LAN Technologies: Design, Implementation, Security & Performance Eval
VerifiedAdded on 2024/06/07
|55
|6554
|219
Report
AI Summary
This report provides a comprehensive overview of Local Area Network (LAN) technologies, focusing on their impact, design, implementation, and management. It begins by critically evaluating different LAN technologies, including wired (IEEE 802.3) and wireless (IEEE 802.11) standards, and virtual LANs (VLANs), discussing their advantages and types. The report analyzes traffic-intensive services like Voice-over-IP (VoIP) and video streaming, detailing their bandwidth consumption and the implementation of Quality-of-Service (QoS) mechanisms. A detailed LAN infrastructure design is presented for a hypothetical company, evaluating the suitability of LAN components such as repeaters, hubs, bridges, routers, and switches. The implementation phase covers building and configuring a LAN, including network security measures like password protection and VLAN configuration, along with thorough testing. Finally, the report addresses LAN management, including monitoring, troubleshooting, and performance evaluation using ping tests, concluding with recommendations for improving security, reliability, and performance.

Local Area Network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction................................................................................................................................3
LO1- Understand the impact of LAN technologies...................................................................4
1.1 critically evaluate different LAN technologies................................................................4
1.2 Critically analyse traffic intensive services and their performance.................................8
1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance..................................................................................................10
LO2 Be able to design LAN infrastructures............................................................................11
2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements.........................................................................................................................11
2.2 critically evaluate the suitability of LAN components..................................................15
LO3 Be able to implement LAN infrastructures:.....................................................................19
3.1 Build and configure a LAN (including services) to meet a given requirement:............19
3.2 Implement network security on a LAN..........................................................................28
LO4 Be able to manage LAN infrastructure:...........................................................................41
4.1 Monitor and troubleshoot a LAN...................................................................................41
4.2 Resolve LAN issues to improve security, reliability and performance.........................43
4.3 Critically evaluate the performance of a LAN...............................................................44
Conclusion................................................................................................................................50
Reference..................................................................................................................................51
Introduction................................................................................................................................3
LO1- Understand the impact of LAN technologies...................................................................4
1.1 critically evaluate different LAN technologies................................................................4
1.2 Critically analyse traffic intensive services and their performance.................................8
1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance..................................................................................................10
LO2 Be able to design LAN infrastructures............................................................................11
2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements.........................................................................................................................11
2.2 critically evaluate the suitability of LAN components..................................................15
LO3 Be able to implement LAN infrastructures:.....................................................................19
3.1 Build and configure a LAN (including services) to meet a given requirement:............19
3.2 Implement network security on a LAN..........................................................................28
LO4 Be able to manage LAN infrastructure:...........................................................................41
4.1 Monitor and troubleshoot a LAN...................................................................................41
4.2 Resolve LAN issues to improve security, reliability and performance.........................43
4.3 Critically evaluate the performance of a LAN...............................................................44
Conclusion................................................................................................................................50
Reference..................................................................................................................................51

List of Figures
Figure 1: Local Area Network...................................................................................................7
Figure 2: Bus Topology...........................................................................................................13
Figure 3: Star Topology...........................................................................................................14
Figure 4: Mesh Topology.........................................................................................................15
Figure 5: Tree Topology..........................................................................................................15
Figure 6: Ring Topology..........................................................................................................16
Figure 7: Network Server.........................................................................................................17
Figure 8: Repeater....................................................................................................................18
Figure 9: Network Bridges.......................................................................................................18
Figure 10: Network Routers.....................................................................................................19
Figure 11: Network Switches...................................................................................................19
Figure 12: Network Hub..........................................................................................................20
Figure 13: LAN Design football field marketing ltd...............................................................22
Figure 14: Metadata capture 1 for football field marketing ltd................................................23
Figure 15: Metadata capture 2 for football field marketing ltd................................................24
Figure 16: Metadata capture 3 for football field marketing ltd................................................25
Figure 17: Metadata capture 4 for football field marketing ltd................................................26
Figure 18: Metadata capture 5 for football field marketing ltd................................................27
Figure 19: HTTP server Domain name for football field marketing ltd..................................28
Figure 20: Overall Design for football field marketing ltd......................................................29
Figure 21: Password protection on Routers.............................................................................30
Figure 22: Password protection on Routers.............................................................................31
Figure 23: Configuration of VLAN.........................................................................................32
