the devices depends
upon the access permission of the router. When a device need to be access by external agents, it
will be not accessible until and unless the provider will give or permit the access.
Technology & Security:
The servers are altogether connected to a center. Every one of the information goes through the
center point. At the point when a packet goes to the center point it moves that bundle to every
one of the switches connected through the center yet just a single switch at any given moment
effectively transmits it. Information on a star organize surpasses through the center point before
proceeding to its objective. As stated by Salinger et al. (2015), distinctive kinds of links are
utilized to connect PCs, for example, twisted pair, coaxial link and fiber optics. The most well-
known link media being used for star topologies is unshielded or protected wound match copper
cabling. One end of the link is connected neighborhood card while the opposite side is associated
with the center point.
3.2 Review of Configuration
In this section, we first will the IP Ranges and mapping of IP for all devices in each sections as a
simulation result of our design.
Section “HR”:
17
Document Page
HRC0 IP = 201.100.011.001 Mask = 255.255.255.000 GWay = 201.100.011.001
HRC1 IP = 201.100.011.002 Mask = 255.255.255.000 GWay = 201.100.011.002
HRC2 IP = 201.100.011.003 Mask = 255.255.255.000 GWay = 201.100.011.003
HRC3 IP = 201.100.011.004 Mask = 255.255.255.000 GWay = 201.100.011.004
HRP IP = 201.100.011.005 Mask = 255.255.255.000 GWay = 201.100.011.005
Section “FINANCE”:
FC0 IP = 199.006.013.001 Mask = 255.255.255.000 GWay = 199.101.101.001
FC1 IP = 199.006.013.002 Mask = 255.255.255.000 GWay = 199.101.101.002
FC2 IP = 199.006.013.003 Mask = 255.255.255.000 GWay = 199.101.101.003
FC3 IP = 199.006.013.004 Mask = 255.255.255.000 GWay = 199.101.101.004
FC4 IP = 199.006.013.005 Mask = 255.255.255.000 GWay = 199.101.101.005
FC5 IP = 199.006.013.006 Mask = 255.255.255.000 GWay = 199.101.101.006
FC6 IP = 199.006.013.007 Mask = 255.255.255.000 GWay = 199.101.101.007
FC7 IP = 199.006.013.008 Mask = 255.255.255.000 GWay = 199.101.101.008
FC8 IP = 199.006.013.009 Mask = 255.255.255.000 GWay = 199.101.101.009
FCP IP = 199.006.013.010 Mask = 255.255.255.000 GWay = 199.101.101.010
Section “DESIGN”:
DS0 IP = 204.204.007.001 Mask = 255.255.255.000 GWay = 204.204.007.001
DS1 IP = 204.204.007.002 Mask = 255.255.255.000 GWay = 204.204.007.002
DS2 IP = 204.204.007.003 Mask = 255.255.255.000 GWay = 204.204.007.003
DS3 IP = 204.204.007.004 Mask = 255.255.255.000 GWay = 204.204.007.004
DS4 IP = 204.204.007.005 Mask = 255.255.255.000 GWay = 204.204.007.005
DS5 IP = 204.204.007.006 Mask = 255.255.255.000 GWay = 204.204.007.006
DS6 IP = 204.204.007.007 Mask = 255.255.255.000 GWay = 204.204.007.007
DS7 IP = 204.204.007.008 Mask = 255.255.255.000 GWay = 204.204.007.008
