Local Area Network Infrastructure: Design, Implementation, Analysis

Verified

Added on  2024/05/27

|35
|5545
|221
Report
AI Summary
This report provides a comprehensive analysis of Local Area Network (LAN) technologies, design, implementation, and management. It begins with a critical evaluation of different LAN technologies, including Ethernet, VLAN, VTP, STP, and Wireless LAN, highlighting their features and benefits. The report then analyzes traffic-intensive services and their impact on network performance, focusing on Quality of Service (QoS) parameters such as jitter, delay, and packet loss. It discusses LAN concerns related to network security, reliability, and performance, recommending a hierarchical network design for optimal traffic flow. The report details the design of a LAN infrastructure for Foot-Fall Marketing Ltd, evaluating the suitability of components like clients, servers, network interface cards, network operating systems, routers, and switches. It includes steps for building and configuring the LAN, implementing network security measures, and critically reviewing and testing the LAN. Finally, the report addresses post-implementation monitoring, troubleshooting, and performance evaluation, offering solutions to improve security, reliability, and performance.
Document Page
LOCAL AREA NETWORK
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
Introduction..........................................................................................................................1
Task 1...................................................................................................................................2
A.C 1.1 critically evaluate different LAN technologies......................................................2
A.C 1.2 critically analyse traffic intensive services and their performance........................4
A.C 1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance..................................................................................................5
Task 2...................................................................................................................................6
A.C 2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements.........................................................................................................................6
A.C 2.2 critically evaluate the suitability of LAN components...........................................7
M2. Select/ design and apply appropriate methods/ techniques........................................11
Task 3.................................................................................................................................12
A.C 3.1 build and configure a LAN (including services) to meet a given requirement....12
A.C 3.2 implement network security on a LAN................................................................18
D2. Take responsibility for managing and organizing activities.......................................21
A.C 3.3 critically review and test a LAN...........................................................................22
D3. Demonstrate convergent, lateral and creative thinking...............................................23
Task 4.................................................................................................................................24
A.C 4.1 critically discuss how this LAN infrastructure will be monitored and managed
(via troubleshooting) if there is any issue during post implementation period..................24
A.C 4.2 resolve LAN issues to improve security, reliability and performance.................26
A.C 4.3 critically evaluate the performance of a LAN......................................................27
M3. Present and communicate appropriate findings..........................................................28
Conclusion.........................................................................................................................29
References..........................................................................................................................30
Document Page
LIST OF TABLES
Table 1: Ethernet type......................................................................................................................2
Table 2: Different layer in network..................................................................................................5
Table 3: Address allocation............................................................................................................17
Table 4: Network test.....................................................................................................................22
Document Page
LIST OF FIGURES
Figure 1: network design for the organization.................................................................................6
Figure 2: Client and server architecture computer network.............................................................7
Figure 3: Network interfacing Card.................................................................................................8
Figure 4: Cisco internetwork operating system................................................................................8
Figure 5: Aviom Pro64 network manager........................................................................................9
Figure 6: Router in a network.........................................................................................................10
Figure 7: Network switches............................................................................................................10
Figure 8: Router configuration.......................................................................................................12
Figure 9: Configuring router with Class C IP address...................................................................13
Figure 10: Configuration of switch in network..............................................................................14
Figure 11: Configuration of firewall on server..............................................................................15
Figure 12: configuration of computer............................................................................................16
Figure 13: DHCP configuration.....................................................................................................16
Figure 14: VLAN membership.......................................................................................................18
Figure 15: Implementation Access control list...............................................................................19
Figure 16: ethernet channel configuration on Cisco switch...........................................................20
Figure 17: Image of Microsoft network monitor tool....................................................................25
Figure 18: GFI software.................................................................................................................25
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Local Area Network in computer networking is a network of computer that are linked together
for communication and transmission of data in a limited geographical area. The report will
discuss various LAN technologies along various techniques for achieving quality of service.
Presently, Foot-Fall Marketing Ltd is an organisation of medium size, the report will provide
with LAN infrastructure along with associated suitable components and their configuration.
Various parameters are discussed for effectively testing the network for functionality and
productivity along with security. Various issues related with the network will be discuss along
with recommendation and mitigation technique for further improving the network for the
organisation.
