LAN Technologies and Implementation: A Detailed Infrastructure Report
VerifiedAdded on  2024/06/13
|35
|5428
|97
Report
AI Summary
This report provides a detailed analysis of Local Area Network (LAN) technologies, focusing on their implementation, security, and performance. It begins by evaluating different LAN technologies such as wired (Ethernet) and wireless (Wi-Fi), along with VLANs, repeaters, bridges, hubs, routers, switches, and various cable types like coaxial and fiber optic. The report then critically analyzes traffic-intensive services like VoIP and video streaming, discussing their performance and the importance of Quality of Service (QoS). It addresses LAN concerns related to latency, loss, jitter, bandwidth, and throughput, and recommends strategies for sustaining network security, reliability, and performance, including CIA triad principles, access control lists, and firewalls. Furthermore, the report designs a LAN infrastructure for a three-floor building, evaluating the suitability of LAN components based on availability, security, reboot time, downtime, and temperature fluctuation. It also touches upon security considerations in LAN design and maintenance. The document emphasizes the importance of these elements in creating a robust and efficient network.

Introduction:
LAN is termed as local area network. The LAN is interconnection of several devices. The devices are
situated at fixed location. The LAN is established at several places lie offices, schools, homes,
colleges and other areas. A LAN is of both types either wireless or wired.
After reading this local area network report the concept about the LAN is cleared. This report is
divided into four learning outcomes. In first learning outcome what is LAN, the types of LAN
technology and which technology is best among those is discussed. In second learning outcome how
the LAN is implemented and what are the suitable components are used in the infrastructure is
discussed. In third section of learning the LAN is build and implemented with some security features
in the infrastructure. The several tests are also performed to check the efficiency of designed
infrastructure. In last section of learning it detail about the tools used for monitor and troubleshoot the
LAN infrastructure. It will also detail about the issue related to reliability, security and performance
are resolved and how performance is evaluated in the infrastructure is discuses in the report.
LAN is termed as local area network. The LAN is interconnection of several devices. The devices are
situated at fixed location. The LAN is established at several places lie offices, schools, homes,
colleges and other areas. A LAN is of both types either wireless or wired.
After reading this local area network report the concept about the LAN is cleared. This report is
divided into four learning outcomes. In first learning outcome what is LAN, the types of LAN
technology and which technology is best among those is discussed. In second learning outcome how
the LAN is implemented and what are the suitable components are used in the infrastructure is
discussed. In third section of learning the LAN is build and implemented with some security features
in the infrastructure. The several tests are also performed to check the efficiency of designed
infrastructure. In last section of learning it detail about the tools used for monitor and troubleshoot the
LAN infrastructure. It will also detail about the issue related to reliability, security and performance
are resolved and how performance is evaluated in the infrastructure is discuses in the report.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO1 Understand the impact of LAN technologies
Task 1
1.1 critically evaluate different LAN technologies
Local area network- LAN is a collection of computers or associated devices which have a common
communication link. Communication link is used to pass information between the multiple computers
and other devices. Local area network used in many applications (Techterms, 2018).
Figure 1 local area network
Source: (Tech Terms)
Types of LAN-
Wired LAN- wired networks are also known as Ethernet networks. Wired network is group of two or
many computers or printers. Ethernet has very high connection speed which is from 10 Mbps to 100
Mbps so Ethernet is the fastest wired network. There are 3 common network topologies which are
very useful such as star network, bus network and ring network.
Wireless local area network- wireless network uses very high-frequency radio waves for
communication between the nodes. Wireless network also used in home and business networking.
Organization use wireless network to increase their existing wired network. There are 2 types of
wireless networks such as ad-hoc and peer to peer.
IEEE standards for Wired LAN (Ethernet IEEE 802.3) - Ethernet, IEEE 802.3 are most useful
standard for general data communication or computer networking. 802.3 specify the working
characteristics or the physical media of Ethernet. Ethernet standard is used to fulfill the requirement
or needs of growing technology. Ethernet supports data rate of 10 Mbps. Ethernet is used for the
wired networks for computers and Ethernet also provide supports to many large or small data
communication system.
