Local Area Network Design and Performance Evaluation
VerifiedAdded on 2020/10/22
|22
|5996
|215
AI Summary
The assignment provides a comprehensive overview of Local Area Network (LAN) design and performance evaluation. It discusses various LAN technologies and analyzes traffic-intensive services, highlighting the importance of infrastructure, management, and monitoring by network administrators. The report also touches on LAN trouble shooting situations, duplicate IP addresses, security threats, and antivirus approaches to improve reliability and communication security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Local Area Networking Technologies
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................2
TASK 1............................................................................................................................................2
A.C 1.1 LAN Technologies....................................................................................................2
A.C 1.2 Performance evaluation of traffic intensive services................................................4
A.C 1.3 Recommendations for sustaining the performance, security and reliability of LAN5
TASK 2............................................................................................................................................7
A.C 2.1 LAN infrastructure for FootFall Ltd.........................................................................7
2.2 Suitability of LAN components........................................................................................9
TASK 3............................................................................................................................................9
A.C 3.1 build and configure a LAN to meet a given requirement.........................................9
A.C 3.2 implement network security on a LAN...................................................................11
A.C 3.3 Test LAN using tools and platforms.......................................................................12
TASK 4..........................................................................................................................................14
A.C 4.1 critically describe how LAN infrastructure will be monitored and managed.........14
A.C 4.2 Solve LAN issues to improve reliability and security, performance,.....................15
A.C 4.3 Evaluate the performance of a LAN.......................................................................16
CONCLUSION..............................................................................................................................18
REFERENCES..............................................................................................................................19
1
INTRODUCTION...........................................................................................................................2
TASK 1............................................................................................................................................2
A.C 1.1 LAN Technologies....................................................................................................2
A.C 1.2 Performance evaluation of traffic intensive services................................................4
A.C 1.3 Recommendations for sustaining the performance, security and reliability of LAN5
TASK 2............................................................................................................................................7
A.C 2.1 LAN infrastructure for FootFall Ltd.........................................................................7
2.2 Suitability of LAN components........................................................................................9
TASK 3............................................................................................................................................9
A.C 3.1 build and configure a LAN to meet a given requirement.........................................9
A.C 3.2 implement network security on a LAN...................................................................11
A.C 3.3 Test LAN using tools and platforms.......................................................................12
TASK 4..........................................................................................................................................14
A.C 4.1 critically describe how LAN infrastructure will be monitored and managed.........14
A.C 4.2 Solve LAN issues to improve reliability and security, performance,.....................15
A.C 4.3 Evaluate the performance of a LAN.......................................................................16
CONCLUSION..............................................................................................................................18
REFERENCES..............................................................................................................................19
1
INTRODUCTION
Local area network (LAN) technology is defined as networking approach which
interconnect computers and related devices to each other within a local or limited area. The LAN
techniques allow each of the participating device to share and exchange data (Bello and
Zeadally, 2016). The report will evaluate the various LAN technologies and the performance of
traffic intensive services in relation to FootFall Field Marketing Ltd. This organisation requires
expanding its network by implementing the LAN.
The report will also analyse the security and reliability concerns associated with LAN
implementation. It will evaluate the LAN infrastructure and suitability of its various components
in relation with business operations of FootFall Ltd. The report will explain the monitoring and
security concern which arise with implementation of LAN network. Moreover, it will describe
the troubleshooting issues and will provide solutions to improve the LAN performance and
reliability.
TASK 1
A.C 1.1 LAN Technologies
FootFall Ltd can use various LAN technologies for meeting the requirements of their
expanding business functions.
Wireless LAN technology:
The key principle in this technology is the wireless communication. This can be one of
the most efficient LAN technique. It follows the IEEE 802.11 standards and provides facility to
remain connected even by even when the user is out of range. The IEEE 802.11 standard has its
major emphasis on bottom layers of ISO which are physical layer. Wireless LAN eliminates the
complex cluster of wires and cables and ensure free movement of users without restricting them.
However, wireless LAN is considered as less secure and have slower speed. So organization
cannot use this technology to transmit sensitive information's. For example: Ethernet is the most
used LAN technology under IEEE 802.11 standard. It is easy to understand, implement and
maintain with very low cost. Ethernet operates in two layers of OSI model which physical and
data link layer. Other examples are Token Ring, FDDI and ARCNET.
Virtual LAN:
It is defined as the logical sub network which has ability to group various devices from
number of physical local area networks. If FootFall Ltd uses this technology then it will become
2
Local area network (LAN) technology is defined as networking approach which
interconnect computers and related devices to each other within a local or limited area. The LAN
techniques allow each of the participating device to share and exchange data (Bello and
Zeadally, 2016). The report will evaluate the various LAN technologies and the performance of
traffic intensive services in relation to FootFall Field Marketing Ltd. This organisation requires
expanding its network by implementing the LAN.
The report will also analyse the security and reliability concerns associated with LAN
implementation. It will evaluate the LAN infrastructure and suitability of its various components
in relation with business operations of FootFall Ltd. The report will explain the monitoring and
security concern which arise with implementation of LAN network. Moreover, it will describe
the troubleshooting issues and will provide solutions to improve the LAN performance and
reliability.
TASK 1
A.C 1.1 LAN Technologies
FootFall Ltd can use various LAN technologies for meeting the requirements of their
expanding business functions.
Wireless LAN technology:
The key principle in this technology is the wireless communication. This can be one of
the most efficient LAN technique. It follows the IEEE 802.11 standards and provides facility to
remain connected even by even when the user is out of range. The IEEE 802.11 standard has its
major emphasis on bottom layers of ISO which are physical layer. Wireless LAN eliminates the
complex cluster of wires and cables and ensure free movement of users without restricting them.
However, wireless LAN is considered as less secure and have slower speed. So organization
cannot use this technology to transmit sensitive information's. For example: Ethernet is the most
used LAN technology under IEEE 802.11 standard. It is easy to understand, implement and
maintain with very low cost. Ethernet operates in two layers of OSI model which physical and
data link layer. Other examples are Token Ring, FDDI and ARCNET.
Virtual LAN:
It is defined as the logical sub network which has ability to group various devices from
number of physical local area networks. If FootFall Ltd uses this technology then it will become
2
very convenient for the organization to share sensitive information with high level of security but
it is very complex and difficult to maintain the effectiveness of Virtual LAN (Gupta and Jha,
2015). It reduces broadcast traffic and has strong policies for ensuring the data security. VLAN
technology also eliminates the physical boundaries and has high performance characteristics in
terms of resource and data sharing as well as in lowering latency. However, it does not allow
communication with other VLANs without routers. Another important advantage of VLAN
implementation is that it minimizes the router requirement by flooding data packets to limited
switch ports only. In order to ensure only authorized access to information it confines the
broadcasting domain. For example: A company has three department offices i.e. development,
production and administration. Every department has 3 computers. For some default
configuration all system has same broadcast domain to access the resources of other department.