Figure 24: Test Case 1..............................................................................................................33
Figure 25: Test Case 2..............................................................................................................34
Figure 26: Test Case 3..............................................................................................................35
Figure 27: Test Case 4..............................................................................................................36
Figure 28: Test Case 5..............................................................................................................37
Figure 29: Test Case 6..............................................................................................................38
Figure 30: Test Case 7..............................................................................................................39
Figure 31: Tes Case 8...............................................................................................................40
Figure 32: Test Case 9..............................................................................................................41
Figure 1: Local Area Network...................................................................................................7
Figure 2: Bus Topology...........................................................................................................13
Figure 3: Star Topology...........................................................................................................14
Figure 4: Mesh Topology.........................................................................................................15
Figure 5: Tree Topology..........................................................................................................15
Figure 6: Ring Topology..........................................................................................................16
Figure 7: Network Server.........................................................................................................17
Figure 8: Repeater....................................................................................................................18
Figure 9: Network Bridges.......................................................................................................18
Figure 10: Network Routers.....................................................................................................19
Figure 11: Network Switches...................................................................................................19
Figure 12: Network Hub..........................................................................................................20
Figure 13: LAN Design football field marketing ltd...............................................................22
Figure 14: Metadata capture 1 for football field marketing ltd................................................23
Figure 15: Metadata capture 2 for football field marketing ltd................................................24
Figure 16: Metadata capture 3 for football field marketing ltd................................................25
Figure 17: Metadata capture 4 for football field marketing ltd................................................26
Figure 18: Metadata capture 5 for football field marketing ltd................................................27
Figure 19: HTTP server Domain name for football field marketing ltd..................................28
Figure 20: Overall Design for football field marketing ltd......................................................29
Figure 21: Password protection on Routers.............................................................................30
Figure 22: Password protection on Routers.............................................................................31
Figure 23: Configuration of VLAN.........................................................................................32
Figure 24: Test Case 1..............................................................................................................33
Figure 25: Test Case 2..............................................................................................................34
Figure 26: Test Case 3..............................................................................................................35
Figure 27: Test Case 4..............................................................................................................36
Figure 28: Test Case 5..............................................................................................................37
Figure 29: Test Case 6..............................................................................................................38
Figure 30: Test Case 7..............................................................................................................39
Figure 31: Tes Case 8...............................................................................................................40
Figure 32: Test Case 9..............................................................................................................41
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 33: Test Case 10............................................................................................................42
Figure 34: Ping Test 1..............................................................................................................46
Figure 35: : Ping Test 2............................................................................................................47
Figure 36: : Ping Test 3............................................................................................................48
Figure 37: : Ping Test 4............................................................................................................48
Figure 38: Implementation of Network over the Packet tracer................................................49
Figure 39: Access list Configuration........................................................................................50
Figure 40: IP of Routers...........................................................................................................50
Figure 41: PDU list showing successful connection between IT manager and different
departments PCs.......................................................................................................................51
Figure 42: PDU list showing failed connection between departments....................................51
Figure 43: Web server working - HTTP and DNS..................................................................51
Figure 34: Ping Test 1..............................................................................................................46
Figure 35: : Ping Test 2............................................................................................................47
Figure 36: : Ping Test 3............................................................................................................48
Figure 37: : Ping Test 4............................................................................................................48
Figure 38: Implementation of Network over the Packet tracer................................................49
Figure 39: Access list Configuration........................................................................................50
Figure 40: IP of Routers...........................................................................................................50
Figure 41: PDU list showing successful connection between IT manager and different
departments PCs.......................................................................................................................51
Figure 42: PDU list showing failed connection between departments....................................51
Figure 43: Web server working - HTTP and DNS..................................................................51
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
LAN is defined as Local Area Network that is used for the connection of internet generally in
minor geographical based areas that are offices, houses, or mainly to a floor. It is defined as a
set of hardware-based instruments that creates networks and for its further communication.
