Local Area Networking Technologies

Verified

Added on  2023/04/22

|43
|6137
|122
AI Summary
This document discusses LAN technologies, network topologies, traffic intensive services, QoS, and network concerns. It also provides guidance on designing and implementing LAN infrastructures. The proposed network infrastructure uses a star topology and various devices such as routers, switches, computers, DHCP servers, WEB servers, EMAIL servers, DNS servers, file servers, and printers. The document also highlights the use of hierarchical network models and various technologies such as IP address allocations, Spanning Tree Protocol, and subnet ids.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Local Area Networking 1
LOCAL AREA NETWORKING TECHNOLOGIES
By (Student names)
(Class Name)
(Tutor Name)
(University Name)
(Date)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 2
Table of Contents
Task 1: Understand the impact of LAN technologies.....................................................................4
1.1. Network topologies available in the market.....................................................................4
Mesh topology..........................................................................................................................4
Bus Topology............................................................................................................................5
RING Topology.........................................................................................................................6
STAR Topology.........................................................................................................................7
TREE Topology........................................................................................................................8
HYBRID Topology....................................................................................................................9
Most appropriate and suitable technology/topology: Star topology......................................10
1.2 Traffic intensive services of network performance and Quality of Services.......................10
Traffic intensive services of network performance.................................................................10
Quality of Services (QoS).......................................................................................................11
1.3 Local Area Network concerns and recommendations.........................................................12
Hierarchical network model...................................................................................................12
Task 2: Designing LAN infrastructures.........................................................................................14
2.1 Design network infrastructure..............................................................................................14
Topology.................................................................................................................................14
Devices...................................................................................................................................14
Technology.............................................................................................................................15
2.2: Network components and design.......................................................................................17
Evaluating Network components and design.........................................................................17
Security& Applications...........................................................................................................17
Users & Scalability.................................................................................................................18
Task 3: Implementing LAN infrastructures..................................................................................20
3.1: Building and configuring the entire network......................................................................20
Configuration..........................................................................................................................20
Technology and security........................................................................................................26
Documentation.......................................................................................................................26
Security...................................................................................................................................29
3.2: Reviewing and testing the entire network...........................................................................29
Document Page
Local Area Networking 3
Task 4: Managing LAN infrastructure..........................................................................................34
4.1 Network monitoring: WIRE SHARK..................................................................................34
Wire shark monitoring tool....................................................................................................34
4.2: Improving security, reliability, and performance in a local area network..........................35
4.3: Evaluating the network performance..................................................................................36
Document Page
Local Area Networking 4
Task 1: Understand the impact of LAN technologies
1.1. Network topologies available in the market
The network topology is the design of the network infrastructure which illustrates the general
layout of the network devices and it allows effective communications, therefore the proposed
local area network topology will essentially define the geographical arrangement of the proposed
network devices. Below are the various types of network topologies in the market (Benjamin,
2003, p. 34).
Mesh topology.
The mesh topology is a point to point designs of topology that make use of the dedicated
links between the network devices , however it is not the best design since it wastes allot of
transmission media and also it is quite challenging to do installation and configuration. The
increase of the network devices in this type of network leads to decrease in the communications
speed. One of the feature of mesh topology is robustness (Blair & Durai, 2016, p. 57)
Figure 1: Mesh topology

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 5
Bus Topology
This is physical topology which is simple in nature and it is made of continuous cable
called trunk and some terminating resistors called terminators at the ends. The data packet travels
along the bus in both forward and reverse directions until it gets the target workstations or
servers network interface cards. In this type of topology, each and every network device and
computers are connected to a single type of cable that has two endpoints as shown in the figure
below.
Figure 2: Bus Topology
Document Page
Local Area Networking 6
Features of Bus Topology
1. It is only able to transmit data in one direction.
2. All devices are connected to single cable.
RING Topology
This is type of topology which has circular loops made of point to point links where
every device is connected directly or indirectly to the ring via the interface devices or drop
cables, however in this topology the messages are able to travel round the ring from one node to
the other in an orderly manner and in this case the node devices check sent messages and match
them with the destination addresses (Blanc & Cotton, 2014, p. 79).
Therefore it is referred to ring topology since a ring is formed while the computers are
connected to each other where the last computer gets connected to the last computer as shown in
the figure below.