For this VLAN create a logical boundary over physcial network. VLAN router is used to
connected network.
LAN using switching:
In this LAN technology switching methods are used for networking. FootFall Ltd can
use layer 2 switch which uses MAC address and networking interface cards for ensuring low
latency. It is highly efficient as data encapsulation does not allow changes to data and is effective
for group connectivity. Layer 3 and 4 switches will be expensive as organization has smaller
network. Layer 2 switch based LAN has low cost and latency and does not require routing gears
but is suffers from certain disadvantages. The major one is that data transmitted from one device
is received by all other available devices which in turn reduces network efficiency. For example-
LAN switching is a modern technology and Football organization uses this technique to enables
for controlling the switch port and every switch port associates with the fast Ethernet. It helps for
manage the display speed and duplex.
Ethernet:
This technology is very effective in terms of cost and flexibility in topologies. It uses
CSMA/CD mechanism for controlling access. It executes in TCP/IP architecture of link layer
and provides connectionless communication. This technology has low cost and higher immunity
to noise but it does not support traffic intensive applications and acknowledgement facility
(Liang and Yu, 2015). It provides easy troubleshooting methods and transfer speed can be
increased up to Gbps as well. However, it does not support video and voice traffic. This
3
it is very complex and difficult to maintain the effectiveness of Virtual LAN (Gupta and Jha,
2015). It reduces broadcast traffic and has strong policies for ensuring the data security. VLAN
technology also eliminates the physical boundaries and has high performance characteristics in
terms of resource and data sharing as well as in lowering latency. However, it does not allow
communication with other VLANs without routers. Another important advantage of VLAN
implementation is that it minimizes the router requirement by flooding data packets to limited
switch ports only. In order to ensure only authorized access to information it confines the
broadcasting domain. For example: A company has three department offices i.e. development,
production and administration. Every department has 3 computers. For some default
configuration all system has same broadcast domain to access the resources of other department.
For this VLAN create a logical boundary over physcial network. VLAN router is used to
connected network.
LAN using switching:
In this LAN technology switching methods are used for networking. FootFall Ltd can
use layer 2 switch which uses MAC address and networking interface cards for ensuring low
latency. It is highly efficient as data encapsulation does not allow changes to data and is effective
for group connectivity. Layer 3 and 4 switches will be expensive as organization has smaller
network. Layer 2 switch based LAN has low cost and latency and does not require routing gears
but is suffers from certain disadvantages. The major one is that data transmitted from one device
is received by all other available devices which in turn reduces network efficiency. For example-
LAN switching is a modern technology and Football organization uses this technique to enables
for controlling the switch port and every switch port associates with the fast Ethernet. It helps for
manage the display speed and duplex.
Ethernet:
This technology is very effective in terms of cost and flexibility in topologies. It uses
CSMA/CD mechanism for controlling access. It executes in TCP/IP architecture of link layer
and provides connectionless communication. This technology has low cost and higher immunity
to noise but it does not support traffic intensive applications and acknowledgement facility
(Liang and Yu, 2015). It provides easy troubleshooting methods and transfer speed can be
increased up to Gbps as well. However, it does not support video and voice traffic. This
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
technology will be the best option for FootFall Ltd in terms of speed and security measures. For
Example: If connect computer with 10 BASE-T NIC to a 100 BASE-T network, the computer
will only be able to send and receive data at 10 Mbps. But if Gigabit Ethernet router connect
devices it using 100BASE-T cables with maximum data transfer rate will be 100 Mbps.
Voice over protocol:
This technology integrates the local area network with phone calls. Thus, users can make
calls over LAN. It converts voice signal (analog) into digital signals. As compare to traditional
methods of calling system VoIP is less costly and its quality is not affected by the distance
between sender and receiver. However, for high quality it requires private box exchange with
high speed internet connection. It suffers from major disadvantage, that it requires power supply
and internet connection. In the absence of these factors the organization will not be able to make
calls. The bandwidth requirement of voice over protocol are higher and due to this data packets
are delayed during transmission. It can also be a challenging and difficult task to trace the
address of the sender. Thus, from security concerns it may not be considered suitable for the
organization. The speed of processor is variable with multitasking approaches. The quality of
calls made by voice over protocol LAN technology can degrade if speed of the processor is
reduced. For examples of applications that use VOIP technology are whats app, google phone,
Facebook video, voice chat and Skype.
A.C 1.2 Performance evaluation of traffic intensive services
Certain activities which are in high demand and keeps the traffic engaged at greater
extent are known as traffic intensive activities. For instance, downloading, video and audio
streaming are highly intensive towards traffic whereas activities like chatting, browsing does not
contribute to network traffic. For ensuring the effectiveness of the LAN system, it is essential for
Footfall Ltd to analyse performance of these traffic intensive services. The organisation must
consider the performance of traffic intensive services in order to achieve its objectives of LAN
Implementation.
Quality of service (QoS) measures the overall effectiveness of LAN network by giving
priority to various applications and ensuring desired standards in performance. These services
aim at minimizing the network traffic by monitoring the extent of traffic and delay in data
transmission. Their performance can be measured by factors like bandwidth, loss of data packets
and delays. For instance, for Footfall Ltd voice over IP can be the first priority and video
4
Example: If connect computer with 10 BASE-T NIC to a 100 BASE-T network, the computer
will only be able to send and receive data at 10 Mbps. But if Gigabit Ethernet router connect
devices it using 100BASE-T cables with maximum data transfer rate will be 100 Mbps.
Voice over protocol:
This technology integrates the local area network with phone calls. Thus, users can make
calls over LAN. It converts voice signal (analog) into digital signals. As compare to traditional
methods of calling system VoIP is less costly and its quality is not affected by the distance
between sender and receiver. However, for high quality it requires private box exchange with
high speed internet connection. It suffers from major disadvantage, that it requires power supply
and internet connection. In the absence of these factors the organization will not be able to make
calls. The bandwidth requirement of voice over protocol are higher and due to this data packets
are delayed during transmission. It can also be a challenging and difficult task to trace the
address of the sender. Thus, from security concerns it may not be considered suitable for the
organization. The speed of processor is variable with multitasking approaches. The quality of
calls made by voice over protocol LAN technology can degrade if speed of the processor is
reduced. For examples of applications that use VOIP technology are whats app, google phone,
Facebook video, voice chat and Skype.