The marketing-based company and sales of football demands for expanding its network to at
least three floors segregated in several departments that are IP support, HR, customer services
etc. Total working employees are twenty-eight in number comprising of all available
departments and all of them are interconnected with the entire developed system.
The report further includes LAN based technologies discussion along with its performance
and services. Several terms regarding the LAN reliability, security and its performance are
also being described. Secondly, it includes the model and completes an evaluation of the
network or LAN to determine whether the network is suitable or not. Thirdly it comprises of
network implementation and even describes the raised issues or problems.
LAN is defined as Local Area Network that is used for the connection of internet generally in
minor geographical based areas that are offices, houses, or mainly to a floor. It is defined as a
set of hardware-based instruments that creates networks and for its further communication.
The marketing-based company and sales of football demands for expanding its network to at
least three floors segregated in several departments that are IP support, HR, customer services
etc. Total working employees are twenty-eight in number comprising of all available
departments and all of them are interconnected with the entire developed system.
The report further includes LAN based technologies discussion along with its performance
and services. Several terms regarding the LAN reliability, security and its performance are
also being described. Secondly, it includes the model and completes an evaluation of the
network or LAN to determine whether the network is suitable or not. Thirdly it comprises of
network implementation and even describes the raised issues or problems.

LO1- Understand the impact of LAN technologies
1.1 critically evaluate different LAN technologies
Local Area Network (LAN)
Local area network also called as LAN is a set of networks which can be used in the specified
location for connecting PCs to such a network that shares a common line with the server.
LANs are mainly used in homes, organisations and institutes. The LAN can be of several
types
Wired
Remote or wireless
Combination of the two
The standard LAN that is wired utilises Ethernet so as to entirely associate all the gadgets
together. Remote based or wireless LANs generally utilised the Wi-Fi based network. Some
disadvantages of LAN based networks are that it can only be used in small areas.
LAN and its types
LAN is mainly divided into two possible types that are wired and remote or wireless.
Generally, all private based LANs uses their own router in order to create a system and tackle
with all various associated gadgets. The working of the router includes associating of focal
points and empowerment of the gadgets like Tablets, mobile phones, PCs so that the
communication becomes easier with each other. In the case of LAN, a PC can be converted
into a central point for access and even behaves as a server that provides several machines so
as to access all located files on servers. Also, multiple LAN is combined in order to create a
bigger LAN.
1.1 critically evaluate different LAN technologies
Local Area Network (LAN)
Local area network also called as LAN is a set of networks which can be used in the specified
location for connecting PCs to such a network that shares a common line with the server.
LANs are mainly used in homes, organisations and institutes. The LAN can be of several
types
Wired
Remote or wireless
Combination of the two
The standard LAN that is wired utilises Ethernet so as to entirely associate all the gadgets
together. Remote based or wireless LANs generally utilised the Wi-Fi based network. Some
disadvantages of LAN based networks are that it can only be used in small areas.
LAN and its types
LAN is mainly divided into two possible types that are wired and remote or wireless.
Generally, all private based LANs uses their own router in order to create a system and tackle
with all various associated gadgets. The working of the router includes associating of focal
points and empowerment of the gadgets like Tablets, mobile phones, PCs so that the
communication becomes easier with each other. In the case of LAN, a PC can be converted
into a central point for access and even behaves as a server that provides several machines so
as to access all located files on servers. Also, multiple LAN is combined in order to create a
bigger LAN.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 1: Local Area Network
Wired LAN uses IEEE standards that is Ethernet IEEE 802.3 and Wireless LAN uses IEEE
standards that are Wi-Fi IEEE 802.11 (Waliullah, Moniruzzaman and Rahman, 2015).
