Local Area Networking Technologies: Design, Implementation, and Management

Verified

Added on  2024/05/31

|59
|6776
|488
AI Summary
This report explores the design, implementation, and management of Local Area Networks (LANs). It critically evaluates different LAN technologies, analyzes traffic-intensive services, and discusses network security concerns. The report includes a detailed design of a LAN infrastructure for a hypothetical organization, followed by its implementation and testing. Finally, it examines troubleshooting techniques and performance evaluation methods for LANs.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Local Area Networking Technologies
0

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction:...............................................................................................................................4
LO1 - Understand the impact of LAN technologies....................................................................5
1.1 Critically evaluate different LAN technologies............................................................5
1.2 critically analyse traffic intensive services and their performance...........................12
1.3 discuss LAN concerns and make recommendations to sustain network security,
reliability and performance..................................................................................................15
LO2 - Be able to design LAN infrastructures............................................................................18
2.1 design a LAN infrastructure to meet a given requirement.......................................18
2.2 critically evaluate the suitability of LAN components...............................................20
LO3 - Be able to implement LAN infrastructures.....................................................................21
3.1 build and configure a LAN (including services) to meet a given requirement..........21
3.2 implement network security on a LAN......................................................................32
3.3 critically review and test a LAN.................................................................................35
LO4 - Be able to manage LAN infrastructures..........................................................................42
4.1 monitor and troubleshoot a LAN..............................................................................42
4.2 resolve LAN issues to improve security, reliability and performance.......................46
4.3 critically evaluate the performance of a LAN............................................................48
Conclusion................................................................................................................................53
Reference:................................................................................................................................54
1
Document Page
List of figure:
Figure 1: Local Area Network.....................................................................................................5
Figure 2: Wired LAN Network....................................................................................................6
Figure 3: Wireless LAN network.................................................................................................6
Figure 4: Virtual Local Area Network.........................................................................................7
Figure 5: UTP..............................................................................................................................8
Figure 6: Coaxial cable................................................................................................................9
Figure 7: STP...............................................................................................................................9
Figure 8: Repeater....................................................................................................................10
Figure 9: Switch........................................................................................................................10
Figure 10: Router......................................................................................................................10
Figure 11: Bridges.....................................................................................................................11
Figure 12: Hubs.........................................................................................................................11
Figure 13:Video-on-Demand....................................................................................................13
Figure 14: Voice-over-IP...........................................................................................................13
Figure 15: Audio and video streaming.....................................................................................14
Figure 16: Firewalls...................................................................................................................16
Figure 17: Access Control Lists.................................................................................................16
Figure 18: star topology...........................................................................................................18
Figure 19: Proposed LAN design..............................................................................................19
Figure 20: Given LAN Network design view Representation...................................................22
Figure 21:Network design Metadata 1....................................................................................23
Figure 22: IP routing on the router..........................................................................................24
Figure 23:Network design Metadata 2....................................................................................25
Figure 24:Network design Metadata 3....................................................................................26
Figure 25:Network design Metadata 4....................................................................................27
Figure 26:Network design Metadata 5....................................................................................28
Figure 27: DNS and HTTP protocols implementation..............................................................28
Figure 28: Implemented LAN network design.........................................................................29
Figure 29: DNS Protocols Configuration in the LAN Network:.................................................30
Figure 30:DHCP Protocols Configuration in the LAN Network:...............................................31
2
Document Page
Figure 31: VLANs......................................................................................................................32
Figure 32: VLANs configuration................................................................................................32
Figure 33: Access Control List implementation........................................................................33
Figure 34: configuration of the Router....................................................................................34
Figure 35: routing table details................................................................................................34
Figure 36: Test plan one...........................................................................................................36
Figure 37: Test plan two...........................................................................................................37
Figure 38: Test plan three........................................................................................................37
Figure 39: Test plan four..........................................................................................................38
