LAN Technologies: Impact, Design, Implementation and Management
Verified
Added on 2023/05/29
|26
|5223
|104
AI Summary
This article discusses the impact of LAN technologies, critical analysis of network topologies, robustness of LAN, hierarchical network over LAN, and design, implementation, and management of LAN infrastructures. It also includes IP mapping and VLAN switch configuration for a hierarchical Star topology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
LOCAL AREA NETWORK ASSIGNMENT Student name: Student ID:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Task 1 :Understand the impact of LAN technologies.....................................................................3 1.1 Critical Analysis among the Network Topologies for choosing the best for Design............3 1.2 Robustness of LAN................................................................................................................7 1.3 Imposing Hierarchical Network over LAN for Security, Reliability & Performance...........8 Task 2 :Be able to design LAN infrastructures.............................................................................10 2.1 Design network infrastructure to fulfill the requirement of above scenario........................10 2.2 Evaluation of network components and design...................................................................13 Task 3 :Be able to implement LAN infrastructures.......................................................................16 3.1. Build and configure the entire network...............................................................................16 Task 4 :Be able to manage LAN infrastructures...........................................................................23 4.1 Tools to Monitor LAN.........................................................................................................23 4.2 Immunity of LAN from attack.............................................................................................23 4.3 Improvement of LAN...........................................................................................................24 References......................................................................................................................................25 2
Task 1 :Understand the impact of LAN technologies 1.1 Critical Analysis among the Network Topologies for choosing the best for Design In a large building, or in a business area or in an office, all the systems are connected using Local Area Network or LAN. In this section we will discuss about the analysis of the existing network topologies with their sound attributes. After analysis is done, we will consider the particular topology to be suitable for our design. Bus Topology This is most simple and widely used configuration where all the connecting devices are attached with a single bus which is terminated at each end by terminator resistor.Ahmed and Farag (2014), all the connected devices have equal access to the bus. It is very easy to install and the number of devices can be modified according to our need and this is dependent upon the terminal load. Fig-1: Bus Topology (Source: https://www.kullabs.com) Advantages: It is a small and less costly network. Length of cable required is very small. Configuration is lucid to build and understand and easy to modify. Disadvantages: Relatively slower for small cable length and greater load. 3
If any part of the cable creates any problem for data transmission, the whole system faces the similar problem. Ring Topology Another topology of importance is the Ring Topology. In this configuration, a ring of connection is formed so that every device meets their exactly two neighbor devices. This is created by a point-to-point link method. While data routing, the main server checks for the proper destination address and when it is matched, it drops.Jiang(2014) stated it has a basic unidirectional data transmission system but it can be made bi-directional using Dual Ring Topology architecture. Fig-2: Ring Topology (Source: https://www.kullabs.com) Advantages: Data transmission not affected by number of nodes Installation cost is lower. It can be modified easily as per our requirement. Disadvantages: If in this topology, any device fails, the whole system breaks down. It is difficult for troubleshooting. Star Topology 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
In this network architecture, each and every device is connected using Optical Fiber or Twisted Cable individually with the central hub which works as a data repeater. Fig-3: Star Topology (Source: https://www.kullabs.com) Advantages: Speed of data transmission is very high for individual connection. If any of the devices is failed, only that part affected but the rest part remains working. Disadvantages: The Central hub must be used with high enough capacity to undertake sufficient load. Maintenance cost is very high. Mesh Topology In this network architecture, Central hub and all the devices are interconnected. There are basically two models of Mesh, Routing model and Flooding model. Among the all,Davis(2018) stated it is the fully connected and robust network. It will be in such cases where interconnection of each device is required. 5