Figure 5: Ring Topology
Document Page
Local Area Networking 7
Features of Ring Topology
1. There is use of many repeaters with multiple nodes and the repeaters prevent data loss in
the network.
2. It supports unidirectional transmission or bidirectional if it has two connections between
nodes.
3. The dual ring topology has two rings networks that allow data to be flowing in opposite
directions and each act as a backup in case one of them fails and the network remains up.
4. It supports the sequential transmission of data in bits by bits where the transmitted data
pass through each network’s node till it arrives at the destination node.
STAR Topology
This is type of topology that makes use of centralized controlling hub which points in all
directions like the star points , however the network devices have dedicated point to point links

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Local Area Networking 8
to the central hub , therefore this type of topology is used to control the collisions by keeping the
communication lines open and free from the network traffics (Burridge, 2015).
Therefore this topology enables the connection of devices to one hub through the network
cables where the hub acts as a central node to which all nodes devices are connected to as shown
in the figure below.
Figure 6: Start Topology
Features of Star Topology
1. Each node device has a single dedicated type of connection to the hub.
2. The hub is used as the repeater to allow data flow.
3. It is compatible with various media like twisted pair cable, fiber optic cables and co-axial
cables.
TREE Topology
This is the type of topology that is made of root node into which other nodes are connected to
in order to form a hierarchy and it has like three or more hierarchical levels as shown below.
Document Page
Local Area Networking 9
Figure 7: Tree Topology
Features of Tree Topology
1. It is best in a situation which the workstations are located as groups.
2. It is mainly used in Wide Area Networks.
HYBRID Topology
This is a topology that is made by a mixed type of topology, for instance, a star topology
can be connected to a ring topology which as results forms a hybrid topology as in the figure
below.
Figure 8: Hybrid topology
Document Page
Local Area Networking 10
Features of Hybrid Topology
1. It is formed by two combined topologies.
2. It adopts both advantages and disadvantages of the combined topologies used.
Most appropriate and suitable technology/topology: Star topology
In the proposed network infrastructure the star topology is the most appropriate topology,
this is because there is use of many VLANs that are used to connect the four departmental
networks and the various network servers, however this network installation is easy to install,
configure, troubleshoot, modify, upgrade and failure of one node do not affect other nodes in the
network (Cerpa, 2010, p. 69).
1.2 Traffic intensive services of network performance and Quality of Services
Traffic intensive services of network performance
The network traffic intensive service determines the performance of the network and is
determined by various factors which include the following.
i. Bonding-

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 11
This is used in the creation of the network redundancy in the network connections where the
physical links create logical links which are aggregated with IEEE 802.3ad
ii. Speed-
This is the networking speed, throughput, and bandwidth that measures the amount of data that
moves through the network in a given duration of time, therefore the connection speed is the
network speed which is considered while buying networking devices to be used.
iii. Distance-
This is far that data packet travels in order to receive from one point on the network to the other
end and it refers to distances traveled by data packets before they are rebuilt by a switch (Dean,
2013, p. 156).
Quality of Services (QoS)
The quality of service in the network is measurable through the use of various parameters
which includes the following:
 Delay: This is the specification of the duration taken by the bit of data packet to travel
across the entire network from a certain node device to the other which is measured in
terms of seconds.
 Delay variation: This is the in the end to end one-way delays between a set of selected
packets in the flow where the lost packets get ignored.
 Bandwidth (maximum data transfer rates): This refers to the total amount of data
which is transmitted in any given time in seconds through the network.
 Packet loss rates: This is the rate at which the data packet that travels over the
network fails to arrive at its destinations.
Document Page
Local Area Networking 12
 Excessive latency: This refers to the delay that could happen in the data
communications over the computer networks which could even have some impacts on
the network bandwidth as well.
 Jitter: This refers to the variations occurring in the delay of the received data packets
which occurs due to the network’s congestions, improper queues, configurations
errors, and thus the delay vary instead of being constant (Forouzan & Mosharraf,
2012, p. 89).
When the network is operating without any quality of service will impact the operation of the
organization business operations as follows:
 It does not guarantee services to the customers.
 It is not credible and is less reliable too.
 There are no guaranteed profits.
 It easily loss to the competitors of their service.
 It has less delivery and has no satisfaction to customers.
 It experiences long outage and downtime.