IEEE standards for Wireless LAN (Wi-Fi IEEE 802.11)- there are many specifications in 802.11
family.
Task 1
1.1 critically evaluate different LAN technologies
Local area network- LAN is a collection of computers or associated devices which have a common
communication link. Communication link is used to pass information between the multiple computers
and other devices. Local area network used in many applications (Techterms, 2018).
Figure 1 local area network
Source: (Tech Terms)
Types of LAN-
Wired LAN- wired networks are also known as Ethernet networks. Wired network is group of two or
many computers or printers. Ethernet has very high connection speed which is from 10 Mbps to 100
Mbps so Ethernet is the fastest wired network. There are 3 common network topologies which are
very useful such as star network, bus network and ring network.
Wireless local area network- wireless network uses very high-frequency radio waves for
communication between the nodes. Wireless network also used in home and business networking.
Organization use wireless network to increase their existing wired network. There are 2 types of
wireless networks such as ad-hoc and peer to peer.
IEEE standards for Wired LAN (Ethernet IEEE 802.3) - Ethernet, IEEE 802.3 are most useful
standard for general data communication or computer networking. 802.3 specify the working
characteristics or the physical media of Ethernet. Ethernet standard is used to fulfill the requirement
or needs of growing technology. Ethernet supports data rate of 10 Mbps. Ethernet is used for the
wired networks for computers and Ethernet also provide supports to many large or small data
communication system.
IEEE standards for Wireless LAN (Wi-Fi IEEE 802.11)- there are many specifications in 802.11
family.

802.11- 802.11 use DSSS and FHSS spectrums are provide one and two Mbps transmission in 2.4
GHz band.
802.11a- 802.11a applies to the wireless LANs & provides 54 Mbps transmission in 5GHz band.
802.11b- 802.11b also applies to wireless LANs and provides 11 Mbps transmission.
802.11e- 802.11e defines the QoS supports for local area network.
VLAN- VLAN is a logical collection of network devices, servers, or workstations. VLAN provide the
network in which the different users or the network of computers are allowed to communicate in the
environment where there can be a multicast domain & single broadcast. VLAN is applied to achieve
security, ease of network management, or scalability (Charriere, 2018).
There are 5 types of VLAN such as
1. management VLAN
2. data VLAN- data VLAN I also called as user VLAN. The user VLAN is select for user-generated
data.
3. voice virtual local area network
4. default VLAN
5. native VLAN (Charriere, 2018)
Benefits of virtual local area network:
ï‚· Improved quality of services
ï‚· Improved security- virtual local area networks improve security of system by reducing external or
internal threats.
ï‚· Easier fault management
Repeaters- Repeaters works on physical layer. Repeaters are used to regenerate the signals before the
signals become weak.
Bridges- bridges works on data link layer. Bridge works same as repeater with some other functionality.
Bridges are used for interconnection of 2 LANs which are working on the common protocol. Bridge has
one input or one output port. Types of bridges
ï‚· Source routing bridges
ï‚· Transparent bridges
GHz band.
802.11a- 802.11a applies to the wireless LANs & provides 54 Mbps transmission in 5GHz band.
802.11b- 802.11b also applies to wireless LANs and provides 11 Mbps transmission.
802.11e- 802.11e defines the QoS supports for local area network.
VLAN- VLAN is a logical collection of network devices, servers, or workstations. VLAN provide the
network in which the different users or the network of computers are allowed to communicate in the
environment where there can be a multicast domain & single broadcast. VLAN is applied to achieve
security, ease of network management, or scalability (Charriere, 2018).
There are 5 types of VLAN such as
1. management VLAN
2. data VLAN- data VLAN I also called as user VLAN. The user VLAN is select for user-generated
data.
3. voice virtual local area network
4. default VLAN
5. native VLAN (Charriere, 2018)
Benefits of virtual local area network:
ï‚· Improved quality of services
ï‚· Improved security- virtual local area networks improve security of system by reducing external or
internal threats.