A.C 1.2 Performance evaluation of traffic intensive services
Certain activities which are in high demand and keeps the traffic engaged at greater
extent are known as traffic intensive activities. For instance, downloading, video and audio
streaming are highly intensive towards traffic whereas activities like chatting, browsing does not
contribute to network traffic. For ensuring the effectiveness of the LAN system, it is essential for
Footfall Ltd to analyse performance of these traffic intensive services. The organisation must
consider the performance of traffic intensive services in order to achieve its objectives of LAN
Implementation.
Quality of service (QoS) measures the overall effectiveness of LAN network by giving
priority to various applications and ensuring desired standards in performance. These services
aim at minimizing the network traffic by monitoring the extent of traffic and delay in data
transmission. Their performance can be measured by factors like bandwidth, loss of data packets
and delays. For instance, for Footfall Ltd voice over IP can be the first priority and video
4
streaming can be second priority so when both requests are appeared simultaneously then QoS
gives priority to VOIP and will hold secondary activities until network traffic is not cleared. This
approach not only improve effectiveness but also reduces operating costs. For giving priorities to
activities quality of service standards mark the data packets by means of either IP precedence or
IP DSCP (differentiated service code point).
For giving priority to data packets with IP precedence method the data packet which has
higher value of IP precedence field will be given first priority. IP precedence uses only first three
bits for allocating the priority while on the other hand DSCP uses the first 6 bits for prioritizing
the packets (Liang, Yu, and Zhang, 2015). The delay experienced by traffic intensive services
due to priority allocation by QoS also depends upon the position of the data or IP packets in the
queue. The traffic intensive activities can also use frame tagging methods.
These methods identify the data packets which passes through trunk lines. The
identification is accomplished by giving them specific tags before transmissions. The tagging of
packets ensure that data packets are not lost and network traffic is not disturbed by intervention
from these misplaced packets. Hence, it is essential for the organisation that these traffic
intensive services are monitored regularly. Their performance evaluation parameters such as
delay, traffic intensity, and effectiveness in giving priority to desired operations.
A.C 1.3 Recommendations for sustaining the performance, security and reliability of LAN
The major concerns in relation with the local area networking are security and control
related concerns. The desired LAN implementation of Footfall Ltd must ensure that traffic
intensive services are effectively used so that network traffic does not degrade the performance
of the network. The networking system must use appropriate security measurements to ensure
the data transmission via safe and secure networking path. The most basic approach which can
be used by the organisation to avoid security threat is to keep their antivirus database updated. It
will greatly reduce the risks of security threats (threats to wireless security, 2010).
If Footfall Ltd employs wireless LAN, then it becomes essential for the organisation to
include passive monitoring. There are possibilities that the data is unintentionally propagated
outside the wireless range of organisation and thus it can be easily vulnerable to unauthorised
accessing. During transmissions via LAN network it may happen that more than one system
transmits the signal or data at the same time. In such cases in order to avoid signal interference or
collision media access control methods (MAC) can be used. MAC methods are implemented at
5
gives priority to VOIP and will hold secondary activities until network traffic is not cleared. This
approach not only improve effectiveness but also reduces operating costs. For giving priorities to
activities quality of service standards mark the data packets by means of either IP precedence or
IP DSCP (differentiated service code point).
For giving priority to data packets with IP precedence method the data packet which has
higher value of IP precedence field will be given first priority. IP precedence uses only first three
bits for allocating the priority while on the other hand DSCP uses the first 6 bits for prioritizing
the packets (Liang, Yu, and Zhang, 2015). The delay experienced by traffic intensive services
due to priority allocation by QoS also depends upon the position of the data or IP packets in the
queue. The traffic intensive activities can also use frame tagging methods.
These methods identify the data packets which passes through trunk lines. The
identification is accomplished by giving them specific tags before transmissions. The tagging of
packets ensure that data packets are not lost and network traffic is not disturbed by intervention
from these misplaced packets. Hence, it is essential for the organisation that these traffic
intensive services are monitored regularly. Their performance evaluation parameters such as
delay, traffic intensity, and effectiveness in giving priority to desired operations.
A.C 1.3 Recommendations for sustaining the performance, security and reliability of LAN
The major concerns in relation with the local area networking are security and control
related concerns. The desired LAN implementation of Footfall Ltd must ensure that traffic
intensive services are effectively used so that network traffic does not degrade the performance
of the network. The networking system must use appropriate security measurements to ensure
the data transmission via safe and secure networking path. The most basic approach which can
be used by the organisation to avoid security threat is to keep their antivirus database updated. It
will greatly reduce the risks of security threats (threats to wireless security, 2010).
If Footfall Ltd employs wireless LAN, then it becomes essential for the organisation to
include passive monitoring. There are possibilities that the data is unintentionally propagated
outside the wireless range of organisation and thus it can be easily vulnerable to unauthorised
accessing. During transmissions via LAN network it may happen that more than one system
transmits the signal or data at the same time. In such cases in order to avoid signal interference or
collision media access control methods (MAC) can be used. MAC methods are implemented at
5
the data link stage. For instance, in Ethernet CSMA/CD media access method is used. For
enhancing the security in wireless local area network organisation can use access control list in
networking. This list will allow only authorised access to the objects.
The systems which do not have permission are not allowed to modify or transmit the
data. Access control list also provide specification about which operations can be performed on
the objects as well as the scope of data objects. Access control list can serve as rule set to filter
the network traffic of Footfall Ltd. The extended version of access list allows as to evaluate the
complete details of IP address along with the Layer 3 type protocol whereas the standard access
list can evaluate only IP address (Securing Networks: Access Control List (ACL) concepts,
2012). Thus, for security perspective it will be more suitable for FootFall Ltd to implement
extended version. ACL can be implemented on firewall or routers but due to less complexity
mainly they are preferred over routers.
Virtual malicious traffic due to inefficient management of wireless network is also one of
the important consideration for the organisation. To mitigate these concerns IT department of
organisation must disable DHCP (Dynamic host configuration). Instead of it static IP address can
be used. Rogue access points can encourage the network traffic so in order to eliminate them
organisation must conduct site survey for determining all available access points. WEP
encryption method can give wireless security which is equivalently effective as wired local area
network. In order to manage the network traffic intensity and to monitor the traffic, LAN must
can include switch port analyser (SPAN). It is also known as the port mirroring. For analysing
the network packets port spanning is enabled so that switch can transmit copy of network packets
on selected port for analysing (The do’s and do not's of SPAN ports, 2013).