1
Document Page
Task 1
A.C 1.1 critically evaluate different LAN technologies
LAN or Local Area Networkis computer network that is restricted over a small range like for a
home, building or group of buildings that helps in establishing communication and transmission
of data from one system to another. LAN based in Ethernet technology is used in a network
where all the systems are interlinked through a hub or switch for data and resource sharing.
However, wireless LAN or Wi-Fi is applied in the network that is effective in reducing the
implementation cost due to less cabling.
Different LAN technologies are illustrated below:
Ethernet: - One of the most commonly used network technology is Ethernet. It can be found in
almost every network for transmission of data with appropriate speedusing CSMA/CD
technology. CSMD/CD avoid data collision in a network. Ethernet standards are applied which
are effective to define all the connectors and physical media which are useful in linking the
devices. IEEE 802.3 and Ethernet standards describe LAN with bus-topology LAN which
functions at 10 Mbpsbaseband signaling rate. On the basis of distance and speed of data transfer
Ethernet is classified into two types:
Table 1: Ethernet type
Type of Ethernet Description
Gigabit Ethernet
(802.ae)
This technology functions at the transmission speed of 1 Mbps to 1000
Mbps through fiber cable or UTP.
Fast Ethernet
(802.3u)
This technology of ethernet offers data transmission of 1 Mbps to 100
Mbps over a distance of only 100 meters through Cat-5 and Cat-6 cable.
Virtual LAN/ VLAN: In LAN network, systems are grouped for sharing mutual broadcast
domain. Whereas, single broadcast domain is in VLAN. VLANs are formed in a network for
enhancing network security and performance over a switched environment by the means of
regulated propagation of the broadcast (Kottomtharayil, et al 2015).
2
Document Page
VLAN is capable of separating numerous LAN segments physically through a logical broadcast
domain structure. It consists of switch port, and each port is assigned to individual VLAN
sharing broadcasts. However, broadcast is not shared among the ports of different VLANs.
segmentation features are offered by VLANs.
VTP: -management domain in the network is provided with VTP. A switch is assigned with a
single VTP domain and through which VLAN information can be shared among other network
switches (Yamamoto, et al 2016). The information of VTP is not shared between Switches
related to different VTP domains. A VTP domain contains and shares various attributes, like the
VTP management domain, VLAN specific parameters, revision number between other
neighboring domains. Whenever a new VLAN is added in the network it’s the job of VTP to
sends the information the network switches.
STP: -Spanning Tree Protocol or STP are applied in a network to offer redundancy in the
network link viathe Layer 2 switch. STP in a network is effective in achieving fault free network
and recovery can be attained. IEEE 802.1D standard defines this STP. Communication between
the switches along with transmission of data as Bridge Protocol Data Units is done through STO
in a network. MAC address of a port is used for sending theframe out for BPDU.
Wireless LAN: - Wireless LAN is implemented in the network which permits the network users
to link the network without any wires or cables. IEEE 802.11 standard, is used for installing the
network devices in the network.
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
A.C 1.2 critically analyse traffic intensive services and their performance
Quality of Service: Thisis defined as various methods that is allied in a network for managing
the network in terms of data loss, bandwidth, jitter, transmission delay occurring in a network.
QoS is implemented either to manage any one or all of the four characteristics mentioned above.
Actual capacity of the network is not affected by the QOS but helps the administrator to
effectively manage the current network bandwidth.Quality of service is facilitating the network
to attain maximum network productivity to the user by proper bandwidth so that performance can
be increase and error rate and latency is reduced.
Jitter: Jitter stands for the alteration between the departure and arrived inter data packet. Jitter
can vary from packet to packet.
Delay: If a network packet takes more time than its anticipated time to reach to its destination
then its known as delay. It can be a result of data processing delay or time required for
communication establishment with the destination, or processing delay at the source. Delay
commonly describes the difference in time the data packet required to reach its destination then
the expected time when compared.
Packet Loss: When data packets are lost while the process of transmission then it’s called as
Packet Loss. This packet loss may be the reason of line errors, buffer congestion and improper
QoS mechanisms which may result in packet drops (Kizza, 2017).