ï‚· Easier fault management
Repeaters- Repeaters works on physical layer. Repeaters are used to regenerate the signals before the
signals become weak.
Bridges- bridges works on data link layer. Bridge works same as repeater with some other functionality.
Bridges are used for interconnection of 2 LANs which are working on the common protocol. Bridge has
one input or one output port. Types of bridges
ï‚· Source routing bridges
ï‚· Transparent bridges
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 2 Bridge
Source: (Joe Onisick)
Hubs- hub is used to joint multiple wires which are coming from various branches. For example a
connector in the star topology which is used to joint various stations. Types of hubs
ï‚· Passive hub
ï‚· Active hub
Routers- Routers are devices same as switches that route data packet which is based on the IP
addresses. Routers are used to connect WANs or LANs together (Tyson, 2018).
Switches- switches are work on the layer of local area network. Switches are used for ‘forwarding
and filtering’ of data packets.
Source: (Joe Onisick)
Hubs- hub is used to joint multiple wires which are coming from various branches. For example a
connector in the star topology which is used to joint various stations. Types of hubs
ï‚· Passive hub
ï‚· Active hub
Routers- Routers are devices same as switches that route data packet which is based on the IP
addresses. Routers are used to connect WANs or LANs together (Tyson, 2018).
Switches- switches are work on the layer of local area network. Switches are used for ‘forwarding
and filtering’ of data packets.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 3 routers and bridges
Source: (Gael Charriere)
Coaxial cable- coaxial cables are used for the frequency signals because coaxial cable is work as a
communication line. Coaxial cables provide security of the signals from outside electromagnetic
interference. Coaxial cables are used in many applications such as microwave or RF transmission,
CATV distribution (Omnisecu, 2018) .
Fiber optic- fiber optics is a technology which uses glass or plastic threads for transmission of data.
Fiber optic transmits the data or information from one place to another place. Fiber optic cable
contains a packet of glass or plastic threads.
Source: (Gael Charriere)
Coaxial cable- coaxial cables are used for the frequency signals because coaxial cable is work as a
communication line. Coaxial cables provide security of the signals from outside electromagnetic
interference. Coaxial cables are used in many applications such as microwave or RF transmission,
CATV distribution (Omnisecu, 2018) .
Fiber optic- fiber optics is a technology which uses glass or plastic threads for transmission of data.
Fiber optic transmits the data or information from one place to another place. Fiber optic cable
contains a packet of glass or plastic threads.

1.2 critically analyze traffic intensive services and their performance
Voice over internet protocol- voice over IP is a method which is used for the delivery of multimedia
sessions and voice communication over the IP networks.
Voice-on-demand – it is a programming system which permits customers to select & listen/watch to
audio or video content like TV shows and movies (Rogier, 2018).
Video and audio streaming- Storage size is derived from the length of media and streaming bandwidth
with the help of following method:
Storage size ( in mebibytes) = length ( in seconds) * bit rate ( in kbit/s) / 8388.608
Video bit rate ( in kbit/s) * estimate no. of people = no. of bandwidth ( in kbit/s)
Live streaming-
Length of video ( in seconds) * video bit rate ( in bit/s) / (8 * 1024 * 1024) = storage size ( in
megabytes)
Video bit rate ( in kbit/s) * estimate no. of people = no. of bandwidth ( in kbit/s)
Quality of service- QOS is the measurement and description of the complete performance of the
services such as cloud computing and computer network services. Quality of services is also used in
many application layer services like streaming video or telephony to define a metric which predicts or
reflects the quality of services.
Differentiated services and IP precedence- differentiated services classify the packets when the
packets enter into the local network. This classification is then applied to the flow of traffic. Flow is
explained by five elements; destination IP, Destination port, source IP, transport protocol and source
port (Rogier, 2018).
IP header has a TOS field which is placed among the total length field and header length field. IP
precedence is used first 3 bits of type of service to offer possible precedence value.