It is essential that during its setup source and destination must not be mixed otherwise it
will affect the quality of LAN networking. Thus SPAN ports are very useful and beneficial for
the LAN as they enhance the visibility of all activities executing on LAN and provide effective
quality data for troubleshooting and application decoding. However, SPAN ports may suffer
from certain limitations. They can add time delay to the data packets and some packets can be
dropped or missed due to over subscription or their poor quality. For deeply analysing the
packets traffic related to firewall must be SPAN.
6
enhancing the security in wireless local area network organisation can use access control list in
networking. This list will allow only authorised access to the objects.
The systems which do not have permission are not allowed to modify or transmit the
data. Access control list also provide specification about which operations can be performed on
the objects as well as the scope of data objects. Access control list can serve as rule set to filter
the network traffic of Footfall Ltd. The extended version of access list allows as to evaluate the
complete details of IP address along with the Layer 3 type protocol whereas the standard access
list can evaluate only IP address (Securing Networks: Access Control List (ACL) concepts,
2012). Thus, for security perspective it will be more suitable for FootFall Ltd to implement
extended version. ACL can be implemented on firewall or routers but due to less complexity
mainly they are preferred over routers.
Virtual malicious traffic due to inefficient management of wireless network is also one of
the important consideration for the organisation. To mitigate these concerns IT department of
organisation must disable DHCP (Dynamic host configuration). Instead of it static IP address can
be used. Rogue access points can encourage the network traffic so in order to eliminate them
organisation must conduct site survey for determining all available access points. WEP
encryption method can give wireless security which is equivalently effective as wired local area
network. In order to manage the network traffic intensity and to monitor the traffic, LAN must
can include switch port analyser (SPAN). It is also known as the port mirroring. For analysing
the network packets port spanning is enabled so that switch can transmit copy of network packets
on selected port for analysing (The do’s and do not's of SPAN ports, 2013).
It is essential that during its setup source and destination must not be mixed otherwise it
will affect the quality of LAN networking. Thus SPAN ports are very useful and beneficial for
the LAN as they enhance the visibility of all activities executing on LAN and provide effective
quality data for troubleshooting and application decoding. However, SPAN ports may suffer
from certain limitations. They can add time delay to the data packets and some packets can be
dropped or missed due to over subscription or their poor quality. For deeply analysing the
packets traffic related to firewall must be SPAN.
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TASK 2
A.C 2.1 LAN infrastructure for FootFall Ltd
FootFall Ltd requires expanding their network in same building across 3 different floors.
IT department requires one system at each floor. At first floor each department requires 2
computers thus total 9 systems at first floor. Whereas at second and third floor organisation want
to implement 9 and 10 computers respectively. Since Footfall Ltd is small organisation, it will be
suitable to use class C IP address in which first byte contain range from 192-223. With class C IP
address there is less number of host IP address hence it becomes very easy to manage DHCP.
Users: Foot fall organization always provide the best quality of product and services to their
customer. Many users attract towards LAN technology because it is easier for people to
understand their process. In this way, user communicate with other people to share information
form one place to another.
Applications: LAN provide variety of applications to helps for user and customer. There are
some important common LAN useful such as:
Personal computer LAN- It is a common configuration of LAN which support the computers. In
this way, managers communicate with different departments of organization to share important
data and information.
Scalable- Local area network is scalable wireless network that is support the mobility in Internet
protocol and local area network.
Security: Local area network provide privacy for secure personal information and data of
organizations and customers. This network uses TCP protocol for transmission of signals form
one part to another.
Traffic intensive services: Local area network transmitted large amount of data form one place
to another. This data will encapsulate in the form of packets and also provide loads in network.
In this way, it can be measure the network traffic.
Technology: LAN is Modern technology and many biggest organization used for sharing
information from one place to another.
7
A.C 2.1 LAN infrastructure for FootFall Ltd
FootFall Ltd requires expanding their network in same building across 3 different floors.
IT department requires one system at each floor. At first floor each department requires 2
computers thus total 9 systems at first floor. Whereas at second and third floor organisation want
to implement 9 and 10 computers respectively. Since Footfall Ltd is small organisation, it will be
suitable to use class C IP address in which first byte contain range from 192-223. With class C IP
address there is less number of host IP address hence it becomes very easy to manage DHCP.
Users: Foot fall organization always provide the best quality of product and services to their
customer. Many users attract towards LAN technology because it is easier for people to
understand their process. In this way, user communicate with other people to share information
form one place to another.
Applications: LAN provide variety of applications to helps for user and customer. There are
some important common LAN useful such as:
Personal computer LAN- It is a common configuration of LAN which support the computers. In
this way, managers communicate with different departments of organization to share important
data and information.
Scalable- Local area network is scalable wireless network that is support the mobility in Internet
protocol and local area network.
Security: Local area network provide privacy for secure personal information and data of
organizations and customers. This network uses TCP protocol for transmission of signals form
one part to another.
Traffic intensive services: Local area network transmitted large amount of data form one place
to another. This data will encapsulate in the form of packets and also provide loads in network.
In this way, it can be measure the network traffic.
Technology: LAN is Modern technology and many biggest organization used for sharing
information from one place to another.
7
8
2.2 Suitability of LAN components
For achieving the benefits of networking it is necessary that suitable LAN components
are used in the infrastructure. Local area network has following components.
Hubs and switches: These are one of the basic components for networking. Hubs are also known
as routers and they connect multiple computer systems with each other. These are used in both
wireless and in wired LAN. They provide the routing path for effective information exchange.
Power supply: All LAN technologies essentially consist of power supply. The wired local area
network shares data with the use of cables. Thus, in wired LAN data is interpreted as electronic
pulse. On the other hand, in wireless network data is transmitted via radio waves. These waves
are produced by using current.
Network adapter and medium: To establish the connection network adapter is required. It first
converts data into suitable electronic signals and then if network traffic is not present then it
transmits the data to network. The element of network adapter which serves this purpose is called
media access control (MAC). The MAC address is defined as the serial number of network
adapter. In most of the computer systems it is integrated into motherboard of system.
The networking medium in wired local area networks is called as networking cables.
Organisation can use twisted pair cable or fibre optic cables (Ojha, Misra and Raghuwanshi,
2015). Unshielded twisted cable is also called Ethernet cable. To connect cables connectors are
used. The most commonly used connector is RJ45. Every computer system in the network has
RJ45 port for providing connections to twisted pair cables. For wireless local area networks
cables are not used as networking medium rather they use radio waves as transmitting medium.