Fig-4: Mesh Topology (Source: https://www.kullabs.com) Advantages: It is secured and the fault can be diagnosed easily. Individual connection carries their respective data. Disadvantages: High length of wiring is required. Installation is difficult and fault finding is easy. These are the moderate discussion for comparing the available topologies. Let we sort out the main topics for our conclusion as below: Table-1: Formal comparison among Bus, Ring, star & Mesh ParametersBusRingStarMesh Dataflow Efficiency MoreModerateMoreHighest Cable LengthLessModerateMoreHighest SecurityLessLessHighModerate TrafficLessHighMediumNot Applicable RobustnessNoNoYesNo CostLowHighHighHigh FailureEasy to solveDifficult to solveEasy to solve but may be difficult if Hub fails Easy to solve and partially not dependent upon Hub So, according to our comparison and looking to our requirement, we can say for this particular architecture, we useStar Topologyas the devices like PC, Printers are connected to each 6
segment does not required to be interconnected but it is required to be connected with Central Hub. 1.2 Robustness of LAN As we are about to construct an entire network for our advantage, it need to be robust enough to face any difficulties like data overload, unethical attack etc. Thus we have chosen Star network topology. As it is a point-to-point connection directly in between device and Hub, a partial damage of a segment does not affect the entire system. In the same sense and view, if some device will face some external attack, only this particular device will be under threat. In our design methodology, if we use topology other than Star, the complexity and healthiness of the network both goes down. Let we see an comparative analysis of these four topologies where multisensory network will be used for networking (Quevedoet al. 2017) et Fig.5: Comparison of different topologies In this figure, we can clearly see that in a multisensory network, when the number of sensors is increased, Star topology works better there. In the similar way, when no of connection is increased, the efficiency is decayed in case of Bus & Ring and the complexity is increased in mesh network. But in case of Star topology, it will remain efficient for any of the instance which makes it Robust. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
To reach a good Quality of Service and having enough availability of data flow throughout the network securely, the central hub matters. If the number of connections is increased, surely, the capacity of the central hub will have to be maintained in such extent so that the data loss will not occur and this may an issue for all the topologies. When the traffic is greater like in peak hour, the Central Hub must be capable of accessing and handling the content of data more efficiently. If we take a look into this matter and precise it properly, surely Star network work better than any other topologies exists in market. 1.3 Imposing Hierarchical Network over LAN for Security, Reliability & Performance In individual LAN topology have their relevant advantages and disadvantages as discussed earlier. For a large constituting network, not a single topology will work perfectly. So, there is a need of combining them all or some of them taking their advantageous parts and designs, we can make a hierarchical network which will be more reliable and secured and obviously, a secured and reliable network work better. The performance enhancement of a hierarchical network is related with the following attributes. Security A single topology cannot provide a good security issue. Switches in can be designed with individual port security choices providing command over which gadgets are permitted to associate with system. In addition,Jenet al.(2014), there is another approach that makes it secure is the HTTP which is provided by its advanced version HTTS and controlled by system’s HTTP server or WEB server. Moreover, the hierarchy provided an integrated security as it passes through different layer to reach a device. Performance As the system is hierarchical, performance depends upon the intermediate switches. If the load is increased, if the load capability is higher for the switches to able to handle more devices, star topology works better.Asthanaet al.(2016) the intermediate hubs have also the capability to make a backup of data so that it can be reloaded when some system get break down. 8
Reliability Reliability is a very basic feature of hierarchical network. These configuration supports multi layered data transmission. So, for each layer,Liet al.(2015) stated the data or packet is being checked so that there is a reliable transmission of data routing may take place. For multi layer data routing, each and every hub can store the report of the data transmission. 9