000(0)- routine
001(1)- priority
010(2)- immediate
011(3)- flash
100(4)- flash override
101(5)- critical
110(6)- internetwork control
111(7)- network control (Rogier, 2018)
Voice over internet protocol- voice over IP is a method which is used for the delivery of multimedia
sessions and voice communication over the IP networks.
Voice-on-demand – it is a programming system which permits customers to select & listen/watch to
audio or video content like TV shows and movies (Rogier, 2018).
Video and audio streaming- Storage size is derived from the length of media and streaming bandwidth
with the help of following method:
Storage size ( in mebibytes) = length ( in seconds) * bit rate ( in kbit/s) / 8388.608
Video bit rate ( in kbit/s) * estimate no. of people = no. of bandwidth ( in kbit/s)
Live streaming-
Length of video ( in seconds) * video bit rate ( in bit/s) / (8 * 1024 * 1024) = storage size ( in
megabytes)
Video bit rate ( in kbit/s) * estimate no. of people = no. of bandwidth ( in kbit/s)
Quality of service- QOS is the measurement and description of the complete performance of the
services such as cloud computing and computer network services. Quality of services is also used in
many application layer services like streaming video or telephony to define a metric which predicts or
reflects the quality of services.
Differentiated services and IP precedence- differentiated services classify the packets when the
packets enter into the local network. This classification is then applied to the flow of traffic. Flow is
explained by five elements; destination IP, Destination port, source IP, transport protocol and source
port (Rogier, 2018).
IP header has a TOS field which is placed among the total length field and header length field. IP
precedence is used first 3 bits of type of service to offer possible precedence value.
000(0)- routine
001(1)- priority
010(2)- immediate
011(3)- flash
100(4)- flash override
101(5)- critical
110(6)- internetwork control
111(7)- network control (Rogier, 2018)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1.3 Discuss LAN concerns and make recommendations to sustain network
security, reliability, and performance.
Latency- In an internet protocol network, latency is a time which is taken by a packet for entering and
leaving the network. The entering time of packet A = t0 and leaving time of packet A = t1. The
latency of packet A is t2= t1- t0.
Figure 4 Latency
Loss- when one or many packets of information or data are traveling across the network and fail to
reach at their destination, packet loss occurs.
Jitter- jitter is basically the variation in packet delay and it is used to measure the time differences in
packets inter and arrival times.
Bandwidth- bandwidth is the amount of information and data that is transmitted in particular amount
of time. Bandwidth is expressed in bytes per sec or bits per sec for digital devices (Chia, 2012).
Throughput- Throughput is the amount of data or material which is passing via a process and a
system.
Confidentiality, availability, and integrity are also called as CIA triad. CIA triad is a model which is
designed to guide procedures for information and data security.
Confidentiality- Confidentiality is defining as a set of instructions or rules that provide protection to
the personal information. Confidentiality is designed to prevent personal and sensitive information
from the unauthorized users.
Availability- availability gives guarantee of reliable access of the data by authorized user.
Availability checks only authorized user is able to access the data or information.
Integrity- integrity includes maintaining the accuracy, trustworthiness or consistency of data or
information over its complete life cycle.
Access control list- access control list is the network filter which is used by the switches or routers to
restrict & permit data flow into & out of the network interface (Chia, 2012).
security, reliability, and performance.
Latency- In an internet protocol network, latency is a time which is taken by a packet for entering and
leaving the network. The entering time of packet A = t0 and leaving time of packet A = t1. The
latency of packet A is t2= t1- t0.
Figure 4 Latency
Loss- when one or many packets of information or data are traveling across the network and fail to
reach at their destination, packet loss occurs.
Jitter- jitter is basically the variation in packet delay and it is used to measure the time differences in
packets inter and arrival times.
Bandwidth- bandwidth is the amount of information and data that is transmitted in particular amount
of time. Bandwidth is expressed in bytes per sec or bits per sec for digital devices (Chia, 2012).
Throughput- Throughput is the amount of data or material which is passing via a process and a
system.
Confidentiality, availability, and integrity are also called as CIA triad. CIA triad is a model which is
designed to guide procedures for information and data security.