 It results to use of more time on customer calls while giving explanations.
 Number of complaints are received from the customers, stakeholders and the
shareholders.
1.3 Local Area Network concerns and recommendations
One of the concerns with LAN is availability, security, and scalability. This can be sorted
out by implementing a hierarchical network model
Document Page
Local Area Networking 13
Hierarchical network model
Figure 8: Hierarchical network model
The above is a hierarchical network model and is used instead of the flat model since it is
able to improve the network flexibility and growth. The Hierarchical Network Design will be
used to do a grouping of the network devices where the devices are organized in a layered
approach. This, in turn, helps in improving security as it enables easy planning of security
devices, filters, and firewalls which will be used in safeguarding the various network devices and
resources. In addition, a network engineer is able to add a network device with ease (Frye, 2013,
p. 59).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Local Area Networking 14
Task 2: Designing LAN infrastructures
2.1 Design network infrastructure
Topology
In this proposed network the network topology is the star topology which is a topology
that is used in the implementation of the local area networks (LAN) where all the network nodes
are connected to a centralized point called central switch , therefore in the proposed network the
switches that connect the finance, HR, Design, and Sales departments are then connected to the
central switch that also links the DHCP, DNS, WEB, EMAIL and FILE servers which forms a
large local area network with a star topology (Green, 2013, p. 112).
Devices
In this design, there are various devices to be used as highlighted in the table below
Table 1: Devices to be used
Device name Purpose
1. Router The router is used as a layer 3 device that mainly forwards data packets
to the destination IP addresses and mainly is used to do connection of the
various VLANs in the proposed network and forwards the data packets
to the destination VLAN device.
2. Switch The switch is a layer 2 device and it is used to connect the computer
devices like the servers, computers, printers, and routers together where
it acts as a bridge which consist of multiple ports that processes and
routes data packets in the network’s data link layer.
3. Computers The computers are layer 1 end devices which are used to key in
Document Page
Local Area Networking 15
information by the users or even retrieving the information from the
network to the user’s interfaces.
4. DHCP
server
This is the server that is used to automatically allocate the IP addresses to
the devices that are connected to the network.
5. WEB
server
This is the server that is used to host the website of the organization and
it can be accessed by the users using the connected computing devices.
6. EMAIL
server
This is the server that is used to share the email files to the various users
in the organization and is used as a means of communication.
7. DNS server This a server that will be used to store and manage the directory of
domains names which it then translates to internet protocol addresses and
can be used to access the hosted websites (France, 2013, p. 123).
8. FILE
server
This is a server that will be used to provide the locations of the shared
files disks to the other users in the network.
9. Printer The printer is the network device that will be used to print the documents
in the various departments where each department is allocated its own
printer.
Technology
In the implementation of this network, the various technologies were used which includes
the IP address allocations, selection of the Spanning Tree Protocol and the subnet ids as in the
table below.
Table 2: Technology to be used
VLAN Network- subnet subnet Ids Default IP address Broadcast STP
Document Page
Local Area Networking 16
name address mask gateway range Ids
Financ
e
192.168.12.7 255.255.255.
0
192.168.12.7 192.168.12.7 192.168.12.7-
192.168.12.18
192.168.12.18 IEEE
802.1
D
HR 192.168.12.1
9
255.255.255.
0
192.168.12.1
9
192.168.12.1
9
192.168.12.19
-
192.168.12.25
192.168.12.25 IEEE
802.1
D
Design 192.168.12.2
6
255.255.255.
0
192.168.12.2
6
192.168.12.2
6
192.168.12.26
-
192.168.12.68
192.168.12.68 IEEE
802.1
D
Sales 192.168.12.6
9
255.255.255.
0
192.168.12.6
9
192.168.12.6
9
192.168.12.69
-
192.168.12.13
9
192.168.12.13
9
IEEE
802.1
D
DHCP 192.168.12.2 255.255.255.
0
192.168.12.2 192.168.12.1 192.168.12.2-
192.168.12.2
192.168.12.25
5
IEEE
802.1
D
DNS 192.168.12.3 255.255.255.
0
192.168.12.3 192.168.12.1 192.168.12.3-
192.168.12.3
192.168.12.25
5
IEEE
802.1
D
WEB 192.168.12.4 255.255.255.