Task 2 :Be able to design LAN infrastructures 2.1 Design network infrastructure to fulfill the requirement of above scenario In our network design, as described in the instruction, is given here in Fig.6 Fig.6: Requirement for the design To design the entire architecture, Network Lab Simulator of CISCO is used. A total of 121 Computers are used along with 4 Printers, 4 Servers for DNS/ Web/ E-Mail/ File Server purpose. They will be arranged in their respective cluster so that their inter connection will be diminished. ThestructurethatisusedistheHierarchicalTopologybased onStar.Thedesignand connections for every section are as follows: Finance: In Finance Section, we have 9 computers and 1 Printer connected in LAN. These architecture is implemented using STAR topology as shown below. They are not accessible to outside the department as they are directly deals with the local router. 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Fig.7: Finance Section The connection is made using Ethernet connection with Ethernet crossover cable. Te routing table for the Router connected is, Show IP Route: Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o – ODR IP Range: 1.1.1.0 – 1.1.1.9 Subnet Mask: 255.0.0.0 Topology: Star HR: HR Section consists of 4 computers and 1 printer and they are also connected in STAR topology with a similar routing table described as Finance. They are not accessible to outside the department as they are directly deals with the local router. The connection is made using Ethernet connection with Ethernet crossover cable. 11
Fig.8: HR Section IP Range: 1.1.2.0 – 1.1.2.4 Subnet Mask: 255.0.0.0 Topology: Star Design: A mass load is faced in the design section. There are 40 computers and 1 printer. Here the entire section is segmented into two parts, each consisting of 20 computers to minimize the load. Each segment is connected with native switch in STAR topology. They are not accessible to outside the department as they (both the switches) are directly deals with the local router. The connection is made using Ethernet connection with Ethernet crossover cable. Fig.9: Design Section IP Range: 1.1.3.0 – 1.1.3.40 12
Subnet Mask: 255.0.0.0 Topology: Star Sales: Lastly the Sales section introduces 68 computers. So there is a huge load. In that case there is a huge load and the entire section is divided into four sections, each containing 17 computers. Each subsection is controlled by local switch with STAR topology. Again these four switches are connected with a sectional router. The connection is made using Ethernet connection with Ethernet crossover cable. Fig.10: Design Section IP Range: 1.1.4.0 – 1.1.2.68 Subnet Mask: 255.0.0.0 Topology: Star 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2.2 Evaluation of network components and design Evaluation: As the design is made using Star topology and all the sections are holding the same infrastructure and their interconnection are also designed using te same, this particular structure is referred as Tree-Topology which is actually a hierarchical Star Topology As the sectional view, there is some individual switch; this connection is referred by VLAN or Virtual LAN or more specifically, Virtual Switch. This VLAN for one segment is shown below: Fig.11 VLAN Switch Configuration So, in our structure, there are the connection are established. We have checked in our simulation for the effectiveness of the LAN we have applied. In our design IP are set to define the PC and the printers. Let we see list of all assigned IP as in range fashion. In the preceding section we will list down the details for the IP Mapping. Section: “HR" HRC0 – HRC3IP = 201.100.011.001-201.100.011.005 Mask = 255.255.255.000 Gateway = 201.100.011.001-201.100.011.005 Section: “FINANCE" FC0 – C1IP = 199.006.013.001-199.006.013.009 14
Mask = 255.255.255.000 Gateway = 199.006.013.001 -199.006.013.009 Section: “DESIGN” DS0-DS40IP = 204.204.007.001 - 204.204.007.0040 Mask = 255.255.255.000 Gateway = 204.204.007.001 - 204.204.007.0040 Section: “SALES” SC0-SC68IP = 212.206.010.001 - 212.206.010.0068 Mask = 255.255.255.000 Gateway = 212.206.010.001 - 212.206.010.0068 Security & Applications: So, this architecture will route the data from the sectional segment to the LAN. As influenced by Tripathi and Hubballi(2015), they are assigned by individual IP, the possibility of IP conflict will be minimized and the another reason is that each and every section has its own gateway structure using Switch and corresponding Router who are connected in Star topology and moreover as the Tree Architecture, the Point-to-Point connection will be secured. Users & Scalability: In this structure, the total user than can work together is 121. Each having access to the switch and each computer is individually tracked by the local switch / router. Each local segment is connected with the external servers for DNS, EMAIL, FILE and WEB. So, all the computers and the local printers have a access to the cloud but for user security and scalability, no two computers are directly connected. So, computers of a department cannot be accessed by external department. But the domain server can access the individual computers if they want to do so. 15