DS8 IP = 204.204.007.009 Mask = 255.255.255.000 GWay = 204.204.007.009
DS9 IP = 204.204.007.010 Mask = 255.255.255.000 GWay = 204.204.007.010
18
Document Page
DS10 IP = 204.204.007.011 Mask = 255.255.255.000 GWay = 204.204.007.011
DS11 IP = 204.204.007.012 Mask = 255.255.255.000 GWay = 204.204.007.012
DS12 IP = 204.204.007.013 Mask = 255.255.255.000 GWay = 204.204.007.013
---------------------------- ------------------------- ------------------
DS29 IP = 204.204.007.030 Mask = 255.255.255.000 GWay = 204.204.007.030
DS30 IP = 204.204.007.031 Mask = 255.255.255.000 GWay = 204.204.007.031
DS31 IP = 204.204.007.032 Mask = 255.255.255.000 GWay = 204.204.007.032
DS32 IP = 204.204.007.033 Mask = 255.255.255.000 GWay = 204.204.007.033
DS33 IP = 204.204.007.034 Mask = 255.255.255.000 GWay = 204.204.007.034
DS34 IP = 204.204.007.035 Mask = 255.255.255.000 GWay = 204.204.007.035
DS35 IP = 204.204.007.036 Mask = 255.255.255.000 GWay = 204.204.007.036
DS36 IP = 204.204.007.037 Mask = 255.255.255.000 GWay = 204.204.007.037
DS37 IP = 204.204.007.038 Mask = 255.255.255.000 GWay = 204.204.007.038
DS38 IP = 204.204.007.039 Mask = 255.255.255.000 GWay = 204.204.007.039
DS39 IP = 204.204.007.040 Mask = 255.255.255.000 GWay = 204.204.007.040
DSP IP = 204.204.007.041 Mask = 255.255.255.000 GWay = 204.204.007.041
Section “SALES”:
SC 0 IP: 212.206.010.001 MASK: 255.255.255.0 Gway: 212.206.010.001
SC 1 IP: 212.206.010.002 MASK: 255.255.255.0 Gway: 212.206.010.002
SC 2 IP: 212.206.010.003 MASK: 255.255.255.0 Gway: 212.206.010.003
SC 3 IP: 212.206.010.004 MASK: 255.255.255.0 Gway: 212.206.010.004
SC 4 IP: 212.206.010.005 MASK: 255.255.255.0 Gway: 212.206.010.005
SC 5 IP: 212.206.010.006 MASK: 255.255.255.0 Gway: 212.206.010.006
SC 6 IP: 212.206.010.007 MASK: 255.255.255.0 Gway: 212.206.010.007
SC 7 IP: 212.206.010.008 MASK: 255.255.255.0 Gway: 212.206.010.008
SC 8 IP: 212.206.010.009 MASK: 255.255.255.0 Gway: 212.206.010.009
SC 9 IP: 212.206.010.010 MASK: 255.255.255.0 Gway: 212.206.010.010
SC 10 IP: 212.206.010.011 MASK: 255.255.255.0 Gway: 212.206.010.011
---------------------- --------------------------- ------------------------
SC 61 IP: 212.206.010.062 MASK: 255.255.255.0 Gway: 212.206.010.062
SC 62 IP: 212.206.010.063 MASK: 255.255.255.0 Gway: 212.206.010.063
19

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SC 63 IP: 212.206.010.064 MASK: 255.255.255.0 Gway: 212.206.010.064
SC 64 IP: 212.206.010.065 MASK: 255.255.255.0 Gway: 212.206.010.065
SC 65 IP: 212.206.010.066 MASK: 255.255.255.0 Gway: 212.206.010.066
SC 66 IP: 212.206.010.067 MASK: 255.255.255.0 Gway: 212.206.010.067
SC 67 IP: 212.206.010.068 MASK: 255.255.255.0 Gway: 212.206.010.068
SC 68 IP: 212.206.010.069 MASK: 255.255.255.0 Gway: 212.206.010.069
Test Report for Servers
Here is the most important part is to test the server and generate the report. Here we have
demonstrated the routing table so that it can be understood that they are working properly.