Network software: For analysing and monitoring the data as well as for transmitting the data
over local area network, a specific software is also required which can fragment the data into
meaningful packets. All packets have the address of their source as well as destination.
Receiving computers deliver these packets at desired destination after interpreting them.
TASK 3
A.C 3.1 build and configure a LAN to meet a given requirement
VLAN- VLAN trunk protocol is reduced the administration in switched networking and the
configuration has been occurred with the help of VTP server, it also distributed in all the
switches.
9
For achieving the benefits of networking it is necessary that suitable LAN components
are used in the infrastructure. Local area network has following components.
Hubs and switches: These are one of the basic components for networking. Hubs are also known
as routers and they connect multiple computer systems with each other. These are used in both
wireless and in wired LAN. They provide the routing path for effective information exchange.
Power supply: All LAN technologies essentially consist of power supply. The wired local area
network shares data with the use of cables. Thus, in wired LAN data is interpreted as electronic
pulse. On the other hand, in wireless network data is transmitted via radio waves. These waves
are produced by using current.
Network adapter and medium: To establish the connection network adapter is required. It first
converts data into suitable electronic signals and then if network traffic is not present then it
transmits the data to network. The element of network adapter which serves this purpose is called
media access control (MAC). The MAC address is defined as the serial number of network
adapter. In most of the computer systems it is integrated into motherboard of system.
The networking medium in wired local area networks is called as networking cables.
Organisation can use twisted pair cable or fibre optic cables (Ojha, Misra and Raghuwanshi,
2015). Unshielded twisted cable is also called Ethernet cable. To connect cables connectors are
used. The most commonly used connector is RJ45. Every computer system in the network has
RJ45 port for providing connections to twisted pair cables. For wireless local area networks
cables are not used as networking medium rather they use radio waves as transmitting medium.
Network software: For analysing and monitoring the data as well as for transmitting the data
over local area network, a specific software is also required which can fragment the data into
meaningful packets. All packets have the address of their source as well as destination.
Receiving computers deliver these packets at desired destination after interpreting them.
TASK 3
A.C 3.1 build and configure a LAN to meet a given requirement
VLAN- VLAN trunk protocol is reduced the administration in switched networking and the
configuration has been occurred with the help of VTP server, it also distributed in all the
switches.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Routing is directly configured and proving many routing functions with the help of devices on
switch A and Switch B.
Configuration of VTP and STP-
VLAN 21, Name: Marketing is helpful for supporting two servers attached such as fa0/9 and
fa0/10
VLAN 22, Name: Sale is helpful for supporting two servers such as fa0/13 and fa0/14 Vlan 23,
VLAN 23,Name: Engineering, will support two servers attached to fa0/15 and fa0/16
Access ports that connect to server should transition immediately to forwarding state upon
detecting the connection of a device.
SwitchB VTP mode needs to be the same as SwitchA.
SwitchB must operate in the same spanning tree mode as SwitchA.
No routing is to be configured on SwitchB.
–Only the SVI vlan 1 is to be configured and it is to use address 192.168.1.11/24.
Building a LAN
To Build a LAN, first of all it is important for network typologies to support the
information across the network. There is various type of typologies used such as tree, bus, Mesh,
star topology etc. Mesh technology is local area network that connect one node to another. It is
the most interactive process useful for communication from one place to another. But nowadays,
eternal is playing important role in communication network because it is standard based medium
protocol. It sends the signal with the help of media and connect computer system to local area
network. The Football Field Marketing Ltd also uses the different communication network for
transmitting the signal from one place to another. Recently, the organization use Ethernet
networks to build a valid channel for communication.
A switch is medium that connects two or more devices in communication network
system. This is basically made by Local area network. This medium is very helpful for
exchanging information and data. It easily connects another device effectively and efficiently.
This is also linked with router which is helpful for providing the positioning and direction of web
traffic. There are wide range of local area network is also known as Wide area network or MAN.
It is simply enhanced the communication network all over the world (Raza, Kulkarni, and
Sooriyabandara, 2017).
Configuration of LAN-
10
switch A and Switch B.
Configuration of VTP and STP-
VLAN 21, Name: Marketing is helpful for supporting two servers attached such as fa0/9 and
fa0/10
VLAN 22, Name: Sale is helpful for supporting two servers such as fa0/13 and fa0/14 Vlan 23,
VLAN 23,Name: Engineering, will support two servers attached to fa0/15 and fa0/16
Access ports that connect to server should transition immediately to forwarding state upon
detecting the connection of a device.
SwitchB VTP mode needs to be the same as SwitchA.
SwitchB must operate in the same spanning tree mode as SwitchA.
No routing is to be configured on SwitchB.
–Only the SVI vlan 1 is to be configured and it is to use address 192.168.1.11/24.
Building a LAN
To Build a LAN, first of all it is important for network typologies to support the
information across the network. There is various type of typologies used such as tree, bus, Mesh,
star topology etc. Mesh technology is local area network that connect one node to another. It is
the most interactive process useful for communication from one place to another. But nowadays,
eternal is playing important role in communication network because it is standard based medium
protocol. It sends the signal with the help of media and connect computer system to local area
network. The Football Field Marketing Ltd also uses the different communication network for
transmitting the signal from one place to another. Recently, the organization use Ethernet
networks to build a valid channel for communication.
A switch is medium that connects two or more devices in communication network
system. This is basically made by Local area network. This medium is very helpful for
exchanging information and data. It easily connects another device effectively and efficiently.
This is also linked with router which is helpful for providing the positioning and direction of web
traffic. There are wide range of local area network is also known as Wide area network or MAN.
It is simply enhanced the communication network all over the world (Raza, Kulkarni, and
Sooriyabandara, 2017).
Configuration of LAN-
10
The firewall comprises a list of different functions which required in configuration of
Local area network. VPN Firewall is device that is designed for protecting unauthorized and
malicious attacks. VPN is basically installed in server and work for dynamic host configuration
protocol server. This configuration is also known as DHCP. They provide the Internet protocol
address and gateway. There are some important steps in order to configure a Local area network:
First step is go to network configuration and choose LAN setup options.