Task 3 :Be able to implement LAN infrastructures 3.1. Build and configure the entire network In this section we will discuss and show the complete interconnection of the computers with local switch / router and the connections among the routers that are controlling segments. Below the configuration is demonstrated. Fig.12: Complete Architecture of LAN Configuration: In our configuration, all the segment switch are connected to the computers using Fast Ethernet connection. We have used DNS Server, WEB Server, EMAIL Server andFILE Server which are 16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
connected with respective router of the system. The servers having their gateway routing address as follows: DSN Server:6.6.8.4 (IPv4) WEB Server:8.8.2.2 (IPv4) EMAIL Server:214.42.103.78(IPv4) FILE Server:201.112.165.31 (IPv4) All the switches are secured with the technique such that, the accessibility of the devices depends upon the access permission of the router. When a device need to be access by external agents, it will be not accessible until and unless the provider will give or permit the access. Technology & Security: The servers are altogether connected to a center. Every one of the information goes through the center point. At the point when a packet goes to the center point it moves that bundle to every one of the switches connected through the center yet just a single switch at any given moment effectively transmits it. Information on a star organize surpasses through the center point before proceeding to its objective. As stated bySalingeret al.(2015), distinctive kinds of links are utilized to connect PCs, for example, twisted pair, coaxial link and fiber optics. The most well- known link media being used for star topologies is unshielded or protected wound match copper cabling. One end of the link is connected neighborhood card while the opposite side is associated with the center point. 3.2 Review of Configuration In this section, we first will the IP Ranges and mapping of IP for all devices in each sections as a simulation result of our design. Section “HR”: 17
SC 63IP: 212.206.010.064MASK: 255.255.255.0Gway: 212.206.010.064 SC 64IP: 212.206.010.065MASK: 255.255.255.0Gway: 212.206.010.065 SC 65IP: 212.206.010.066MASK: 255.255.255.0Gway: 212.206.010.066 SC 66IP: 212.206.010.067MASK: 255.255.255.0Gway: 212.206.010.067 SC 67IP: 212.206.010.068MASK: 255.255.255.0Gway: 212.206.010.068 SC 68IP: 212.206.010.069MASK: 255.255.255.0Gway: 212.206.010.069 Test Report for Servers Here is the most important part is to test the server and generate the report. Here we have demonstrated the routing table so that it can be understood that they are working properly. DSN Server with ARP : R 192.5.5.0/24 [120/1] via 200.0.0.2 00:00:04 S0 R 199.6.13.0/24 [120/2] via 210.93.105.1 00:00:00 E0 C 200.0.0.0/24 is directly connected to Serial 0 R 201.100.11.0/24 [120/1] via 200.0.0.2 00:00:04 S0 R 204.204.7.0/24 [120/1] via 210.93.105.1 00:00:00 E0 R 205.7.5.0/24 [120/1] via 200.0.0.2 00:00:04 S0 C 210.93.105.0/24 is directly connected to Ethernet 0 R 219.17.100.0/24 [120/2] via 200.0.0.2 00:00:04 S0 R 223.8.151.0/24 [120/2] via 210.93.105.1 00:00:00 E0 Show arp: Internet AddressPhysical AddressInterfaceAgeExpires 210.93.105.225-F7-8D-00-10-04 Ethernet 0 -- EMAIL Server wit ARP: C 192.5.5.0/24 is directly connected to Ethernet 0 R 199.6.13.0/24 [120/1] via 201.100.11.2 00:00:03 S0 C 200.0.0.0/24 is directly connected to Serial 1 C 201.100.11.0/24 is directly connected to Serial 0 R 204.204.7.0/24 [120/2] via 200.0.0.1 00:00:02 S1 20
C 205.7.5.0/24 is directly connected to Ethernet 1 R 210.93.105.0/24 [120/1] via 200.0.0.1 00:00:02 S1 R 219.17.100.0/24 [120/1] via 201.100.11.2 00:00:03 S0 R 223.8.151.0/24 [120/2] via 201.100.11.2 00:00:03 S0 Show arp: Internet AddressPhysical AddressInterfaceAgeExpires 192.5.5.1FA-18-AE-00-10-04 Ethernet 0 -- 205.7.5.1E4-8E-AE-00-10-05 Ethernet 1 -- FILE Server with ARP: R 192.5.5.0/24 [120/1] via 201.100.11.1 00:00:03 S1 C 199.6.13.0/24 is directly connected to Serial 0 R 200.0.0.0/24 [120/1] via 201.100.11.1 00:00:03 S1 C 201.100.11.0/24 is directly connected to Serial 1 R 204.204.7.0/24 [120/1] via 199.6.13.2 00:00:00 S0 R 205.7.5.0/24 [120/1] via 201.100.11.1 00:00:03 S1 R 210.93.105.0/24 [120/2] via 199.6.13.2 00:00:00 S0 C 219.17.100.0/24 is directly connected to Ethernet 0 R 223.8.151.0/24 [120/1] via 199.6.13.2 00:00:00 S0 Show arp: Internet AddressPhysical AddressInterfaceAgeExpires 219.17.100.1F3-EC-85-00-10-04 Ethernet 0 -- WEB Server with ARP: R 192.5.5.0/24 [120/2] via 199.6.13.1 00:00:04 S0/1 C 199.6.13.0/24 is directly connected to Serial0/1 R 200.0.0.0/24 [120/2] via 199.6.13.1 00:00:04 S0/1 R 201.100.11.0/24 [120/1] via 199.6.13.1 00:00:04 S0/1 C 204.204.7.0/24 is directly connected to Serial0/0 R 205.7.5.0/24 [120/2] via 199.6.13.1 00:00:04 S0/1 21
R 210.93.105.0/24 [120/1] via 204.204.7.2 00:00:04 S0/0 R 219.17.100.0/24 [120/1] via 199.6.13.1 00:00:04 S0/1 C 223.8.151.0/24 is directly connected to FastEthernet0/0 Show arp: Internet AddressPhysical AddressInterfaceAgeExpires 223.8.151.132-4C-D3-00-10-05 FastEthernet0/0-- The above routing tables shows that they are working properly. The configuration may be redone using MESH topology also but in that case the cost will be higher and security complexity will be must higher. Though there is many possibility to modify the structure, Star will in top of the list of preference. 22