DSN Server with ARP :
R 192.5.5.0/24 [120/1] via 200.0.0.2 00:00:04 S0
R 199.6.13.0/24 [120/2] via 210.93.105.1 00:00:00 E0
C 200.0.0.0/24 is directly connected to Serial 0
R 201.100.11.0/24 [120/1] via 200.0.0.2 00:00:04 S0
R 204.204.7.0/24 [120/1] via 210.93.105.1 00:00:00 E0
R 205.7.5.0/24 [120/1] via 200.0.0.2 00:00:04 S0
C 210.93.105.0/24 is directly connected to Ethernet 0
R 219.17.100.0/24 [120/2] via 200.0.0.2 00:00:04 S0
R 223.8.151.0/24 [120/2] via 210.93.105.1 00:00:00 E0
Show arp:
Internet Address Physical Address Interface Age Expires
210.93.105.2 25-F7-8D-00-10-04 Ethernet 0 - -
EMAIL Server wit ARP:
C 192.5.5.0/24 is directly connected to Ethernet 0
R 199.6.13.0/24 [120/1] via 201.100.11.2 00:00:03 S0
C 200.0.0.0/24 is directly connected to Serial 1
C 201.100.11.0/24 is directly connected to Serial 0
R 204.204.7.0/24 [120/2] via 200.0.0.1 00:00:02 S1
20
Document Page
C 205.7.5.0/24 is directly connected to Ethernet 1
R 210.93.105.0/24 [120/1] via 200.0.0.1 00:00:02 S1
R 219.17.100.0/24 [120/1] via 201.100.11.2 00:00:03 S0
R 223.8.151.0/24 [120/2] via 201.100.11.2 00:00:03 S0
Show arp:
Internet Address Physical Address Interface Age Expires
192.5.5.1 FA-18-AE-00-10-04 Ethernet 0 - -
205.7.5.1 E4-8E-AE-00-10-05 Ethernet 1 - -
FILE Server with ARP:
R 192.5.5.0/24 [120/1] via 201.100.11.1 00:00:03 S1
C 199.6.13.0/24 is directly connected to Serial 0
R 200.0.0.0/24 [120/1] via 201.100.11.1 00:00:03 S1
C 201.100.11.0/24 is directly connected to Serial 1
R 204.204.7.0/24 [120/1] via 199.6.13.2 00:00:00 S0
R 205.7.5.0/24 [120/1] via 201.100.11.1 00:00:03 S1
R 210.93.105.0/24 [120/2] via 199.6.13.2 00:00:00 S0
C 219.17.100.0/24 is directly connected to Ethernet 0
R 223.8.151.0/24 [120/1] via 199.6.13.2 00:00:00 S0
Show arp:
Internet Address Physical Address Interface Age Expires
219.17.100.1 F3-EC-85-00-10-04 Ethernet 0 - -
WEB Server with ARP:
R 192.5.5.0/24 [120/2] via 199.6.13.1 00:00:04 S0/1
C 199.6.13.0/24 is directly connected to Serial0/1
R 200.0.0.0/24 [120/2] via 199.6.13.1 00:00:04 S0/1
R 201.100.11.0/24 [120/1] via 199.6.13.1 00:00:04 S0/1
C 204.204.7.0/24 is directly connected to Serial0/0
R 205.7.5.0/24 [120/2] via 199.6.13.1 00:00:04 S0/1
21
Document Page
R 210.93.105.0/24 [120/1] via 204.204.7.2 00:00:04 S0/0
R 219.17.100.0/24 [120/1] via 199.6.13.1 00:00:04 S0/1
C 223.8.151.0/24 is directly connected to FastEthernet0/0
Show arp:
Internet Address Physical Address Interface Age Expires
223.8.151.1 32-4C-D3-00-10-05 FastEthernet0/0- -
The above routing tables shows that they are working properly. The configuration may be redone
using MESH topology also but in that case the cost will be higher and security complexity will
be must higher. Though there is many possibility to modify the structure, Star will in top of the
list of preference.
22

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Task 4 :Be able to manage LAN infrastructures
4.1 Tools to Monitor LAN
There are different tools are available to monitor the LAN activity like we have use the tool.
They are:
Solarwinds Network Performance Monitor
Paessler PRTG
OpManager
Nagios Core and Nagios XI
Network Lab Simulator(CISCO)
Zenoss
Dynatrace
ConnectWise Automate
Zabbix
WhatsUp Gold
Below is the assessment of network monitoring tools
1. Visualization
2. Security
3. Alart
4. Multi vendor facility
5. Simulation
6. Analysis
4.2 Immunity of LAN from attack
23
Document Page
As our system, as it is constructed upon P2P network, any external request or access is
entertained by the servers established here. Now when the request is processed, local switch will
have the authority to prohibit this using Firewall. This technique also helps to maintain the traffic
through it. As influenced by Hills and Batchelor (2015) another advantage of our system using
Star network is the, the central or sectional hub/ switch is capable of storing or making backup of
the file and documents and act as a local cloud and if there any problem occurred such device
damage, a backup copy can be restored from the switch.