Confidentiality- Confidentiality is defining as a set of instructions or rules that provide protection to
the personal information. Confidentiality is designed to prevent personal and sensitive information
from the unauthorized users.
Availability- availability gives guarantee of reliable access of the data by authorized user.
Availability checks only authorized user is able to access the data or information.
Integrity- integrity includes maintaining the accuracy, trustworthiness or consistency of data or
information over its complete life cycle.
Access control list- access control list is the network filter which is used by the switches or routers to
restrict & permit data flow into & out of the network interface (Chia, 2012).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Firewalls- firewall is a system or software which is used for network security. Firewall controls or
monitors outgoing & incoming network traffic.
Figure 5 Firewall
Source: (David K. Berchem)
monitors outgoing & incoming network traffic.
Figure 5 Firewall
Source: (David K. Berchem)

LO2 Be able to design LAN infrastructures
Task 2
A.C 2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements
Figure 6 LAN infrastructure
The infrastructure given above is a three-floor building where several departments are situated in each
floor of the building like Human resource department, Finance department, Sales and marketing
Department, Customer service department and IT support. This infrastructure has been designed using
switches which is a form of packet switching used in local area network. For network design
switching technologies are crucial since it allows traffic to be send where it is needed. Different
Task 2
A.C 2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements
Figure 6 LAN infrastructure
The infrastructure given above is a three-floor building where several departments are situated in each
floor of the building like Human resource department, Finance department, Sales and marketing
Department, Customer service department and IT support. This infrastructure has been designed using
switches which is a form of packet switching used in local area network. For network design
switching technologies are crucial since it allows traffic to be send where it is needed. Different
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

network switches are used in LAN switching, Routers if wireless displays reference to LAN and
Coaxial cable was widely used in Local Area network which is being replaced recently because of its
high-cost (Omnisecu, 2018).
A.C 2.2 critically evaluate the suitability of LAN components
Suitability of components of local area network can be defined through the below given parameters:
Availability:
This is a factor which is taken according to the point view of user. Taking this model proposed as an
example. When this topography of network is considered it is found that it is available fairly to the
users. According to the illustration it is established that even when the component does not work
properly or fails it is not going to affect the entire system. Although this is possible only in the first
level of networking. When it moves down to the second layer the situation will just be the opposite
where if there is a failure in the component then it is going to harm the whole system .Considering
this case it can be termed as maximum availability. It also takes in consideration these following
factors including:
Reboot time: It is the time which the device takes to perform its operations after the device has been
turned on.
Downtime: It is the time in which a device is not in action or cannot be taken in use (Techwalla,
2015).
Temperature Fluctuation: Random deviations in a system, Fluctuation becomes higher and frequent if
there is an increase in the temperature and it decreases when the temperature is absolute zero.
Security:
With the increase in the transmission of information electronically it is vital that security needs to be
considered in every phase of design and maintenance of local area network .Although a lot of
emphasis has been put on remote access and wireless networks. In organization, information system
works as the nervous system which requires great care to be secured properly. Since more and more
users requires access to resources of local area network, there needs to be a way to restrict and
identify what access they are granted and who is allowed to the network.
This architecture comprises of a complicated structure where it needs to have a robust security
system. Firewalls works on such issues in network communication. A free flow of information is
necessary in an organization like this in the premises with an access to internet. In between the two
forms of communication firewall acts as the secure , best bridge . Firewall works as a guard which
ensures meeting of specific conditions before entering into the network of an organization. In this
information is broken into packets in which there can be interaction with only the given authority.
Besides these secured modem can also be used along with cryptography enabled routers for secured
network communication (Techwalla, 2015).
Security can be achieved through various ways
First method involves firewall resource which has been explained above and others include WPA2 or
WPA for encryption of password on traffic from the internet. LAN requires security strategies which
are internal including anti-malware or anti-virus security , Through user activity hacking functions are
introduced to network. Taking an example many malicious programs or viruses operate off of a user
opening an email. Security design should be considered carefully to promote better security of LAN
to prevent vulnerabilities.