Figure 40: Test plan five...........................................................................................................39
Figure 41: Test plan six.............................................................................................................39
Figure 42: Test plan seven........................................................................................................40
Figure 43: Test plan eight.........................................................................................................40
Figure 44: test plan nine...........................................................................................................41
Figure 45: Test plan ten............................................................................................................41
Figure 46: Ping command 1......................................................................................................42
Figure 47: Ping command 2......................................................................................................43
Figure 48: Ping command 3......................................................................................................43
Figure 49: Ping command 4......................................................................................................44
Figure 50: Path ping command................................................................................................45
Figure 51: PDU list showing failed connection between inter department............................48
Figure 52: PDU list showing successful connection between IT manager and department. . .49
Figure 53: Ping Test..................................................................................................................49
Figure 54: ACL Filters................................................................................................................50
Figure 55: Control Window......................................................................................................50
Figure 56: QoS Router through PDU........................................................................................51
List of Table:
Table 1: the difference between wired and wireless Network..................................................5
Table 2: compare between Wifi IEEE 802.11 and Ethernet IEEE 802.3.....................................8
Table 3: IP precedence Table...................................................................................................12
3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction:
LAN referred to as Local Area Network. It is an average geographical Network that offers
their facility in the university, college, small company, office, or firm. Documents and
resources are shared on the network for the Network communication. FootFall Field
Marketing Corporation desires a network to be able to provide a connectivity between their
group of workers and workplace. Here, I could scheme the LAN network for the given
company. There are 4 parts in the report.
The first part of report will give an explanation for LAN community with the wireless and
wired network. Then, the VLAN, intensive services of traffic, device of LAN community and
cable could be defined that beneficial for the Given LAN Network. Given LAN Network will
be deliberate in line with business enterprise needs and might be envisioned of the device
in the second part. LAN Network can be implemented and configured in the third parts. There
can be a conversation about the network protection after which trying out of the
connection of network is performed. Troubleshooting and Monitoring procedure might be
well-defined and could be solved reliability, safety, and performance problems in the fourth
parts.
4
Document Page
LO1 - Understand the impact of LAN technologies
1.1 Critically evaluate different LAN technologies
Extends the computer network is a small geographical area, Knows as the local area
network. It connected the workplace computer, network device, and workstations to share
the device and data in the network.
Figure 1: Local Area Network
Source: (Webclasses, 2018).
Table 1: the difference between wired and wireless Network
Wireless LAN network Wired LAN Network
It gives high –security because singles
intercept is not allowed.
There is allowed the singles intercept
which gives low-level security in the
network
It gives high-speed data transmission It gives less speed
It plays and plugs the network It covers the limit area in the network.
It cheap network. It is a costly network
5
Document Page
Figure 2: Wired LAN Network
Source: (Rane & Bohn, 2005).
Figure 3: Wireless LAN network
Source: (Rane & Bohn, 2005).
VLANs
VLAN referred as Virtual Local Area Network which is permitted the user split-up in the distinct
network sections because of the security reason.it supports network configuration and connectivity
of remote device of the network.
Advantage:
ï‚· It is configuring and implementation price low due to network Flexibility
ï‚· It able to manage and control the network traffic.
ï‚· It gives the network security because it supports ACLs, Authentication, and Authentication
during the network access.
ï‚· It created the segmentation of network according to user requirements.
6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 4: Virtual Local Area Network
Source: (Team, n.d.)
VLAN Network Types
Data Network: it is managed the user created traffic in the network. It splits voice traffic and
data traffic. It mainly focused on the data traffic.
Default Network: After the bootup process, Switch ports are worked as default VLAN that
provisions the domain of broadcast. It provides the device connection.
Management Network: it is managed by the network capabilities on the switch. It used SSH,
Telnet, SNMP, or HTTP for management. The out-of-box configuration is supported by
Management VLAN.
Native Network: it used 802.1Q trunk ports. It managed the network untagged traffic. For
the untagged traffic, Native VLAN uses an identifier. The identifier is able to manage
inheritance LAN situations.
Voice Network: it managed the voice transmission quality on the switch, Cisco IP phone,
and PC. There are needs following requirements such as
ï‚· Latency is fewer than 15-mile sec in the LAN network.
ï‚· It accomplishes the network bandwidth for the quality
ï‚· Voice data is a priority of the network during the transmission
7
Document Page
Wi-Fi IEEE 802.11: systems administration used IEEE 802.11 standard because it supports
the remote system on the LAN network. It proceeds to an explosion at Service Quality,
administration security, remote systems and Media Access Control
Ethernet IEEE 802.3: it is supported by the Wired LAN network. it characterized MAC layer
and physical layers. CSMA/CD techniques are exploited by the network. It impacts the
physical connotation among hubs on fibre wire and copper wire.
Table 2: compare between Wifi IEEE 802.11 and Ethernet IEEE 802.3
LAN interconnecting media
UTP: UTP referred as an unshielded twisted pair which supports data cabling that is 5 levels.
Data and voice are graded by the UTP. It is easy to install in the network so UTP cabling is
low price.
Figure 5: UTP
8
Document Page
Source: (Garrison, 2016)
Coaxial cable: it is used as communicating media in the network. It enclosed 2
corresponding conductors. Its centre conductor creates with help of stranded and solid wire
martial such as the copper wire. It codded with help of non-conductive materials.
Figure 6: Coaxial cable
Source: (Rouse, 2015).
STP: STP referred as a shielded twisted pair. It provides the secure communication because
it gives the voice single security form electromagnetic and radio frequency interference. It is
complex to install in the network so STP cabling is costly.
Figure 7: STP
Source: (Garrison, 2016)
Data Communication Equipment
LAN network used the Data Communication Equipment such as Bridges, Repeater, Switch,
Hubs, and Repeater.
9