Technologies of LAN
LAN based technologies are mainly used for connecting several systems and this requires the
proper connection of data in networks that are defined as local area network. It uses several
standards in networks that are IEEE 802.11 wireless, IEEE 802 LAN and others.
IEEE 802.11 wireless Standards
802.11 define IEEE standards especially for wireless based or remote system networking.
Several determinants of wireless networking system used to exist under the pennant of
802.11. All model of 802.11 Wi-Fi works under the ISM recurring bands that are Industrial,
Scientific and Medical. Many different conveyor guidelines are being described that are used
commonly. Several standards are there that are 802.11a, 802.11b, 802.11g. The standard of
802.11n is defined as the recent delivering rates of raw data nearly up to 600 Mbps. Each of
the distinctive gauges is defined with some diverse highlights which were further propelled at
different circumstances. The acknowledged standard mainly for 802.11WLAN was 802.11b.
IEEE 802.3 wired LAN Standard
Wired LAN uses IEEE standards that is Ethernet IEEE 802.3 and Wireless LAN uses IEEE
standards that are Wi-Fi IEEE 802.11 (Waliullah, Moniruzzaman and Rahman, 2015).
Technologies of LAN
LAN based technologies are mainly used for connecting several systems and this requires the
proper connection of data in networks that are defined as local area network. It uses several
standards in networks that are IEEE 802.11 wireless, IEEE 802 LAN and others.
IEEE 802.11 wireless Standards
802.11 define IEEE standards especially for wireless based or remote system networking.
Several determinants of wireless networking system used to exist under the pennant of
802.11. All model of 802.11 Wi-Fi works under the ISM recurring bands that are Industrial,
Scientific and Medical. Many different conveyor guidelines are being described that are used
commonly. Several standards are there that are 802.11a, 802.11b, 802.11g. The standard of
802.11n is defined as the recent delivering rates of raw data nearly up to 600 Mbps. Each of
the distinctive gauges is defined with some diverse highlights which were further propelled at
different circumstances. The acknowledged standard mainly for 802.11WLAN was 802.11b.
IEEE 802.3 wired LAN Standard
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IEEE 802.3 comes out to be the widely and mostly used computer networking standards and
means for communication of data. The IEEE here stands for the Institute of Electrical and
Electronics Engineers standards.
The standard of Ethernet is being utilised for higher time and it must be refreshed
consistently in order to meet all requirements of the technology grows. The speed of
information related to communication and Ethernet use to rise consistently and the IEEE
802.3 velocities are being expanded relatively. Ethernet is generally familiar to almost many
because the connection of Ethernet is being utilised in wired PCs that are available. It mainly
provides a backbone to several other frameworks of data based communication that is both
small and substantial (Crow, Widjaja, Kim, and Sakai, 1997).
Virtual LANs, its working, advantages and types
VLAN also defined as Virtual LAN is referred to as logical based sub-network that combines
several devices from various defined local area network. Various physical based networks
support the VLAN that is Ethernet and Wi-Fi.
At the time LAN uses to receive some data from the workstations and it allows the data
labelling with an identifier of VLAN that showcase the VLAN that delivers crucial
information. This entire process is known as Explicit Tagging. It becomes conceivable
sometimes to decide in which VLAN it is easy to place the data for utilizing implicitly related
tagging. In order to determine the data tagging capacity for the utilization of technique, it is
required to keep a bride where the database is regularly refreshed consisting of VLAN
mapping and determines the tagging which is being utilised. Bridges are used with a need to
determine the capacity of the created database and in order to ensure that all scaffolds of
LAN have the similar kind of data in its entire database. After the bridge, used to determine
the flow of information and several LAN related activities the things are properly being
defined. Scaffold determines the information flow and determines the need for the addition of
VLAN identifier to particular information and then it is required to be sent. The event is all
about the transferring of information to the gadgets which plan for the execution of the
VLAN, an identifier of VLAN which is used to add information. If there is a need to operate
a gadget that doesn’t have any learning regarding the usage of VLAN then the information is
sent via bridge without using VLAN identifier.