4.3 Improvement of LAN
This architecture can be improved in many ways.
Router capacity is one of the sensitive issues. To increase it means increase in safety.
Installing a Firewall one of the most effective method to avoid unnecessary traffic.
While connection, better cable helps to transmit and receive better and much data.
24
Document Page
References
Afanasyev, A., Burke, J., Zhang, L., Claffy, K., Wang, L., Jacobson, V., Crowley, P.,
Papadopoulos, C. and Zhang, B., 2014. Named data networking. ACM SIGCOMM Computer
Communication Review, 44(3), pp.66-73.
Ahmed, K.E. and Farag, M.M., 2014, December. Overloaded CDMA bus topology for MPSoC
interconnect. In ReConFigurable Computing and FPGAs (ReConFig), 2014 International
Conference on (pp. 1-7). IEEE.
Asthana, A., Benowitz, M.S. and Chandrashekhar, U., Alcatel-Lucent SA, 2016. Providing
dynamic reliability and security in communications environments. U.S. Patent 9,300,548.
Davis, J.B., EMC IP Holding Co LLC, 2018. PCI express fabric routing for a fully-connected
mesh topology. U.S. Patent Application 10/013,377.
Du, K.H., Tao, Z.J. and Zhang, L., International Business Machines Corp, 2018. Virtual
extensible lan intercommunication mechanism for multicast in networking. U.S. Patent
Application 15/198,367.
Hills, M. and Batchelor, G., 2015, July. Culturing defensive immunity: hardening psychological
targets against cyber attack. In European Conference on Cyber Warfare and Security (p. 95).
Academic Conferences International Limited.
Hu, T., Yi, P., Guo, Z., Lan, J. and Zhang, J., 2018. Bidirectional Matching Strategy for Multi-
Controller Deployment in Distributed Software Defined Networking. IEEE ACCESS, 6.
Jen, D., Meisel, M., Massey, D., Wang, L., Zhang, B. and Zhang, L., 2014. APT: A practical
tunneling architecture for routing scalability. In Solutions for Sustaining Scalability in Internet
Growth (pp. 60-82). IGI Global.
Jiang, R., 2015. A review of Network Topology.
Li, M., Qin, C. and Lee, P.P., 2015, July. CDStore: Toward Reliable, Secure, and Cost-Efficient
Cloud Storage via Convergent Dispersal. In USENIX Annual Technical Conference (pp. 111-
124).
25

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Quevedo, J., Guimarães, C., Ferreira, R., Corujo, D. and Aguiar, R.L., 2017. ICN as Network
Infrastructure for Multi-Sensory Devices: Local Domain Service Discovery for ICN-based IoT
Environments. Wireless Personal Communications, 95(1), pp.7-26.
Salinger, J., Bevilacqua, J. and Rahman, S., Comcast Cable Communications LLC, 2015. Digital
forward link in hybrid fiber-coax network. U.S. Patent Application 14/611,147.
Tripathi, N. and Hubballi, N., 2015, December. Exploiting DHCP server-side ip address conflict
detection: A dhcp starvation attack. In Advanced Networks and Telecommuncations Systems
(ANTS), 2015 IEEE International Conference on (pp. 1-3). IEEE
Yi, C., Abraham, J., Afanasyev, A., Wang, L., Zhang, B. and Zhang, L., 2014, September. On
the role of routing in named data networking. In Proceedings of the 1st ACM Conference on
Information-Centric Networking (pp. 27-36). ACM.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., Wang, L. and
Zhang, B., 2014. Named data networking. ACM SIGCOMM Computer Communication Review,
44(3), pp.66-73.
Zhang, L., Li, X.Y., Huang, W., Liu, K., Zong, S., Jian, X., Feng, P., Jung, T. and Liu, Y., 2014,
September. It starts with igaze: Visual attention driven networking with smart glasses. In
Proceedings of the 20th annual international conference on Mobile computing and networking
(pp. 91-102). ACM.
Zhang, M., Lehman, V. and Wang, L., 2017, May. Scalable name-based data synchronization for
named data networking. In INFOCOM 2017-IEEE Conference on Computer Communications,
IEEE (pp. 1-9). IEEE.
26
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]