Coaxial cable was widely used in Local Area network which is being replaced recently because of its
high-cost (Omnisecu, 2018).
A.C 2.2 critically evaluate the suitability of LAN components
Suitability of components of local area network can be defined through the below given parameters:
Availability:
This is a factor which is taken according to the point view of user. Taking this model proposed as an
example. When this topography of network is considered it is found that it is available fairly to the
users. According to the illustration it is established that even when the component does not work
properly or fails it is not going to affect the entire system. Although this is possible only in the first
level of networking. When it moves down to the second layer the situation will just be the opposite
where if there is a failure in the component then it is going to harm the whole system .Considering
this case it can be termed as maximum availability. It also takes in consideration these following
factors including:
Reboot time: It is the time which the device takes to perform its operations after the device has been
turned on.
Downtime: It is the time in which a device is not in action or cannot be taken in use (Techwalla,
2015).
Temperature Fluctuation: Random deviations in a system, Fluctuation becomes higher and frequent if
there is an increase in the temperature and it decreases when the temperature is absolute zero.
Security:
With the increase in the transmission of information electronically it is vital that security needs to be
considered in every phase of design and maintenance of local area network .Although a lot of
emphasis has been put on remote access and wireless networks. In organization, information system
works as the nervous system which requires great care to be secured properly. Since more and more
users requires access to resources of local area network, there needs to be a way to restrict and
identify what access they are granted and who is allowed to the network.
This architecture comprises of a complicated structure where it needs to have a robust security
system. Firewalls works on such issues in network communication. A free flow of information is
necessary in an organization like this in the premises with an access to internet. In between the two
forms of communication firewall acts as the secure , best bridge . Firewall works as a guard which
ensures meeting of specific conditions before entering into the network of an organization. In this
information is broken into packets in which there can be interaction with only the given authority.
Besides these secured modem can also be used along with cryptography enabled routers for secured
network communication (Techwalla, 2015).
Security can be achieved through various ways
First method involves firewall resource which has been explained above and others include WPA2 or
WPA for encryption of password on traffic from the internet. LAN requires security strategies which
are internal including anti-malware or anti-virus security , Through user activity hacking functions are
introduced to network. Taking an example many malicious programs or viruses operate off of a user
opening an email. Security design should be considered carefully to promote better security of LAN
to prevent vulnerabilities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Scalability:
Scalability is the capability which a system, process or network has to deal with large amount of work
or the potential to accommodate the growth.
Scalability in local area network can be achieved by two ways:
Vertical- In this method more hardware including processor, RAM or more nodes is added. Load
balancer is also introduced which is going to help in routing the incoming calls to a lot of servers
depending on the routing algorithm used. As load is being shared across the servers, more loads can
be handled by the application.
Horizontal: In this method the application is architect by us in a way that it can behave properly in
parallel traffic. Checking of management of memory, cache , session and states needs to be done.
Session is used to maintain the information of the user in heavy load single server there are more
efforts required to manage the servers to check the possibility of being stateless. It responds to request
from the same user in parallel instead of replying serially.
Scalability is the capability which a system, process or network has to deal with large amount of work
or the potential to accommodate the growth.
Scalability in local area network can be achieved by two ways:
Vertical- In this method more hardware including processor, RAM or more nodes is added. Load
balancer is also introduced which is going to help in routing the incoming calls to a lot of servers
depending on the routing algorithm used. As load is being shared across the servers, more loads can
be handled by the application.
Horizontal: In this method the application is architect by us in a way that it can behave properly in
parallel traffic. Checking of management of memory, cache , session and states needs to be done.
Session is used to maintain the information of the user in heavy load single server there are more
efforts required to manage the servers to check the possibility of being stateless. It responds to request
from the same user in parallel instead of replying serially.

LO3 Be able to implement LAN infrastructures
Task 3
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
Figure 7 Infrastructure of LAN
Task 3
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
Figure 7 Infrastructure of LAN
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 35
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.