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Repeater: it worked on the PHYSICAL layer. Repeater decreases distance boundaries
throughout the transmission media. All farm is frontward short of filtering ability.
Figure 8: Repeater
Source: (Sadhukha, 2013)
Switch: it is a Physical device which performance depends on the bandwidth of the network.
It gives network device connective.
Figure 9: Switch
Source: (Sadhukha, 2013)
Router: it is devices that are used for network device connectivity. The router table is
managed by the Router that contains packets address such a source and destination address
Figure 10: Router
Source: (Sadhukha, 2013)
Bridges: it worked on the physical layer and data layer as network physical devices. Frame
holds PHYSICAL addresses and MAC addresses of source and destination place which is
checked by the Bridges.
10
Document Page
Figure 11: Bridges
Source: (Sadhukha, 2013)
Hubs: it gives central point connection on the media segments. It is two types such as
Passive hub and Active Hub. Hub port is used for network cable plug-in.
Figure 12: Hubs
Source: (Sadhukha, 2013)
11
Document Page
1.2 critically analyse traffic intensive services and their performance
QoS of LAN Network:
QoS service is implemented on the Data link layer. It managed the network bandwidth and
traffic prioritization because it helped to reduce network delay. Scheduling, Cost of Service,
marking Classification, and policing, are the QoS service factor that is also managed Network
Delay.
Implementation of QoS:
IP precedence: it gives the precedence of the network service. For the service precedence, it
used 3-bit binary number representation. Higher priority services are configured in the
network.
Table 3: IP precedence Table
DSCP: DiffServ field uses the DSCP (Differentiated Service Code Point) as a significant bit
that accomplishes traffic of the network which are needs for the QoS of the network. A
scalable and simple mechanism uses for the implement of DSCP on the network because it
provides low-latency to web traffic and serious network traffic.
802.1q frame tagging is a standard for the VLAN tagging that offers network protocol and
interoperability. It uses as inter_ switch Link that compressed the FCS and ISL header.
Video-on-Demand
VoD operates on the network cable. The network database contains large video warehouse
for VoD because it’s a multimedia type arrangement. It is responsible to give high broadcast
12