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Task 4 :Be able to manage LAN infrastructures 4.1 Tools to Monitor LAN There are different tools are available to monitor the LAN activity like we have use the tool. They are: Solarwinds Network Performance Monitor Paessler PRTG OpManager Nagios Core and Nagios XI Network Lab Simulator(CISCO) Zenoss Dynatrace ConnectWise Automate Zabbix WhatsUp Gold Below is the assessment of network monitoring tools 1.Visualization 2.Security 3.Alart 4.Multi vendor facility 5.Simulation 6.Analysis 4.2 Immunity of LAN from attack 23
As our system, as it is constructed upon P2P network, any external request or access is entertained by the servers established here. Now when the request is processed, local switch will have the authority to prohibit this using Firewall. This technique also helps to maintain the traffic through it. As influenced byHills and Batchelor(2015) another advantage of our system using Star network is the, the central or sectional hub/ switch is capable of storing or making backup of the file and documents and act as a local cloud and if there any problem occurred such device damage, a backup copy can be restored from the switch. 4.3 Improvement of LAN This architecture can be improved in many ways. Router capacity is one of the sensitive issues. To increase it means increase in safety. Installing a Firewall one of the most effective method to avoid unnecessary traffic. While connection, better cable helps to transmit and receive better and much data. 24
References Afanasyev,A.,Burke,J.,Zhang,L.,Claffy,K.,Wang,L.,Jacobson,V.,Crowley,P., Papadopoulos, C. and Zhang, B., 2014. Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), pp.66-73. Ahmed, K.E. and Farag, M.M., 2014, December. Overloaded CDMA bus topology for MPSoC interconnect.InReConFigurableComputingandFPGAs(ReConFig),2014International Conference on(pp. 1-7). IEEE. Asthana, A., Benowitz, M.S. and Chandrashekhar, U., Alcatel-Lucent SA, 2016. Providing dynamic reliability and security in communications environments. U.S. Patent 9,300,548. Davis, J.B., EMC IP Holding Co LLC, 2018. PCI express fabric routing for a fully-connected mesh topology. U.S. Patent Application 10/013,377. Du, K.H., Tao, Z.J. and Zhang, L., International Business Machines Corp, 2018. Virtual extensiblelanintercommunicationmechanismformulticastinnetworking.U.S.Patent Application 15/198,367. Hills, M. and Batchelor, G., 2015, July. Culturing defensive immunity: hardening psychological targets against cyber attack. In European Conference on Cyber Warfare and Security (p. 95). Academic Conferences International Limited. Hu, T., Yi, P., Guo, Z., Lan, J. and Zhang, J., 2018. Bidirectional Matching Strategy for Multi- Controller Deployment in Distributed Software Defined Networking. IEEE ACCESS, 6. Jen, D., Meisel, M., Massey, D., Wang, L., Zhang, B. and Zhang, L., 2014. APT: A practical tunneling architecture for routing scalability. In Solutions for Sustaining Scalability in Internet Growth (pp. 60-82). IGI Global. Jiang, R., 2015. A review of Network Topology. Li, M., Qin, C. and Lee, P.P., 2015, July. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal. In USENIX Annual Technical Conference (pp. 111- 124). 25
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Quevedo, J., Guimarães, C., Ferreira, R., Corujo, D. and Aguiar, R.L., 2017. ICN as Network Infrastructure for Multi-Sensory Devices: Local Domain Service Discovery for ICN-based IoT Environments. Wireless Personal Communications, 95(1), pp.7-26. Salinger, J., Bevilacqua, J. and Rahman, S., Comcast Cable Communications LLC, 2015. Digital forward link in hybrid fiber-coax network. U.S. Patent Application 14/611,147. Tripathi, N. and Hubballi, N., 2015, December. Exploiting DHCP server-side ip address conflict detection: A dhcp starvation attack. In Advanced Networks and Telecommuncations Systems (ANTS), 2015 IEEE International Conference on (pp. 1-3). IEEE Yi, C., Abraham, J., Afanasyev, A., Wang, L., Zhang, B. and Zhang, L., 2014, September. On the role of routing in named data networking. In Proceedings of the 1st ACM Conference on Information-Centric Networking (pp. 27-36). ACM. Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., Wang, L. and Zhang, B., 2014. Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), pp.66-73. Zhang, L., Li, X.Y., Huang, W., Liu, K., Zong, S., Jian, X., Feng, P., Jung, T. and Liu, Y., 2014, September. It starts with igaze: Visual attention driven networking with smart glasses. In Proceedings of the 20th annual international conference on Mobile computing and networking (pp. 91-102). ACM. Zhang, M., Lehman, V. and Wang, L., 2017, May. Scalable name-based data synchronization for named data networking. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE (pp. 1-9). IEEE. 26