Enter the correct IP address
router calculates the network number
DHCP server is enabled with the help of following steps such as
1. Enter the domain name of router
2. Starting the IP Address and ending
3. Mention lease time for clients
4. Enable and DNS Proxy checked in proper ways
5. After competing process, click on Apply button.
A.C 3.2 implement network security on a LAN
Local area network is collection of computer that connect to device and share
information and data to server. It is necessary for Footfall Field Marketing Ltd organization to
secure their data and personal information. There is different way of implementing network
security in Local area network that is as follows: -
Filtering/ Port Blocking- The important data and information are represented as packet
of data. Firewall plays important role to protect the data against unauthorized stuffs and intruders
because they can access the personal data and information of Footfall Field marketing. Internet
connection medium can harm system or hardware. Firewall filters removes irrelevant data in
system because they will damage the entire computer system.
Encryption- Encryption process to secure data in the communication network and they
provide the security by unauthorized person. This concept is helping the high authentication
through cryptography (Vaquero and Rodero-Merino, 2014). Some personal data send in the form
of code and only receiver understand the information and data. The confidential data and
information to be secured in the communication network.
11
Local area network. VPN Firewall is device that is designed for protecting unauthorized and
malicious attacks. VPN is basically installed in server and work for dynamic host configuration
protocol server. This configuration is also known as DHCP. They provide the Internet protocol
address and gateway. There are some important steps in order to configure a Local area network:
First step is go to network configuration and choose LAN setup options.
Enter the correct IP address
router calculates the network number
DHCP server is enabled with the help of following steps such as
1. Enter the domain name of router
2. Starting the IP Address and ending
3. Mention lease time for clients
4. Enable and DNS Proxy checked in proper ways
5. After competing process, click on Apply button.
A.C 3.2 implement network security on a LAN
Local area network is collection of computer that connect to device and share
information and data to server. It is necessary for Footfall Field Marketing Ltd organization to
secure their data and personal information. There is different way of implementing network
security in Local area network that is as follows: -
Filtering/ Port Blocking- The important data and information are represented as packet
of data. Firewall plays important role to protect the data against unauthorized stuffs and intruders
because they can access the personal data and information of Footfall Field marketing. Internet
connection medium can harm system or hardware. Firewall filters removes irrelevant data in
system because they will damage the entire computer system.
Encryption- Encryption process to secure data in the communication network and they
provide the security by unauthorized person. This concept is helping the high authentication
through cryptography (Vaquero and Rodero-Merino, 2014). Some personal data send in the form
of code and only receiver understand the information and data. The confidential data and
information to be secured in the communication network.
11
Authentication- This concept is not based on authorization but it ensures that the person
claiming to be as own or true identity. It is very simple process but does not provide the security
as authorization process.
Virtual Local Area Networks (VLANs)- VLANs provides high security to
communication network because they are performing different functions to identify the threats in
the communication network. Virtual Local area network has some functions such as packet
filtering, traffic and directions. They have efficiency to manage the data in proper manner.
VACLs use standard and extended Cisco IOS IP and MAC layer-named ACLs (see “MAC
ACLs” section) and VLAN access maps.
IGMP packets are not checked against VACLs.
VLAN access maps can be applied to VLANs for VACL capture.
ACLs, VLAN membership-
Many organizations taken VLANS membership which helps for organization to take more
advantages and also provide the access of packet that is created bridge between VLAN. In
footfall company, LAN is an administratively which define domain and logically segment and
performing different functions or application that is helps for enhancing the performance by
VLAN.
A.C 3.3 Test LAN using tools and platforms
WAN access- witless LAN is telecommunication network which helps for sending data form one
place to another.
Access to internet- Internet access is also required for broadband services and mobile internet
services.
Security; bandwidth- it is important for organization to maintain their services to use different
security platform such as protecting personal information of organization and customers.
In Footfall Field Marketing Ltd, IT Manager has responsibilities to check the configuration of
local area network. First of all, it will check the ability of computer system and hardware and
afterward, interact to each other. The boot up process is competing and then starts the process:
Open command prompt and type reboot. It is based on LINUX boot process.
Host-name: Host name assigned in computer system
Interface lo: <OK><Failed>
12
claiming to be as own or true identity. It is very simple process but does not provide the security
as authorization process.
Virtual Local Area Networks (VLANs)- VLANs provides high security to
communication network because they are performing different functions to identify the threats in
the communication network. Virtual Local area network has some functions such as packet
filtering, traffic and directions. They have efficiency to manage the data in proper manner.
VACLs use standard and extended Cisco IOS IP and MAC layer-named ACLs (see “MAC
ACLs” section) and VLAN access maps.
IGMP packets are not checked against VACLs.
VLAN access maps can be applied to VLANs for VACL capture.
ACLs, VLAN membership-
Many organizations taken VLANS membership which helps for organization to take more
advantages and also provide the access of packet that is created bridge between VLAN. In
footfall company, LAN is an administratively which define domain and logically segment and
performing different functions or application that is helps for enhancing the performance by
VLAN.
A.C 3.3 Test LAN using tools and platforms
WAN access- witless LAN is telecommunication network which helps for sending data form one
place to another.
Access to internet- Internet access is also required for broadband services and mobile internet
services.
Security; bandwidth- it is important for organization to maintain their services to use different
security platform such as protecting personal information of organization and customers.
In Footfall Field Marketing Ltd, IT Manager has responsibilities to check the configuration of
local area network. First of all, it will check the ability of computer system and hardware and
afterward, interact to each other. The boot up process is competing and then starts the process:
Open command prompt and type reboot. It is based on LINUX boot process.
Host-name: Host name assigned in computer system
Interface lo: <OK><Failed>
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Interface ethO: <OK><Failed>
After assigned, the host-name is display.
[OK] will display by ethO interfaces and lo.
Hence, it can be confirming that LAN test successful done.
Ping is important option which is used for check the communication process done truly all the
computer system.
Ping <IP address> and <Hostname> where
<IP address> and <Hostname> This thing should be done properly and check that any errors in
the system.
DNS server should be configured while the Hostname can resolve the problem of particular IP
address. Computer system access their own internet protocol address. Ping command is helpful
to determine computer system properly communicate with each other. All the information is
stored in the form of packets as followings:
64 bytes from 192.168.0.1: icmp_seq=0 TTL=225 time=0.8ms
“192.168.1” is directly equal to local area network and Host name is communicated with the help
of ping command.
“control+c” helps for end the test process that are mentioned informations are shown in given
below:
4 Packets are transmitted, 4 packets received, 0% packet loss.
All the tasks are completing in proper ways and it will generate 0% error in packet otherwise this
process of failed.
From db. Dot.edu (192.168.1.1): destination host unreachable
It can be assuming that they are not interacting each other.
Then selecting 'troubleshooting” the Local area networking
The main system communicating to all the system in proper ways.
After-ward, completing the process define the successful done all functionality of Local areas
network.