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
speed in the grid for the set-up box, video servers, Transmission protocols and Audio/Video
Standards.
Figure 13: Video-on-Demand
Source: (Wowza, n.d.).
Voice-over-IP:
It uses for voice communications during broadcast conferences. The VoIP is used in different
sectors like internet Protocol, Broadband telephone, internet telecommunication and
broadband telephone service. The VoIP System is responsible to manage the protocols at
the time of communication, set-up and tear-down of phone calls.
Figure 14: Voice-over-IP
Source: (ANGRY DOG,2009)
Audio and video streaming
Streaming is the type of procedure in the network which is responsible to deliver
multimedia data like image, video and audio. The document does not take a place on the PC
or laptops at the time of Streaming system however guaranteed record does not download.
13
Document Page
Broadband associations are utilized by the video and sound streaming which improves the
data transfer capacity. Video and Audio streaming has two types, for example,
ï‚· Streaming of Inherently
ï‚· Non-streaming of inherently
Figure 15: Audio and video streaming
Source: (Lcdracks, 2018).
14
Document Page
1.3 discuss LAN concerns and make recommendations to sustain
network security, reliability and performance
Latency, Throughput, Packet Loss, Bandwidth, and Jitter are the main element that
procedures LAN Performance.
Latency: Latency noted the Network put off which impacts the performance of Network.
Latency normally computes in the msec so it commonly 10ms -20ms inside the given LAN
Network. Round trip delays are used in the Two-way communication within the TCP/ IP
Network because acknowledgement sign is needed for the source.
Bandwidth: It influences the Network overall performance. Data traffic and data flow are
managed by the network Bandwidth that reduced network issue and price. In the network,
there is occurred the bottlenecks problem which reduced the performance of the network.
PRTG bandwidth is used for the long-standing result in the network.
Jitter: it computes the time variance of packets between arrival times and inters time. In
the network, Jitters issue arise due to VoIP and Voice load traffic. It reduced the
performance of the network. LAN network supports the packet switched networks that are
needed for network communication. For the network communication, the network needs
TCP/IP Protocol which occurred the Jitter issue.
Packet Loss: it is measure factor which decreases the performance due to loss of packet
before receive at the destination place. Router performance, Faulty Cabling, Link
congestion, Device Software insects, Hardware, Firewall, switch, and hub are the reason for
the Packet Loss (Hurley,2014).
Throughputs: It is tested inside the community what a number of statistics packets are
obtained and sent inside the unique time durations. It checked the satisfactory packets
which might be received or sent. The window of TCP Congestion are impacted by
Throughput
Network Security: Firewalls, ACLs, and VLANs are an aspect for protection in the LAN
network.
15

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Firewalls are safeguarded in the network that instigated on device hardware and router for
the network security. It gives the security form the virus, malware, and trons. Firewalls are
used as network filter that works on network boundaries and filters packets.
Figure 16: Firewalls
Source: (Robotics, 2018)
VLANs manipulate the community get right of entry to. Untagged visitors are managed by
the VLANs within the inner area. Elective VLAN and trusted VLAN occur the Untagged
visitors. Broadcast area and physical area need the VLANs for the security purpose.
Access Control Lists manage the information glide at the Network device interface. Switch
and Router use the ACL which forbids or permitted information go with the flow inside the
community. ACL is also managed unauthorized access in the network community.
Figure 17: Access Control Lists
Source: (Wilson,2017)
16
Document Page
M1:
Proposed LAN is designed for wireless and wired techniques. wired techniques used
Ethernet IEEE 802.3 standards and wireless techniques used Wi-Fi IEEE 802.11.there are
also explain the traffic intensive services such as video streaming, Audio streaming, VoIP,
and Video on demand. IP precedence, 802.1q frame tagging, and DSCP are QoS service. I
have achieved M1 in 1.1 and 1.2 parts.
17
Document Page
LO2 - Be able to design LAN infrastructures
2.1 design a LAN infrastructure to meet a given requirement
LAN infrastructure is deliberated for the given business using Cisco Packet Tracer tool. The
organization contains three floors with five departments which have 28 staffs. Network
infrastructure uses DHCP address, STP design, and VLANs for the security terms. Here, I have
explained such useful term such as
IP Addressing: it is the unique address of network device which is implemented on the
TCP/IP network. IP Addressing are designed with the help of Host ID and Network ID. It is
binary number representative of address.
Sub-netting: LAN network contains host segment and network segment. It is part of a single
network which divides into small subnets or sub-networks (Dowd, 2017).
Topology: I have used the star topology in the network because it is easy to install and low
price topology. It needs a central point connection.
Figure 18: star topology
Source: (Shekhar, 2016)
18