0
192.168.12.4 192.168.12.1 192.168.12.4-
192.168.12.4
192.168.12.25
5
IEEE
802.1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 17
D
EMAI
L
192.168.12.5 255.255.255.
0
192.168.12.5 192.168.12.1 192.168.12.5-
192.168.12.5
192.168.12.25
5
IEEE
802.1
D
FILE 192.168.12.6 255.255.255.
0
192.168.12.6 192.168.12.1 192.168.12.6-
192.168.12.26
192.168.12.25
5
IEEE
802.1
D
2.2: Network components and design
Evaluating Network components and design
The provided network design is able to fulfill the requirements of the provided scenario as
follows:
 Use of star topology in the network design had ensured that the network is scalable as
it can support future growth of the network.
 Use of the star topology in the network design had also supported the availability of
the network services, this is because the network remains up even if one end node
device fails it does not affect other devices or the entire network.
 The network design has various vlans for the four departments which are installed
with the computers and printers respectively to be used by the organization staffs.
 The network design has the DNS server installed to be used to store the domain
names directories.
 The network design has a web server installed to be used to host the organization
website system.
Document Page
Local Area Networking 18
 The network design has Email sever installed to be used to share mail messages
among the staffs in the organization.
 The network design has a DHCP server installed to be used for the automatic
allocation of the IP addresses to the various network devices (Wysocki, et al., 2016,
p. 97).
 The network design has File server installed which has a shared memory to other
devices to share the files and other applications.
Security& Applications
In this proposed network design the various ways are used to secure the network, to ensure
the quality of service needs are meet and redundancy is also implemented as follows.
Securing the organization network. There are various measures used to ensure the network is
secure which are: use of firewalls, encrypting the organization network, and upgrading the router
firmware (HEKMAT, 2016, p. 149).
Ensuring QoS
The designed network had also maintained the quality of service by ensuring the organization
network is always up and running at all time
How to maintain redundancy
The network design had maintained the redundancy as it had used the star topology in the
network design and in case one end device fails or one VLAN switch fails it does not affect the
entire network but the rest of the network devices continue working normally (McIsaac, 2013, p.
179).
Document Page
Local Area Networking 19
Users & Scalability
The network design is able to support growth, the addition of network devices and it supports
availability and also provides security as follows.
i. The network design can be added more switches and the ip address space is not
exhausted and thus supporting future growth.
ii. The network design is able to accept new additional devices which are then allocated
ip addresses by the DHCP server automatically.
iii. The network design also supports availability as it is able to run even when one or
more network devices fail without affecting the entire network.
Figure 9: Sysco network design

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Local Area Networking 20
Task 3: Implementing LAN infrastructures
This section will have two sections. Part one will show how to go about in building and
configuring the entire organization network which is part of any network implementation. This
will include configuration of the various routers and switches, how to go about trunking and
other technology-related configuration such as VLANs, ACLs, DHCP, and VTP. Also, this
section will document the network diagram, end device configuration table, and devices
configuration tables. Lastly, this section will highlight how the organization can implement
network security measures to suite this given scenario. In part two will demonstrate and test the
scalability of the network this will include evaluation, availability, security, testing, security, and
review of the important areas which needs enhancement.
Document Page
Local Area Networking 21
3.1: Building and configuring the entire network
Configuration
Switch configuration
For this case, the switch to be used are manageable switches. To configure the switches
this report will go for command interface mode where the main commands for switch
configuration are exec and global configuration. Each of the department ought to have a switch
and one main switch which connects the DNS server, web mail server, and the file server
(Perkins, 2013, p. 115).
To configure the main switch the following commands are used as shown by figure one
Figure 1: Main switch configuration
Document Page
Local Area Networking 22
Figure 2: highlights finance and HR department switch configurations

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 23
Document Page
Local Area Networking 24
Figure 4: Sales and Design switch configuration
Document Page
Local Area Networking 25
Router configuration
The organization will only have one router which will be installed between the
organization firewall and the main switch. Figure 5 shows how the router will be installed in the
organization with a network address of 192.168.14.0. The DNS server IP address in this case will
be 192.168.14.1 (Zapata, 2004, p. 137)
Figure 5: Router configuration

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Local Area Networking 26
Technology and security
For this case the organization will utilize the use of DHCP, DNS server and Remote
Access technologies. Without a DNS then the company network engineer will have to assign IP
addresses manually. A DNS will enable storing of hostnames and IP addresses. This enables in
resolving users queries who may wish to access a certain site and device. Remote access
technology will be used by the network administrator to remotely troubleshoot network related
issues (Clark, 2009, p. 340)
DHCP configuration
The minimum requirements of a DHCP server is an installed windows server 2003
edition. The network engineer ought first to configure the static IP address, then install the
DHCP services by opening network services and selecting DHCP service, this is followed by
clicking Ok then next until the DHCP is installed and set.
