logo

Local Area Networking Technologies - Doc

22 Pages5996 Words215 Views
   

Added on  2020-10-22

Local Area Networking Technologies - Doc

   Added on 2020-10-22

ShareRelated Documents
Local Area Networking Technologies
Local Area Networking Technologies - Doc_1
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................2TASK 1............................................................................................................................................2A.C 1.1 LAN Technologies....................................................................................................2A.C 1.2 Performance evaluation of traffic intensive services................................................4A.C 1.3 Recommendations for sustaining the performance, security and reliability of LAN5TASK 2............................................................................................................................................7A.C 2.1 LAN infrastructure for FootFall Ltd.........................................................................72.2 Suitability of LAN components........................................................................................9TASK 3............................................................................................................................................9A.C 3.1 build and configure a LAN to meet a given requirement.........................................9A.C 3.2 implement network security on a LAN...................................................................11A.C 3.3 Test LAN using tools and platforms.......................................................................12TASK 4..........................................................................................................................................14A.C 4.1 critically describe how LAN infrastructure will be monitored and managed.........14A.C 4.2 Solve LAN issues to improve reliability and security, performance,.....................15A.C 4.3 Evaluate the performance of a LAN.......................................................................16CONCLUSION..............................................................................................................................18REFERENCES..............................................................................................................................191
Local Area Networking Technologies - Doc_2
INTRODUCTIONLocal area network (LAN) technology is defined as networking approach whichinterconnect computers and related devices to each other within a local or limited area. The LANtechniques allow each of the participating device to share and exchange data (Bello andZeadally, 2016). The report will evaluate the various LAN technologies and the performance oftraffic intensive services in relation to FootFall Field Marketing Ltd. This organisation requiresexpanding its network by implementing the LAN. The report will also analyse the security and reliability concerns associated with LANimplementation. It will evaluate the LAN infrastructure and suitability of its various componentsin relation with business operations of FootFall Ltd. The report will explain the monitoring andsecurity concern which arise with implementation of LAN network. Moreover, it will describethe troubleshooting issues and will provide solutions to improve the LAN performance andreliability. TASK 1A.C 1.1 LAN Technologies FootFall Ltd can use various LAN technologies for meeting the requirements of theirexpanding business functions. Wireless LAN technology: The key principle in this technology is the wireless communication. This can be one ofthe most efficient LAN technique. It follows the IEEE 802.11 standards and provides facility toremain connected even by even when the user is out of range. The IEEE 802.11 standard has itsmajor emphasis on bottom layers of ISO which are physical layer. Wireless LAN eliminates thecomplex cluster of wires and cables and ensure free movement of users without restricting them.However, wireless LAN is considered as less secure and have slower speed. So organizationcannot use this technology to transmit sensitive information's. For example: Ethernet is the mostused LAN technology under IEEE 802.11 standard. It is easy to understand, implement andmaintain with very low cost. Ethernet operates in two layers of OSI model which physical anddata link layer. Other examples are Token Ring, FDDI and ARCNET.Virtual LAN:It is defined as the logical sub network which has ability to group various devices fromnumber of physical local area networks. If FootFall Ltd uses this technology then it will become2
Local Area Networking Technologies - Doc_3
very convenient for the organization to share sensitive information with high level of security butit is very complex and difficult to maintain the effectiveness of Virtual LAN (Gupta and Jha,2015). It reduces broadcast traffic and has strong policies for ensuring the data security. VLANtechnology also eliminates the physical boundaries and has high performance characteristics interms of resource and data sharing as well as in lowering latency. However, it does not allowcommunication with other VLANs without routers. Another important advantage of VLANimplementation is that it minimizes the router requirement by flooding data packets to limitedswitch ports only. In order to ensure only authorized access to information it confines thebroadcasting domain. For example: A company has three department offices i.e. development,production and administration. Every department has 3 computers. For some defaultconfiguration all system has same broadcast domain to access the resources of other department.For this VLAN create a logical boundary over physcial network. VLAN router is used toconnected network.LAN using switching:In this LAN technology switching methods are used for networking. FootFall Ltd canuse layer 2 switch which uses MAC address and networking interface cards for ensuring lowlatency. It is highly efficient as data encapsulation does not allow changes to data and is effectivefor group connectivity. Layer 3 and 4 switches will be expensive as organization has smallernetwork. Layer 2 switch based LAN has low cost and latency and does not require routing gearsbut is suffers from certain disadvantages. The major one is that data transmitted from one deviceis received by all other available devices which in turn reduces network efficiency. For example-LAN switching is a modern technology and Football organization uses this technique to enablesfor controlling the switch port and every switch port associates with the fast Ethernet. It helps formanage the display speed and duplex.Ethernet:This technology is very effective in terms of cost and flexibility in topologies. It usesCSMA/CD mechanism for controlling access. It executes in TCP/IP architecture of link layerand provides connectionless communication. This technology has low cost and higher immunityto noise but it does not support traffic intensive applications and acknowledgement facility(Liang and Yu, 2015). It provides easy troubleshooting methods and transfer speed can beincreased up to Gbps as well. However, it does not support video and voice traffic. This3