VLAN Types
means for communication of data. The IEEE here stands for the Institute of Electrical and
Electronics Engineers standards.
The standard of Ethernet is being utilised for higher time and it must be refreshed
consistently in order to meet all requirements of the technology grows. The speed of
information related to communication and Ethernet use to rise consistently and the IEEE
802.3 velocities are being expanded relatively. Ethernet is generally familiar to almost many
because the connection of Ethernet is being utilised in wired PCs that are available. It mainly
provides a backbone to several other frameworks of data based communication that is both
small and substantial (Crow, Widjaja, Kim, and Sakai, 1997).
Virtual LANs, its working, advantages and types
VLAN also defined as Virtual LAN is referred to as logical based sub-network that combines
several devices from various defined local area network. Various physical based networks
support the VLAN that is Ethernet and Wi-Fi.
At the time LAN uses to receive some data from the workstations and it allows the data
labelling with an identifier of VLAN that showcase the VLAN that delivers crucial
information. This entire process is known as Explicit Tagging. It becomes conceivable
sometimes to decide in which VLAN it is easy to place the data for utilizing implicitly related
tagging. In order to determine the data tagging capacity for the utilization of technique, it is
required to keep a bride where the database is regularly refreshed consisting of VLAN
mapping and determines the tagging which is being utilised. Bridges are used with a need to
determine the capacity of the created database and in order to ensure that all scaffolds of
LAN have the similar kind of data in its entire database. After the bridge, used to determine
the flow of information and several LAN related activities the things are properly being
defined. Scaffold determines the information flow and determines the need for the addition of
VLAN identifier to particular information and then it is required to be sent. The event is all
about the transferring of information to the gadgets which plan for the execution of the
VLAN, an identifier of VLAN which is used to add information. If there is a need to operate
a gadget that doesn’t have any learning regarding the usage of VLAN then the information is
sent via bridge without using VLAN identifier.
VLAN Types

VLAN based management
VLAN data
VLAN default
VLAN native
VLAN voice
VLAN Benefits
It helps in enhancement of connections of security and maintaining service based quality
where management of fault is easier and delivers simplified administration especially for a
manager or network admin.
Data communication equipment (DCE) for LAN
This particular equipment for data communication includes repeaters, hubs, bridges, routers
and switches.
Repeater: It gets operated in data, physical and three different network-based layers. It even
doesn’t understand packets, headers and frames.
Switch: It gets operated in network or data layer and also it is defined as point-to-point
device and using several tables of switching to determine the accurate destination.
Router: It gets operated in the layer of the network and gets connected to 2 or more networks
at a same particular time.
Hub: It gets operated in the physical layer and these hubs are further segregated into 2
different types that are active and passive.
Bridge: It gets operated in the layer of the network and performs several functions that are
forwarding, blocking and filtering the frames (Mehdizadeha, Suinggia, Mohammadpoorb,
and Haruna, 2017).
Comparison of interconnecting media of LAN like cables ( STP, Fibre optic, Coaxial, UTP).
VLAN data
VLAN default
VLAN native
VLAN voice
VLAN Benefits
It helps in enhancement of connections of security and maintaining service based quality
where management of fault is easier and delivers simplified administration especially for a
manager or network admin.
Data communication equipment (DCE) for LAN
This particular equipment for data communication includes repeaters, hubs, bridges, routers
and switches.
Repeater: It gets operated in data, physical and three different network-based layers. It even
doesn’t understand packets, headers and frames.
Switch: It gets operated in network or data layer and also it is defined as point-to-point
device and using several tables of switching to determine the accurate destination.
Router: It gets operated in the layer of the network and gets connected to 2 or more networks
at a same particular time.
Hub: It gets operated in the physical layer and these hubs are further segregated into 2
different types that are active and passive.