4
Document Page
A.C 1.3 Discuss LAN concerns and make recommendations to sustain network security,
reliability and performance
Hierarchical Network Design
For structure the organizational network must be implemented in such a way that all the three
categories of traffic flows or other services are outlined to its best (Kavuri et al 2015). This will
result to form a network which is effectual, accessible and can be managed easily.
Table 2: Different layer in network
Layers Access Layer Distribution Layer Core Layer
Definition Access layer in the is
the place in the
network where users
get associated with the
actual network.
Devices at this layer
are called as building
access switches
Distribution layer helps in
interconnecting the access
layer with and core layers
of the organizational
network. Devices of this
layer are alsocalled as
building distribution
switches.
Core layer in hierarchical
Network, is accountable for
providing connectivity of all
devices in distribution-layer.
Core layer is the backbone
of network. It helps in
switching traffic through
core switch.
Device
attributes
ï‚·Switch port cost is
low
ï‚·Uplinks are scalable
for higher layers
ï‚·Devices supports
traffic/protocol
filtering, VLAN
management and
QoS
ï‚·Multiple uplinks
provided redundancy
ï‚·Throughput forhandling
the packet is high
ï‚·The devices in the must
have a combination of
various access-layer
device.
ï‚·Security is offered
ï‚·Filtration of packets
and access lists is based
on policy.
ï‚·QoS is maintained
ï‚·Devices are Scalable
ï‚·Throughput in network in
high in Layer 2 or Layer 3
ï‚·Redundancy is present
for high availability
ï‚·Unwanted packet
manipulations, less
expensive, packet filtering
and access lists.
ï‚·Developed QoS
5
Document Page
Task 2
A.C 2.1 design a LAN infrastructure for the company which will facilitate all of their
requirements
Figure 1: network design for the organization
The organization has used routers to connect with the external network service providers and
used switches to segment the network for the departments. The organization also can use the
network cables as Ethernet cables to achieve the high performance among the devices. Firewall is
also used to achieve access control and performance.
6
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
A.C 2.2 critically evaluate the suitability of LAN components
For the implementation of a network is design over an organisation, numerous technologies and
tools and devices are implemented for sustaining user demand from the network. Few of the network
components used un the LAN network is illustrated below:
Client
client in the language of computer network is a device or computer that associates with resources
present in remote location or the server. In this organisational network, employees are provided with
individual computers for execution of their task which connects with specific server.
Figure 2: Client and server architecture computer network
Server
Server is a computer program. Objective of a server is accepting and responding to any request that a
client has made. It is the server that id responsible for managing the data and resources in the
network (Tanenbaumand Wetherall, 1996. ). Different types of servers are implemented for serving
different purposes such as database server, file server, web server etc.
Network interface card
Network interface card is generally an electronic circuit board that is installed in computers of the
network for linking them with the network. NIC provides physical connectivity for data
transmission.
7
Document Page
Figure 3: Network interfacing Card
(Source: https://www.newegg.com/Product/Product.aspx, 2018 )
Network operating system
Cisco Internetwork Operating System or IOS is an operating system which is installed in the
organizational network, this IOS are intended for supporting networking devices and other
application like resource sharing, database sharing and workstations (Network operating system).
Figure 4: Cisco internetwork operating system
Network manger
A network manager is used in the network that is generally a program which helps in detecting
system and involuntary device configuration in the network. In a wireless network, the network
8
Document Page
manager can switch between network and can select a reliable and effective network. Pro64 Network
Manager is used.
Figure 5: Aviom Pro64 network manager
Routers
Router providesnetwork connectivity that helps in sharing information and data and resources among
the networking device by means of communication. The scalability feature in a network can be
added using a router in the network. A router consist of a routing table which is effective in filtering
all the traffic that is outgoing and incoming as per the addresses of sender and receivers that
provided network security.
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 6: Router in a network
(Source: https://www.researchgate.net/figure/, 2018)
Switch
Switches are used for linking different networking devices such as computer and workstations
together. Switch is effective in knowing about the port the device is connected to using IP Address.
Packet switching technique is used by as switch for receiving and sending information and data to
the destination device.
Figure 7: Network switches
(Source: https://www.cisco.com/c/en/us/support/switches/catalyst-2960-24lc-s-switch/model.html,
2018)
10
Document Page
M2. Select/ design and apply appropriate methods/ techniques
Users: the performance and efficiency of the network can be understood by the network by knowing
the quality of voice data, video steaming and textual messages received. The organisational network
must have scalable and have high performance. Latest technology and updated devices is used in the
organisational network to achieving maximum performance and for satisfying the user need.