Local Area Networking Technologies - Doc_4
technology will be the best option for FootFall Ltd in terms of speed and security measures. ForExample: If connect computer with 10 BASE-T NIC to a 100 BASE-T network, the computerwill only be able to send and receive data at 10 Mbps. But if Gigabit Ethernet router connectdevices it using 100BASE-T cables with maximum data transfer rate will be 100 Mbps.Voice over protocol:This technology integrates the local area network with phone calls. Thus, users can makecalls over LAN. It converts voice signal (analog) into digital signals. As compare to traditionalmethods of calling system VoIP is less costly and its quality is not affected by the distancebetween sender and receiver. However, for high quality it requires private box exchange withhigh speed internet connection. It suffers from major disadvantage, that it requires power supplyand internet connection. In the absence of these factors the organization will not be able to makecalls. The bandwidth requirement of voice over protocol are higher and due to this data packetsare delayed during transmission. It can also be a challenging and difficult task to trace theaddress of the sender. Thus, from security concerns it may not be considered suitable for theorganization. The speed of processor is variable with multitasking approaches. The quality ofcalls made by voice over protocol LAN technology can degrade if speed of the processor isreduced. For examples of applications that use VOIP technology are whats app, google phone,Facebook video, voice chat and Skype.A.C 1.2 Performance evaluation of traffic intensive services Certain activities which are in high demand and keeps the traffic engaged at greaterextent are known as traffic intensive activities. For instance, downloading, video and audiostreaming are highly intensive towards traffic whereas activities like chatting, browsing does notcontribute to network traffic. For ensuring the effectiveness of the LAN system, it is essential forFootfall Ltd to analyse performance of these traffic intensive services. The organisation mustconsider the performance of traffic intensive services in order to achieve its objectives of LANImplementation. Quality of service (QoS) measures the overall effectiveness of LAN network by givingpriority to various applications and ensuring desired standards in performance. These servicesaim at minimizing the network traffic by monitoring the extent of traffic and delay in datatransmission. Their performance can be measured by factors like bandwidth, loss of data packetsand delays. For instance, for Footfall Ltd voice over IP can be the first priority and video4
Local Area Networking Technologies - Doc_5
streaming can be second priority so when both requests are appeared simultaneously then QoSgives priority to VOIP and will hold secondary activities until network traffic is not cleared. Thisapproach not only improve effectiveness but also reduces operating costs. For giving priorities toactivities quality of service standards mark the data packets by means of either IP precedence orIP DSCP (differentiated service code point). For giving priority to data packets with IP precedence method the data packet which hashigher value of IP precedence field will be given first priority. IP precedence uses only first threebits for allocating the priority while on the other hand DSCP uses the first 6 bits for prioritizingthe packets (Liang, Yu, and Zhang, 2015). The delay experienced by traffic intensive servicesdue to priority allocation by QoS also depends upon the position of the data or IP packets in thequeue. The traffic intensive activities can also use frame tagging methods. These methods identify the data packets which passes through trunk lines. Theidentification is accomplished by giving them specific tags before transmissions. The tagging ofpackets ensure that data packets are not lost and network traffic is not disturbed by interventionfrom these misplaced packets. Hence, it is essential for the organisation that these trafficintensive services are monitored regularly. Their performance evaluation parameters such asdelay, traffic intensity, and effectiveness in giving priority to desired operations. A.C 1.3 Recommendations for sustaining the performance, security and reliability of LAN The major concerns in relation with the local area networking are security and controlrelated concerns. The desired LAN implementation of Footfall Ltd must ensure that trafficintensive services are effectively used so that network traffic does not degrade the performanceof the network. The networking system must use appropriate security measurements to ensurethe data transmission via safe and secure networking path. The most basic approach which canbe used by the organisation to avoid security threat is to keep their antivirus database updated. Itwill greatly reduce the risks of security threats (threats to wireless security, 2010). If Footfall Ltd employs wireless LAN, then it becomes essential for the organisation toinclude passive monitoring. There are possibilities that the data is unintentionally propagatedoutside the wireless range of organisation and thus it can be easily vulnerable to unauthorisedaccessing. During transmissions via LAN network it may happen that more than one systemtransmits the signal or data at the same time. In such cases in order to avoid signal interference orcollision media access control methods (MAC) can be used. MAC methods are implemented at5
Local Area Networking Technologies - Doc_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Local Area Networking Technologies : Assignment
|27
|6446
|460

Local Area Networking Technologies PDF
|8
|2286
|116

Riordan Network Security Recommendations Assignment
|5
|923
|161

(PDF) Comparison of Wi-Fi IEEE 802.11 Standards
|26
|7309
|66

Wireless Local Area Network
|9
|2461
|39

Network Security for Ethernet Switching
|23
|2840
|398