To configure the DNS server one first runs the retrieve list of all the one thirty
PowerShell DNS functions. In here the network engineer needs to use the get-DNSServer
command so as to retrieve the server configurations data. Other commands are to use is the Get-
DNSServer command and the CimSession command. The last command is restarting the DNS
service. To configure Remote Access technology one just need to click programs and then
administrative tools and then routing. Second is to start the Remote Access Wizard and then
verifying all the IPs (Dean, 2013, p. 17).
Document Page
Local Area Networking 27
Documentation
Network diagram documentation
As shown by the network diagram in the previous section; the diagram has utilized a
GPON type of infrastructure. In here, the network engineer uses Passive Optical Splitters so as to
divide one optical connection so that it can serve lots of endpoints. In here, the network engineer
has utilized splitters so as to increase all the available connections instead of depending on
switches only. The splitters act as switches and they do not require power like routers and
manageable switches. The diagram below is a network diagram documentation
Figure 2: Network documentation diagram
Document Page
Local Area Networking 28
Devices Configuration table
Router configuration table
Device Name
Model
Interface Name MAC address IP Routing
Protocol
Ethna, Cisco 1760-
V
Fa0/0 0007.8580.a159 EIGRP 10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 29
Vesusvius Cisco
2611XM
S0/1 - OSPF
Switch configuration table
CatalstName,
Model,
Management
IP address
Port
Name
Speed Duplex STP
State
PortFas
t
Trunk
Status
Ether
Channnel
VLANs
WS-C3550-24-
SMI,
192.168.12.24
0
Fa0/1 10 Full Fwd No On - -
Fa0/1 100 Full Block No Off - -
Fa0/7 A-100 A-Full Fwd No on L2 5
End device configuration table
End User computer configuration table
Parameter Value Description
Channel Model Rayleigh fading
model
Path Loss Coefficient
Document Page
Local Area Networking 30
Network Size 10 km * 10 km
square
Transmission range
TCP maximum
Segment size
776 bytes FTP and VoIP
Security
To secure the organization network, an organization need to employ the use of detection
and prevention systems. This is able to limit any malicious traffic that has that ability to enter the
organization network. In addition, it is very important to use network access control so as to
ensure that security at the endpoints. Lastly, the organization needs to employ the use of anti-
virus software to the end devices and the servers to protect them against any form of attack
(Kershenbaum, 2015, p. 58).
3.2: Reviewing and testing the entire network
Scalability network testing involves testing of server request and response time. It also
involves testing the capability of an organization network to scale up or to add any device with
ease. This done as part of capacity testing where one determines the number of transactions or
users the organization can support. To do this the network engineer needs to know the number of
additional resources which can be added in the current network. For this case, the network design
has utilized GPON technology; in here a network engineer is able to add any user devices up to
100 for each department due to the use of optical splitters.
In terms of availability, the network engineer has utilized splitters so as to increase all the
available connections instead of depending on routers and switches only to provide connection to
the various end-user computer and to the server.
Document Page
Local Area Networking 31
About security aspect of the organization network has been met by utilizing IDS/IPS,
firewalls and anti-virus software. To test VLAN connection, the very best command to use is the
ping command for example to test the finance department VLAN is tested for connection by
pinging its IP address using the commands
Ping 192.168.12.6
To test the HR department vlan we use the command
Ping 192.168.12.20
To test the design department vlan we use the command
Ping 192.168.12.27
To test the sales department vlan the command ping 192.168.12.70 is used
Testing DNS, email, and the web server
Figure below shows the how this project went ahead to test the DNS server

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Local Area Networking 32
Testing email server the network engineer used the SNMP testing tool which is as shown by the
commands below
Document Page
Local Area Networking 33
MX Record Target: 1 mta7.am0.sysco.net.