13
After assigned, the host-name is display.
[OK] will display by ethO interfaces and lo.
Hence, it can be confirming that LAN test successful done.
Ping is important option which is used for check the communication process done truly all the
computer system.
Ping <IP address> and <Hostname> where
<IP address> and <Hostname> This thing should be done properly and check that any errors in
the system.
DNS server should be configured while the Hostname can resolve the problem of particular IP
address. Computer system access their own internet protocol address. Ping command is helpful
to determine computer system properly communicate with each other. All the information is
stored in the form of packets as followings:
64 bytes from 192.168.0.1: icmp_seq=0 TTL=225 time=0.8ms
“192.168.1” is directly equal to local area network and Host name is communicated with the help
of ping command.
“control+c” helps for end the test process that are mentioned informations are shown in given
below:
4 Packets are transmitted, 4 packets received, 0% packet loss.
All the tasks are completing in proper ways and it will generate 0% error in packet otherwise this
process of failed.
From db. Dot.edu (192.168.1.1): destination host unreachable
It can be assuming that they are not interacting each other.
Then selecting 'troubleshooting” the Local area networking
The main system communicating to all the system in proper ways.
After-ward, completing the process define the successful done all functionality of Local areas
network.
13
TASK 4
A.C 4.1 critically describe how LAN infrastructure will be monitored and managed
LAN performance-
LAN has some few users- The performance of user is good and most of the organizations
uses this technique for communication with the other organizations. LAN performance can be
expressed in the term of throughput. It also identifies the circuits how they perform in effectively
and efficiently. LAN environment is not reliable as compare to Ethernet. It is very important for
any organization to maintain their services which required for monitoring on their network.
LAN troubleshooting is evaluating and determine the issues that generated in the
Communication network. The main goal to determine issue or problem in the local area network
so it is important to monitor to Local area network to identify the issues. LAN monitoring is
helpful for fulfilled the computer management system with the help of snifters. LAN trouble
shooting situations and conditions determine the duplicate IP address on the computer system. In
this way, it will generate incorrect configuration, low performance, cables problems, LAN card
broke, assaults, over-burdening of server and program applications.
User access- The user access the information with help of Local area network which helps for
increasing the speed of bandwidth. It is easier for user to transmit data and information
effectively and efficiently.
Traffic analysis- LAN is analysis the traffic in signal because most of time, data can not be send
in proper way because of their traffic. LAN provide security to remove unwanted traffic and it
also controls the signals.
Bandwidth monitoring- LAN monitoring is check the configuration which is performing
different functions to analysis the entire network in proper ways.
LAN Issues-
LAN issues occurred in the network and data can be loss totally. There are various many
reasons to generate lot of issues in Local area network. Being local area network administrator,
they have many responsibilities to manage all the process and activities of LAN infrastructure.
They always aware about the software, LAN infrastructure, hardware and user access rights and
what are preferences of network configurations. It is an essential for inventory resources of local
14
A.C 4.1 critically describe how LAN infrastructure will be monitored and managed
LAN performance-
LAN has some few users- The performance of user is good and most of the organizations
uses this technique for communication with the other organizations. LAN performance can be
expressed in the term of throughput. It also identifies the circuits how they perform in effectively
and efficiently. LAN environment is not reliable as compare to Ethernet. It is very important for
any organization to maintain their services which required for monitoring on their network.
LAN troubleshooting is evaluating and determine the issues that generated in the
Communication network. The main goal to determine issue or problem in the local area network
so it is important to monitor to Local area network to identify the issues. LAN monitoring is
helpful for fulfilled the computer management system with the help of snifters. LAN trouble
shooting situations and conditions determine the duplicate IP address on the computer system. In
this way, it will generate incorrect configuration, low performance, cables problems, LAN card
broke, assaults, over-burdening of server and program applications.
User access- The user access the information with help of Local area network which helps for
increasing the speed of bandwidth. It is easier for user to transmit data and information
effectively and efficiently.
Traffic analysis- LAN is analysis the traffic in signal because most of time, data can not be send
in proper way because of their traffic. LAN provide security to remove unwanted traffic and it
also controls the signals.
Bandwidth monitoring- LAN monitoring is check the configuration which is performing
different functions to analysis the entire network in proper ways.
LAN Issues-
LAN issues occurred in the network and data can be loss totally. There are various many
reasons to generate lot of issues in Local area network. Being local area network administrator,
they have many responsibilities to manage all the process and activities of LAN infrastructure.
They always aware about the software, LAN infrastructure, hardware and user access rights and
what are preferences of network configurations. It is an essential for inventory resources of local
14
area network like installed software, network hardware and workstations (Wollschlaeger, Sauter
and Jasperneite, 2017).
There are various strategy helping for troubleshooting to manage the local areas network discuss
in followings:
Verify that they have same class IP address and it will cover subnet in machine of Local
areas network. Machine is connected to gateway address so that it can check and ensure
that the address is correct.
Check that all computer system is linked with the plugged at both end i.e. first end is Hub
and another is LAN Card.
In case, if any intermediate server were determined issue in web network, verify the
server setting and then managing the process in proper ways.
It is necessary for check the firewall setting and verify that they are not hindering the
traffic. Ping command is helpful for check the connectivity of networking.
At Command Prompt-
Click 9999.999999 and press enter button (this address is connected to machine).
Specific machine has some integration problem and issues, reinstall NIC connectors
because the issues are still in the system. It can be change the NIC connector and
reconfigure in computer system.
In case the integration issue is still not finding in system then it can check the link of
system form hardware or machine to HUB.
A.C 4.2 Solve LAN issues to improve reliability and security, performance,
Security threats are generated in the local area network because they do not have filtering
options such as antivirus, approach and security system. There are some steps which helpful for
enhancing the security in local area network as discuss in followings:
First of all, Install the antivirus in computer system and updated virus information in computer
system so that it will filter and remove the threats in hardware system. It will filter the server and
machine in the local area network.
Proxy server is essential for system because they monitored system to block all the
applications that generated threats because of security purpose. It will enable the security
options to access and protect the data and information.
15
and Jasperneite, 2017).
There are various strategy helping for troubleshooting to manage the local areas network discuss
in followings:
Verify that they have same class IP address and it will cover subnet in machine of Local
areas network. Machine is connected to gateway address so that it can check and ensure
that the address is correct.
Check that all computer system is linked with the plugged at both end i.e. first end is Hub
and another is LAN Card.
In case, if any intermediate server were determined issue in web network, verify the
server setting and then managing the process in proper ways.