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 19: Proposed LAN design
19
Document Page
2.2 critically evaluate the suitability of LAN components
Here, I have critically estimated the LAN components (cables, topology, and switch and
router) for the given organization network.
Particular switch/router
Star topology
FootFall Field Marketing organization use the star topology for the Network design because
it gives the number of advantage to an organization such as
ï‚· It is easy configuration and installation due to less cabling in the network.
ï‚· It is less costly for the organization because of a network device connected to the
single hub.
ï‚· It is easily finding the fault and remove from the network
ï‚· It is robustness topology which single failure does not affect the network (Black,
2016).
Coaxial cables
I have used the Coaxial cables for FootFall Field Marketing organization of the network
design because it is used for the data transmission for the long and short distance so Coaxial
cables beneficially for the organization. It is easy to modify, installed in the network. Coaxial
cables are cheap for the organization with the good bandwidth, and channel capacity. It has
noise immunity due to less error rate.
M2: Star techniques, Coaxial cables with DHCP methods are used to design the given LAN
network. VLANs Configuration, DNS server, and DHCP configuration are also instigated in
the network. The network also contained a database, cables, Router, web server, and
switch. I have achieved M2 in 2.1 and 2.2 parts.
20
Document Page
LO3 - Be able to implement LAN infrastructures
3.1 build and configure a LAN (including services) to meet a given
requirement
FootFall Field Organization need a LAN network for the as Sales and Marketing, HR, Finance,
customer service and IT support department connective which is located on different three
floors. The organization has 28 computer system for their staff which are connected to the
network with the help of VoIP, Router, Web server, Switch, and IP routing (v4/v6). The
network is designed on the Cisco Packet Tracer platform. There is a different type of
communication devices such as Wireless Access Points, Cable Connectors, cabling, Network
medium, Switch, Network software, and router.
Given LAN Network design view Representation
The organization needs a LAN network for the connectivity between the different
department and same departments. It is a 3-floor organization with 28 computer system in
different departments such as Sales and Marketing, HR, Finance, customer service and IT
support which are connected with DHCP server, router, switch, web server, and VLANs. First
and second floor contained nine PC and the third floor holds 10 PC.
21

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 20: Given LAN Network design view Representation
Network design Metadata
22
Document Page
Figure 21: Network design Metadata 1
23
Document Page
Figure 22: IP routing on the router
24

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 23: Network design Metadata 2
25
Document Page
Figure 24: Network design Metadata 3
26
Document Page
Figure 25: Network design Metadata 4
27

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 26: Network design Metadata 5
DNS and HTTP protocols implementation
Figure 27: DNS and HTTP protocols implementation
Implemented LAN network design:
28
Document Page
Cisco Packet Tracer is a network designed tool for given LAN network. Organization network
contains a switch, VLANs, Router, DHCP server, router, and Computer. The network is
designed for the three-floor office which contains a number of departments such as Sales
and Marketing, HR, Finance, customer service and IT support. The organization needs a
network for the communication and data sharing.
Figure 28: Implemented LAN network design
DNS Protocols Configuration in the LAN Network:
For the security purpose, I have configured the DNS Protocols in the LAN network. It
managed the unauthorized Access in the network.
29
Document Page
Figure 29: DNS Protocols Configuration in the LAN Network:
DHCP Protocols Configuration in the LAN Network:
DHCP Protocols are used by the DHCP server. It allocated the unique IP address and network
parameters configuration in the network device (study, 2016). Below, I have shown the
DHCP Protocols Configuration in the LAN Network:
30

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 30:DHCP Protocols Configuration in the LAN Network:
31
Document Page
3.2 implement network security on a LAN
The organization needs a LAN network for the data sharing and communication so network
contained sensitive info which needs the security form the attackers and unauthorized
access. For the security purpose, I have implemented VLANs and Access Control List in the
network that gives high-level security for the network during the data sharing and
communication
Virtual Local Area Network (VLANs):
Here, I have Configured the VLANs Network which exploits the wireless Internet for the
security purpose in the Organization LAN network.it manages the network traffic and does
not allow traffic transmission between network because it violates network security.
Network communication is supported by VLANs so it is implemented on the communication
device such as network router. It distributed the precarious traffic due to security purpose.
Here, I have shown the VLAN creation with their port assign
Figure 31: VLANs
32
Document Page
Figure 32: VLANs configuration
Access Control List (ACL):
ACLs noted get admission to the clear out packets with the aid of the consumer to allow or
deny Internet Protocols packets from exact interfaces. In the given LAN network, allow
mentions to permit the site visitors and Deny mentions to Chunk the visitors. It holds set of
policies which can be wanted for both deny or allow consumer access. It is workings as
community filter that utilized by the routers and switches for statistics flow allow and
forbidden statistics (out or into ) on the interface of the network that offers network safety.
During the safety, the records glide is in comparison with defined benchmarks inside the in
the ACL later records flow is authorized or forbidden
33