IP address: 192.168.229.58 (united kingdom)
Status: Success
Test duration(ms): 359
Web-server testing
Web-server performance is one of the important elements when determining the health of
an organization network. To test the performance for this case web-server, one needs to perform
a distributed test from the various end-points. This will include testing the server speed,
automated alerts, waterfall charts, and server response time. To test the web-server for this sysco
Company this report utilized pingdom tool as shown by the snapshot below
Figure 8: Web-server test tool
Document Page
Local Area Networking 34
Review: Areas of improvement in future
One of the areas of enhancement in the future is to use a Citrix –based thin technology so
as to reduce the amount of data which flows through a network. In addition, for the large files
attached to the organization email, it is important for them to remain inside the data center unless
they are copied to a personal computer.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 35
Task 4: Managing LAN infrastructure
4.1 Network monitoring: WIRE SHARK
The network security is one of the major issues to be considered when designing a
network, so as to ensure that the network is secure and cannot be attacked by the intruders who
want to gain unauthorized access, the network is monitored using some tools like wire shark and
PRTG network monitor but in this for this case this report will for Wireshark
Wire shark monitoring tool
As shown by the figure above the Wireshark is used to profile the network’s traffic and also to
analyze the data packets, therefore, it is the type of network analyzer, network’s protocols
analyzer or a sniffer.
Document Page
Local Area Networking 36
Why Wireshark
It is used in troubleshooting the network problem and identifies any source of error.
Second, the tool can be used to examine any type of security problem by detecting intrusion.
Third, the tool can also be used to debug protocols implementation (Wang, 2004, p. 69)
4.2: Improving security, reliability, and performance in a local area network
The networking usability is very essential and is determined by various factors which include
security, reliability, and performance and they can be improved through the following ways:
 By performing the network audit and mappings.
 By keeping the network infrastructure updated.
 By ensuring the network is having physical security like lockable rooms
 By implementation of the VLANs which are important in segregation of the network
traffic.
 By making use of authentication features like the 802.1X
 By making use of the virtual private network to do the network and network devices
encryption.
 Using standardized topologies that ensure that the network run even after a device fails
for example use of star topology.
 The network performance can be improved by splitting the network and forming a
hierarchical network model to improve network redundancy.
4.3: Evaluating the network performance
The implemented network is able to perform according to the scenario requirements where
the computers are able to communicate with the servers, print documents using VLAN network
printers and also sharing files through the server.
Document Page
Local Area Networking 37
Below are ways of improving the network performance.
 Through the disks stripping: This is by combining several hard disks to a single logical
drive and then stripping the data across all.
 By balancing the network system bus loads: This is by separating the input-output
modules in the network interface cards to be connected in different network bus.
 By cleaning the network protocol: This is removing the protocols in the network but they
are not being used.
 Adjusting the TCP/IP settings: This is adjusting the window size in order to improve the
network throughput and bandwidth.
 Implementation of the LAN bandwidths saving model: This is using technology to reduce
network utilization and latency (Peterson & Davie, 2017, p. 159).
References
Benjamin, 2003. Optimized network topologies for high power filter.. 1st ed. New York:
University of Leeds.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Local Area Networking 38
Blair, R. & Durai, A., 2016. Ip multicast: Cisco IP multicast networking. 3rd ed. Chicago: Cisco
press.
Blanc, R. P. & Cotton, I. W., 2014. Computer networking by Robert P Blanc. 2nd ed.
Amsterdam: RTU Publishing House.
Burridge, A., 2015. Campus LAN Design – A Different Approach. [Online]
Available at: https://packetpushers.net/campus-lan-design-a-different-approach/
Cerpa, A. &. E., 2010. Ascent: Adaptive self-configuring sensor network topologies. Network
Topologies , 31(4), pp. 62-70.
Clark, D. L., 2009. IT manager's guide to virtual private networks. Virtual Private Networks,
2(1), pp. 334-378.
Dean, T., 2013. Network+ guide to networks. 1st ed. Boston: Cengage Learning.
Dickey, J., 2014. The evolution of private WANs: LANs and WANs converge. [Online]
Available at: https://www.talari.com/blog/history-of-wan-part-2/
[Accessed 31st August 2018].
Forouzan, B. A. & Mosharraf, F., 2012. Computer networks : a top-down approach. s.l.:s.n.