It is necessary for check the firewall setting and verify that they are not hindering the
traffic. Ping command is helpful for check the connectivity of networking.
At Command Prompt-
Click 9999.999999 and press enter button (this address is connected to machine).
Specific machine has some integration problem and issues, reinstall NIC connectors
because the issues are still in the system. It can be change the NIC connector and
reconfigure in computer system.
In case the integration issue is still not finding in system then it can check the link of
system form hardware or machine to HUB.
A.C 4.2 Solve LAN issues to improve reliability and security, performance,
Security threats are generated in the local area network because they do not have filtering
options such as antivirus, approach and security system. There are some steps which helpful for
enhancing the security in local area network as discuss in followings:
First of all, Install the antivirus in computer system and updated virus information in computer
system so that it will filter and remove the threats in hardware system. It will filter the server and
machine in the local area network.
Proxy server is essential for system because they monitored system to block all the
applications that generated threats because of security purpose. It will enable the security
options to access and protect the data and information.
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Set the complex password because encryption strategies help for access the system. It is
an essential for protecting data effectively and efficiently.
Security Network administrator will implement new security approaches to protect
system.
IT Manager of Footfall marketing company, updates the framework and produce new
administrator packs for purpose of security and confidentiality of information (Raza,
Kulkarni, and Sooriyabandara, 2017).
The lapse and streamlined registry is essential for working in the machine.
Solving performance issues and reliability-
The issues generated in the system regarding performance and system introduced new
applications such as antivirus, windows registry lapses, flawed hardware. Unwanted system
routes in unmanaged environment.
System can be divided in subnets which is useful for enhancing and balancing
performance of computer system.
It is essential to remove all system routes because they will build scanning rate of
hardware system.
Clear history, cookies and unwanted files that are not useful.
It increases random access memory.
Uninstall all unwanted software and applications in system because they occupy more
space.
Install LAN cards that helps to increase the speed in 100mbps.
A.C 4.3 Evaluate the performance of a LAN
The performance of local area network is usually good and most of the companies uses
LAN. The performance can be express in term of throughput. The footfall marketing company
mainly focus on dedicated server and mostly common local area network. Technical Focus- Ethernet provide strong error so that it is important to control error
with the help of methods to resolve the problems. LAN is not reliable so that it is
necessary for control the error. Ethernet improves the performance of network Improve server performance-For improving server performance using different
approaches such as hardware and software.
16
an essential for protecting data effectively and efficiently.
Security Network administrator will implement new security approaches to protect
system.
IT Manager of Footfall marketing company, updates the framework and produce new
administrator packs for purpose of security and confidentiality of information (Raza,
Kulkarni, and Sooriyabandara, 2017).
The lapse and streamlined registry is essential for working in the machine.
Solving performance issues and reliability-
The issues generated in the system regarding performance and system introduced new
applications such as antivirus, windows registry lapses, flawed hardware. Unwanted system
routes in unmanaged environment.
System can be divided in subnets which is useful for enhancing and balancing
performance of computer system.
It is essential to remove all system routes because they will build scanning rate of
hardware system.
Clear history, cookies and unwanted files that are not useful.
It increases random access memory.
Uninstall all unwanted software and applications in system because they occupy more
space.
Install LAN cards that helps to increase the speed in 100mbps.
A.C 4.3 Evaluate the performance of a LAN
The performance of local area network is usually good and most of the companies uses
LAN. The performance can be express in term of throughput. The footfall marketing company
mainly focus on dedicated server and mostly common local area network. Technical Focus- Ethernet provide strong error so that it is important to control error
with the help of methods to resolve the problems. LAN is not reliable so that it is
necessary for control the error. Ethernet improves the performance of network Improve server performance-For improving server performance using different
approaches such as hardware and software.
16
Software approach- Software approach is to improve the performance of network and
software setting depending upon the number, type and size, messages in local area network.
Different settings directly affect the performance of network (Nishiyama, Ito and Kato, 2014).
Hardware approach – Network server is overloaded to buy another server because each
server is supporting one application software. It also identifying the need and requirement of
software application on the place of server. Reduce Network demand – the most probability the server is produced one application
and it cannot be split into different server. Time to time, Server upgrade because in this
way, it will increase their speed of CPU and performance. Network manager is
responsible to determine the requirement of network in which the cache memory increase
the performance of CPU.
One way reduce network- Software packages used to increase the load of modules in the
network so it can be heavily increase demand of network. The data and messages are
specific type of size, kilobytes but software packages usually Megabyte in size. Disk
caching software is useful for client system to decrease need network (Gupta and Jha,
2015).
17
software setting depending upon the number, type and size, messages in local area network.
Different settings directly affect the performance of network (Nishiyama, Ito and Kato, 2014).
Hardware approach – Network server is overloaded to buy another server because each
server is supporting one application software. It also identifying the need and requirement of
software application on the place of server. Reduce Network demand – the most probability the server is produced one application
and it cannot be split into different server. Time to time, Server upgrade because in this
way, it will increase their speed of CPU and performance. Network manager is
responsible to determine the requirement of network in which the cache memory increase
the performance of CPU.
One way reduce network- Software packages used to increase the load of modules in the
network so it can be heavily increase demand of network. The data and messages are
specific type of size, kilobytes but software packages usually Megabyte in size. Disk
caching software is useful for client system to decrease need network (Gupta and Jha,
2015).
17
CONCLUSION
This report discussed about various LAN technologies and analysed about traffic
intensive services. This assignment describes the design and infrastructure of local area network.
Further, this report outlined the review and testing local areas network with the help of strategies.
It discussed about LAN infrastructure and also manage and monitor by network administrator.
This assignment also discusses about the performance of LAN that resolve the problem to
improve their security and reliability of communication network.
This assignment summarized about Local area network and need of improving the
performance of network. LAN trouble shooting situations and conditions determine the
duplicate IP address on the computer system. This report describes Security threats which are
generated in the local area network because they do not have filtering options such as antivirus,
approach and security system.
18
This report discussed about various LAN technologies and analysed about traffic
intensive services. This assignment describes the design and infrastructure of local area network.
Further, this report outlined the review and testing local areas network with the help of strategies.
It discussed about LAN infrastructure and also manage and monitor by network administrator.
This assignment also discusses about the performance of LAN that resolve the problem to
improve their security and reliability of communication network.
This assignment summarized about Local area network and need of improving the
performance of network. LAN trouble shooting situations and conditions determine the
duplicate IP address on the computer system. This report describes Security threats which are
generated in the local area network because they do not have filtering options such as antivirus,
approach and security system.
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19
20
21
1 out of 22
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.