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 33: Access Control List implementation
The configuration of the Router:
The router is searched out the best path for the packet transmission. It selected the short
path. Routers are configured in the network for the data flow with the selected path and
provide the fast communication (Certificationkits , 2017). It monitoring and controlled the
network traffic and managed the unauthorized access to security.
Figure 34: Configuration of the Router
34
Document Page
Figure 35: routing table details
35
Document Page
3.3 critically review and test a LAN
Here, I have discussed the test plan for the given network that checks network performed
according to user requirements or not.
S.No. Test Plan Expected Result Actual result Remark
1 Remote login by the user The user should be
able to access the
system remotely
User login the
system remotely
Successful
2 configuration of SSH It would be offered
the security to the
network.
Network permitted
to access only legal
user
Successful
3 Password protection on the
router
The router should be
protected with a
password
Router protected
with a password
Successful
4 Password protection on the
Switch
The switch should be
protected with a
password
Switch protected
with a password
Successful
5 Ping test IT manager should
access all pc
IT manager access
all pc
Successful
6 Ping test Two different
departments should
be not accessed the
PC
The
interconnection
between
departments does
not support.
Successful
7 Ping test The same department
should be accessed
The
interconnection
Successful
36

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the PC between
department
support.
8 PDU It should be shown all
failed connection in
the network
Display the list of
all failures
connection.
Successful
9 HTTP server and DNS LAN should be
Enclosed DNS server
and Http
DNS server and
Http instigated on
the LAN
Successful
10 IP address Network device IP
address should be
unique.
Device IP address is
unique.
Successful
Figure 36: Test plan one
37
Document Page
Figure 37: Test plan two
Figure 38: Test plan three
38
Document Page
Figure 39: Test plan four
39

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 40: Test plan five
Figure 41: Test plan six
40
Document Page
Figure 42: Test plan seven
Figure 43: Test plan eight
41
Document Page
Figure 44: test plan nine
Figure 45: Test plan ten
42

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO4 - Be able to manage LAN infrastructures
4.1 monitor and troubleshoot a LAN
Here, I have explained different type of the troubleshoot command and their function which
are used in given organization network design.
Ping: It is a command that is run on the Command Prompt. It checks the path from the
source device to the destination computer. Commonly it used for communication
verification process over one network with another network device or computer. ICMP
(Internet Control Message Protocol) sent to destination computer as Echo Request
messages and source is waiting for a reply. It is ping command approach.
The syntax of Ping Command
ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [-w timeout] [-R] [-S
srcaddr] [-p] [-4] [-6] target [/?]
The syntax is case sensitive.
Figure 46: Ping command 1
43
Document Page
Figure 47: Ping command 2
Figure 48: Ping command 3
44
Document Page
Figure 49: Ping command 4
Path ping: It gives information about network loss and network latency in-between hops
from source to destination. pathping is sent a number of Echo Request messages to the
router which is used between source and destination over given period of time and
calculates returned packets from the router as result. It showed the packet loss degree of
the particular router (Plett, 2017).
Syntax of Path ping Command
pathping [/n] [/h] [/g <Hostlist>] [/p <Period>] [/q <NumQueries> [/w <timeout>] [/i
<IPaddress>] [/4 <IPv4>] [/6 <IPv6>][<TargetName>]
command is case sensitive.
45

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 50: Path ping command
Tracert: It is a command of Command Prompt that showed the path of the packet from
source to destination. It also helps find packet loss on the path. It is applied to network
router and switches (fisher, 2018).
The syntax of Path ping Command
tracert [-d] [-h MaxHops] [-w TimeOut] [-4] [-6] target [/?]
The command is case sensitive.
ipconfig: it is a command line tool that is managed by the network connections on the
machines. It showed current configuration values of TCP/IP network and refreshed DNS
(Domain Name System) and DHCP (Dynamic Host Configuration Protocol) settings. It
contains network devices IP address information
.
46
Document Page
4.2 resolve LAN issues to improve security, reliability and performance
Here I have explained the issue and their solution which faced during the network
implementation and testing. After the resolve these issues, it improved the network
performance, security, and reliability.
Configuration issue: during the network design, I have faced the system, resources, and
network Configuration issue. It is increased when given network size increased such second
floor and third-floor network design. Incorrect Configuration is decreased the network
performance and attracted the attacker which also affects the network security. I have used
the DHCP protocol, TCP/IP addressing schemes, and cabling approach for the proper
configuration of network and resource. Linksys router and configuring Windows are used for
testing of the network. OSI Model use to resolve the initial configuration and design issue in
the wired and wireless LAN Network.
Performance Issue: Network performance is depended on the delay, network design,
configuration of the network device, throughput, bandwidth, jitter, and data transmission
and interface. Latency and slow speed are decreased the network performance and data is
reached in the saturated condition. In the wired LAN network, I have used the gigabit
Ethernet between router, switch, and hosts. It increased the network speed. In the wireless
network, I have added interference in the network which enhanced the network
performance. I have used the packet analyser to analyse the network packet and their path.
It finds out the packet loss in the network with reason. It will help to resolve the packet loss
because it also affects the network performance.
Protocol Problems: I have faced the ISP-based protocol issues in the given network design
and development. Given LAN network needs IP addressing, DNS, and DHCP protocol with
the network TCP/IP. It faced the connectivity problem, communication problem, security
problem, and limited data transfer issue. These issues are resolved with help of IP
addressing, DNS, and DHCP protocol implementation on the network layer. And gives the
proper communication and connectivity is the network (Shimonski, 2009).
After the resolved the Protocol Problems, Performance Issue and Configuration issue, it
enhanced the network performance, security, and reliability. Given LAN network provide a
47
Document Page
network which works efficiently and smoothly. It is easily managed by the organization staff.
It allowed only authorized access to the network and gives the high-level security to
network because it contains sensitive information.
48