Bridge: It gets operated in the layer of the network and performs several functions that are
forwarding, blocking and filtering the frames (Mehdizadeha, Suinggia, Mohammadpoorb,
and Haruna, 2017).
Comparison of interconnecting media of LAN like cables ( STP, Fibre optic, Coaxial, UTP).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1.2 Critically analyse traffic intensive services and their performance.
1) Discuss Voice-over-IP, Video-on-Demand and audio and video streaming, live
streaming and how much network resources they consume such as bandwidth.
Voice-over IP also defined as VO-IP is derived as a technology which permits the making
of calls via an internet-based connection, not just a normal voice call that is analogue. The
IP networks that are being utilised here are WAN or LAN. A technology is introduced
that is Voice-On Demand that allows viewers to pick the type of content they wish to
watch like video or audio for a time that is scheduled. It consumes complete bandwidth
for network resource usage for up to 40 bytes of the IP and 20 bytes of the VOIP.
Streaming is defined as a technique for data transferring which is processed in a
continuous and steady rate making it easier for the user as he doesn’t require to download
a particular file. During the streaming of video or audio, a minute buffer is used to create
that bring an obstacle while downloading and the moment that buffer gets completed
video is again being played. The audio and video that are pre-recorded are being stored on
live streaming or server such as broadcasting and telecasting. It demands bandwidth for
recommended streaming of 2 Mbit/s or more. This type of streaming is even done live in
order to determine standards of streaming. For On-demand based streaming the
bandwidth of 300 Kbit/s is being required and is either made directly available live
streaming and requirements of bandwidth.
2) Discuss Quality-of-Service in LANs and how they can be implemented e.g.
Differentiated Service Code Point, 802.1q frame tagging, IP precedence
The service quality granted in LAN is something crucial as a management system type
that generally manages the network traffic or network services. This type of management
system helps in enhancing the network services. Several components for the network-
based quality services are being described
IP Precedence
It was being used before the Differential Service Code Point (DSCP). The initial three
bits are being used here in order to define a priority and generate high esteem, making the
IP packet more critical. It generally utilises all bit from the field of TOS that are being
found in headers of IP packet enabling three of its bits which generally opposed the
DSCP six bits.
1) Discuss Voice-over-IP, Video-on-Demand and audio and video streaming, live
streaming and how much network resources they consume such as bandwidth.
Voice-over IP also defined as VO-IP is derived as a technology which permits the making
of calls via an internet-based connection, not just a normal voice call that is analogue. The
IP networks that are being utilised here are WAN or LAN. A technology is introduced
that is Voice-On Demand that allows viewers to pick the type of content they wish to
watch like video or audio for a time that is scheduled. It consumes complete bandwidth
for network resource usage for up to 40 bytes of the IP and 20 bytes of the VOIP.
Streaming is defined as a technique for data transferring which is processed in a
continuous and steady rate making it easier for the user as he doesn’t require to download
a particular file. During the streaming of video or audio, a minute buffer is used to create
that bring an obstacle while downloading and the moment that buffer gets completed
video is again being played. The audio and video that are pre-recorded are being stored on
live streaming or server such as broadcasting and telecasting. It demands bandwidth for
recommended streaming of 2 Mbit/s or more. This type of streaming is even done live in
order to determine standards of streaming. For On-demand based streaming the
bandwidth of 300 Kbit/s is being required and is either made directly available live
streaming and requirements of bandwidth.
2) Discuss Quality-of-Service in LANs and how they can be implemented e.g.
Differentiated Service Code Point, 802.1q frame tagging, IP precedence
The service quality granted in LAN is something crucial as a management system type
that generally manages the network traffic or network services. This type of management
system helps in enhancing the network services. Several components for the network-
based quality services are being described
IP Precedence
It was being used before the Differential Service Code Point (DSCP). The initial three
bits are being used here in order to define a priority and generate high esteem, making the
IP packet more critical. It generally utilises all bit from the field of TOS that are being
found in headers of IP packet enabling three of its bits which generally opposed the
DSCP six bits.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Differentiated Service Code Point
DSCP also defined as Differentiated Service Code Point are being used to describe the
traffic network and along with that manages that traffic network. The Differentiated
Service Code Point delivers the quality in several network services. It mainly is a
complete mechanism that is determined and provides various QoS on IP based modern
network that enables in managing entire traffic overall network (De Pessemier, Stevens,
De Marez, Martens, and Joseph, 2015).