France, P. W., 2013. Local access network technologies by P W France. 3rd ed. New York:
Institution of Engineering and Technology.
Frye, D. W., 2013. Network security policies and procedures by Douglas W Frye. Chicago: John
& Wiley.
Document Page
Local Area Networking 39
Funkhouser, T., 2003. Network Topologies for Scalable Multi-User Virtual Environments.
Network Topologies, 96(12), p. 222.
Green, 2013. Computer Network Architectures and Protocols.. s.l.:Springer Verlag.
HEKMAT, R., 2016. AD-HOC NETWORKS : fundamental properties and network topologies..
1st ed. New York: Springer.
Huang, S. C. -H., 2014. Network security. by Scott C -H Huang. New York: Springer.
Hutchison, D., 2003. Local area network architectures by David Hutchison. 2nd ed. Ney York:
Addison-Wesley.
INTELECOMIntelligentTelecommunications, 2013. Network topologies. 1st ed. Chicago:
Pasadena.
J Espina, T. F. A. P. L. S., 2014. Network topologies, communication protocols, and standards.
In Body sensor networks, II(1), pp. 189-236).
Kawato, M. K. F. a. R. S., 2009. A hierarchical network. 1st ed. New York: John & Wiley.
Kershenbaum, A., 2015. Telecommunications network design algorithms. 1st ed. New York:
McGraw-Hill.
Kitagawa, T., 2013. Computer science and technologies. 1st ed. Tokyo: North-Holland Press.
Kizza, J. M., 2005. Computer Network Security by Joseph Migga Kizza. 3rd ed. Washington
D.C: MA Springer Science+Business Media, Inc..
Document Page
Local Area Networking 40
Kurose, J. F. & Ross, K. W., 2009. Computer networking : a top-down approach. 1st ed.
Chicago: Boston Pearson.
Lachance, D., 2017. Network Components : Exercise: Deploy Cloud Network... by Dan
Lachance. 3rd ed. New Hampshire: Skillsoft Corporation.
Laet, G. D. &. S., 2015. Network Security Fundermentals. New York: Indianapolis.
Lammle, T. & Swartz, J., 2013. CCNA data center : introducing cisco data center networking
study guide : exam 640-911. 4th ed. London: Sybex.
Manning, W., 2011. CompTIA network Plus. 1st ed. Brisbane: Brisbane: The Art of Service.
Matthews, J., 2007. Computer networking : Internet protocols in action. 1st edition ed. New
York: Springer.
Ma, W. A. T. H. E.-S. W. A. L. a. C. T., 2009. Defining network topologies that can achieve
biochemical adaptation.. Network Topologies, IV(34), pp. 760-773.
McIsaac, N., 2013. CompTIA Mobility+ : Point-to-Point Network Topologies. 1st ed. Chicago:
Skillsoft Ireland Limited.
Meyers, M., 2010. CompTIA network+ exam guide by Mike Meyers. 1st ed. New York:
McGraw-Hill.
Mike, 2014. Network topologies by Mike Meyers. 3rd ed. Chicago: Pasadena Press.
Odom, W., 2009. Computer networking first-step by Wendell Odom. 3rd ed. New York: John &
Wiley Press.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Local Area Networking 41
Perkins, 2013. Ad hoc networking. 1st ed. Chicago: Addison-wesley.
Peterson, L. L. & Davie, B. S., 2017. Computer networks : a systems approach by Larry L
Peterson. New York: Springer.
Schiffman, M. D., 2007. Building open source network security tools :... by Mike D Schiffman.
3rd ed. Chicago: Wiley Press.
Vacca, J. R., 2014. Network and system security by John R Vacca. Amsterdam: Boston :
Syngress.
Wang, H. H., 2004. Telecommunications network management. 3rd ed. New York: McGraw-
Hill.
Wysocki, T., Dadej, A. & Wysocki, B. J., 2016. Advanced wired and wireless networks. New
York: Springer.
Young, D., 2015. A+ Essentials : Network Fundamentals Network Topologies by Dan Young. 1st
ed. New Hampshire: Skillsoft Ireland Limited.
Zapata, S. N., 2004. Analysis of cluster interconnection network topologies by Sergio Nathan
Zapata. 1st ed. New York: La Jolla.
Appendix
Document Page
Local Area Networking 42
Document Page
Local Area Networking 43
1 out of 43
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]