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4.3 critically evaluate the performance of a LAN
Here, I have explained the simulation mode of packet tracer which is used to measure
network performance through the monitor the network packets.
Simulation Mode: I have used the Simulation Mode for evaluated given LAN network
performance. the performance of a LAN. It runs on the network where the pace is slow. It
monitoring and controlling the packet of path and analysis path in the details. In the given
network, Simulation Mode is able to manage the packet path that helps to analysis the
network performance.
In the network, Packet Tracer associated to a remote Multiuser peer so there will be not
able to enable the Simulation Mode. For the enabling, Simulation Mode, there is need to
encourage the storage an offline copy (Juniper, 2018).
The Reset Simulation button disappears whole events in the Event List. when clicks on the
simulation, it is able to monitoring packets (self-created), QoS Stamp, delays packets, and
their type fields. It creates an event list. With the help of Edit Filters button, the user will be
able to see the hidden packet. Edit Filters contains an ACL Filter menu which holds Delete
an ACL Filter, Delete an ACL Filter, and submit an ACL Filter.
Figure 51: PDU list showing the failed connection between inter-department
49
Document Page
Figure 52: PDU list showing the successful connection between IT manager and department
Figure 53: Ping Test
50
Document Page
Figure 54: ACL Filters
Control bar window contains the information about events such as time, last user, info,
type, device, and visible type.
Figure 55: Control Window
Network router performance is measured with the help of QoS and PDU (ping command).
51

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 56: QoS Router through PDU
M3: Cisco Packet Tracer is a platform where given LAN network designed with the help of
DNS, Router configuration, DHCP servers, Workstation, and HTPP server. Star method is a
topology which used in the given network. LAN network Performance is measured by
Throughput, Bandwidth, Latency, Packet Loss, and Jitter factors. I have achieved M3 in
4.3and 3.1 parts.
D1:
I have achieved D1 in 4.3 parts. Simulation mode is used to LAN network performance in the
packet tracer tool. It manages event list of the network.
52
Document Page
D2: I have achieved D2 in 3.1, and 3.2, parts. I have created the network according to
requirement. It also performed Router configuring, ACL configuring, VLANs configuring, DNS
server configuring, DHCP configuring, and switch configuring.
D3: I have achieved D3 in 3.1, 3.2, and 3.3 parts. I have designed the LAN network according
to user and system requirements. It is configured the different device and protocol to
manage the network activities. After the network designed, there are test the network
communication, security, and access. Testing plan checks customer stratification.
53
Document Page
Conclusion
LAN is a nearby place community. LAN network designed on Cisco Packet Tracer tool for the
given business enterprise. This is a software platform that offers network connecting a wide
variety of diverse gadgets. LAN network of Organization linked some of department and team
of workers to share and communicate the documents, files, emails, statistics and useful
resource and determined performance, safety, and reliability problems inside the
community.
In the reports, I have well-defined LAN community and their kind, cables, devices, resource,
and technologies, that are vital for the given enterprise. The system and user requirement are
fulfilled during the network designed and evaluated the resources of the network. Standards of
Security are instigated on the given LAN community and checked out the running of LAN
network. In the give up, tracking and troubleshooting method is described that determined
performance, reliability, and safety concern and deliberate the performance of LAN
network.
54