DSCP also defined as Differentiated Service Code Point are being used to describe the
traffic network and along with that manages that traffic network. The Differentiated
Service Code Point delivers the quality in several network services. It mainly is a
complete mechanism that is determined and provides various QoS on IP based modern
network that enables in managing entire traffic overall network (De Pessemier, Stevens,
De Marez, Martens, and Joseph, 2015).

1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance.
Various types of concerns of LAN along with several recommendations are made in order to
prevent the occurred problems like the security of network, performance and its reliability. It
can be easily accomplished in order to achieve a specific goal which can be made run on
LAN easily, the administrator of the system requires to watch out about the utilization of its
transfer speed. By deliberately monitoring and checking several applications that carry
through high transmission of data, issues like bottlenecks execution which maintains a
tactical distance.
The two key parameters for measurement are Jitter and Latency that benchmarks and
evaluates the network, device and system related performance. The model of network design
a network in a way to make that network highly scalable and even decreases the redundancy.
It highly enhances the management, maintenance and eradicates the entire focus on the
security and performance.
1) Discuss security issues such as confidentiality, integrity and availability (CIA).
The triad of CIA defines the confidentiality, integrity and availability that describe the
model created for policy guild lines regarding the security of data. The Confidentiality
describes the protection of information or data from intruders because of the value it
possesses which is required to keep a secret. The Integrity describes the prevention and
modification of data or information from intruders as well as from several different
unauthorised persons so as to keep the data or information more secure. The Availability
describes the ensuring of data or information that can only be accessed by persons that are
authorised.
2) Explain ways of securing a LAN network e.g. Access Control Lists, VLANs,
Firewalls, etc.
Various ways of network securing are made available that are VLAN usage in order to
separate network from its traffic to enhance the performance. The network is designed in
a way to ensure the security of network that uses several measures that are using of
firewalls in order to protect some extensive networks which are used in different security
ways that are transmitting the outside data and maintaining the extensive configuration
(Pandya, and Patel, 2018).
reliability and performance.
Various types of concerns of LAN along with several recommendations are made in order to
prevent the occurred problems like the security of network, performance and its reliability. It
can be easily accomplished in order to achieve a specific goal which can be made run on
LAN easily, the administrator of the system requires to watch out about the utilization of its
transfer speed. By deliberately monitoring and checking several applications that carry
through high transmission of data, issues like bottlenecks execution which maintains a
tactical distance.
The two key parameters for measurement are Jitter and Latency that benchmarks and
evaluates the network, device and system related performance. The model of network design
a network in a way to make that network highly scalable and even decreases the redundancy.
It highly enhances the management, maintenance and eradicates the entire focus on the
security and performance.
1) Discuss security issues such as confidentiality, integrity and availability (CIA).
The triad of CIA defines the confidentiality, integrity and availability that describe the
model created for policy guild lines regarding the security of data. The Confidentiality
describes the protection of information or data from intruders because of the value it
possesses which is required to keep a secret. The Integrity describes the prevention and
modification of data or information from intruders as well as from several different
unauthorised persons so as to keep the data or information more secure. The Availability
describes the ensuring of data or information that can only be accessed by persons that are
authorised.
2) Explain ways of securing a LAN network e.g. Access Control Lists, VLANs,
Firewalls, etc.
Various ways of network securing are made available that are VLAN usage in order to
separate network from its traffic to enhance the performance. The network is designed in
a way to ensure the security of network that uses several measures that are using of
firewalls in order to protect some extensive networks which are used in different security
ways that are transmitting the outside data and maintaining the extensive configuration
(Pandya, and Patel, 2018).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 55
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.