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reference:
Black, D. (2016). Network topology. [online] Available at:
http://slideplayer.com/slide/5270126/ [Accessed 18 May 2018].
Webclasses (2018). Local Area Networks [online] Available at:
http://www.webclasses.net/Courses/LANs/7.0/DemoBuild/units/unit01/sec01a.html
[Accessed 18 May 2018].
Study (2016). DHCP & DNS. [online] Available at: http://study-ccna.com/dhcp-dns/
[Accessed 20 May 2018].
Certificationkits (2017). Cisco CCNA Configuring Router Interfaces [online] Available at:
https://www.certificationkits.com/cisco-certification/cisco-ccna-640-802-exam-certification-
guide/cisco-ccna-configuring-router-interfaces/ [Accessed 20 May 2018].
Plett, C. (2017). pathping. [online] Available at: https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/pathping [Accessed 20 May 2018].
Fisher, T. (2018). How to Use the Tracert Command in Windows. [online] Available at:
https://www.lifewire.com/tracert-command-2618101 [Accessed 20 May 2018].
Shimonski , R.(2009). Top 5 Networking Issues with Windows Clients. [online] Available at:
http://techgenix.com/top-5-networking-issues-windows-clients/ [Accessed 20 May 2018].
Juniper (2018). Simulation Mode Overview [online] Available at:
https://www.juniper.net/documentation/en_US/idp5.1/topics/concept/intrusion-detection-
prevention-standalone-simulation-mode-overview.html [Accessed 20 May 2018].
Dowd, M. (2017). Network Security [online] FRSecure. Available at:
https://frsecure.com/blog/heck-happened-subnetting/ [Accessed 20 May 2018].
Shekhar, A. (2016). What Is Star Topology? Advantages And Disadvantages Of A Star
Topology. [online] Fossbytes. Available at: https://fossbytes.com/star-topology-advantages-
disadvantages-star-topology/ [Accessed 20 May 2018].
55
Document Page
Hurley, M. (2014). 4 Causes of Packet Loss and How to Fix Them. [online] Annese.com.
Available at: https://www.annese.com/blog/what-causes-packet-loss [Accessed 20 May
2018].
Robotics, E. (2018). Firewall | Erle Robotics Introduction to Networking in Linux. [online]
Erlerobotics.gitbooks.io. Available at: https://erlerobotics.gitbooks.io/erle-robotics-
introduction-to-linux-networking/content/security/firewall.html [Accessed 20 May 2018].
Wilson, T. (2012). Securing Networks: Access Control List (ACL) Concepts. [online] Available
at: https://www.pluralsight.com/blog/it-ops/access-control-list-concepts [Accessed 20 May
2018].
Wowza (n.d.). Video on Demand (VOD) Streaming Software [online] Available at:
https://www.wowza.com/solutions/streaming-types/video-on-demand [Accessed 20 May
2018].
ANGRY DOG (2009). Voice Over IP Services. [online] Available at:
http://angrydogonline.com/support/capabilities/voice-over-ip-services/ [Accessed 20 May
2018].
Lcdracks (2018). Marshall Electronics - VS-14, H.264 4CH Dual Streaming Encoder. [online]
Available at: http://www.lcdracks.com/discontinued/VS-14.php [Accessed 20 May 2018].
Rane & Bohn(2005). Wireless Control of RPM Series Drag Net Processors. [online] Available
at: http://www.rane.com/note156.html [Accessed 20 May 2018].
Team, (n.d.). VLAN: How Does It Change Your Network Management? [online] Fs.com.
Available at: https://www.fs.com/vlan-how-does-it-change-your-network-management-aid-
601.html [Accessed 20 May 2018].
Rouse, M. (2015). What is coaxial cable? [online] Available at:
https://searchnetworking.techtarget.com/definition/coaxial-cable-illustrated [Accessed 20
May 2018].
56
Document Page
Garrison , J.(2016). What Kind of Ethernet [online] Available at:
https://www.howtogeek.com/70494/what-kind-of-ethernet-cat-5e6a-cable-should-i-use/
[Accessed 20 May 2018].
Sadhukha (2013). Computer networking devices. [online] Slideshare. Available at:
https://www.slideshare.net/RAJESHSADHUKHA01/computer-networking-devices-16572482
[Accessed 20 May 2018].
57

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
58
1 out of 59
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]