Traffic intensive services: Networking service can be determined by the network traffic. it
prioritized high quality service and network performance is improved. TCP/IP protocol is applied for
establishing communication.
Technology used: various advance technologies is applied in the organisational network. Host
control protocol is used for identification of the device which aids in network management
automatically. Switch and VLAN is used for grouping and connecting the network devices. STP is
implemented for rejecting violation of the packet routing.
For connecting the devices in the Hybrid topology. Sufficient switches are implemented that
supports network extension. Firewall policies are applied for protection of the data and network
devices.
11
Document Page
Task 3
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
Networking system is configured in Foot-Fall Field Marketing Ltd organization as per their
requirement to support all the user for working efficiently. Configurations for networking devices is
illustrated below:
Router configuration
For routing protocol and to achieve DNS service a network implements a router by installing it. The
process of configuration of router and switch is similar. And for fortifying the router in the network
it is recommended that the default configuration should be altered.
Figure 8: Router configuration
12
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 9: Configuring router with Class C IP address
Switch configuration: For switch configuration a favoured parameter is set that can be applied with
their respective IP Addresses for achieve the requirement of VLAN and to support segmentation that
is effective for network maintenance.
13
Document Page
Figure 10: Configuration of switch in network
Device configuration
For the configuration of all the devices in the network Mac address,IP addresses and subnet mask are
used. All the devices must be configured individually for their identification as per the department
and floor they are installed in.
Firewall
Firewall should be configured in the network for security purposes. Firewall filter outs any unwanted
entry of devices or codes in organisational network. Firewall protects devices and data to get
exploited mainly in the sale and marketing department of Foot-Fall Field Marketing Ltd.
14
Document Page
Figure 11: Configuration of firewall on server
End device Configuration
All the wireless devices used in the systems are the end devices. IP addresses are used for
configuration of this devices. DHCP is implemented for configuration of end devices in Foot-Fall
Field Marketing Ltd network that gathers dynamic addresses when communication is established via
internet (Thakkar et al 2016). DHCP is effective in reducing the cost and time.
15
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 12: configuration of computer
Figure 13: DHCP configuration
16
Document Page
VLAN configuration
VLAN is referred to a switched network which is logically segmented by functions or by application
without any physical locations need.
Switch#vlan sales
Switch(vlan)#vlan 2
VLAN 2 added:
Name: VLAN0002
Switch#configure terminal
Switch(config)#interface Vlan2
Switch(config-if)#ip address 192.168.43.7 255.255.255.0
Switch(config-if)#no shutdown
Address allocation
For allocation of address for the networking device in the organisation Class C IP addresses have
been used. As per the user requirement VLAN Configuration is quite effective in specification.
Table 3: Address allocation
VLAN Department IP address Subnet mask bit
VLAN2 Sales-marketing 192.168.22.0 30
VLAN3 customer-services 192.168.23.0 24
VLAN4 IT-staff 192.168.24.0 30
VLAN5 finance 192.168.25.0 24
VLAN6 Technical 192.168.26.0 30
VLAN7 Administrator 192.168.27.0 24
VLAN8 HR 192.168.29.0 30
17
Document Page
A.C 3.2 implement network security on a LAN
Membership in Virtual Local Area Network:
Switches are implemented or configured in the network for gaining VLAN membership by using IP
addresses of the devices and then interfacing with subnet mask. Steps to be followed for VLAN
configuration.
ï‚· Login to web configuration. Direct to LAN and then to VLAN membership.
 Select ‘Add row option’ for addition of new row in network configuration.
ï‚· ID and pot number for the VLAN and inter VLAN routing is provided.
ï‚· Status is checked for Inter VLAN routing.
Figure 14: VLAN membership
Implementation of Access control list:
The network configures firewall monitoring the access in the organisational network as per the
incoming and outgoing network traffic. Implementation of ACLs secure data and information
transmitting in the network devices. Misuse of information from unauthorized users is reduced by
acknowledging all malicious code and activities in the network.
18
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 15: Implementation Access control list
Authentication:
Authentication process compared the provided user information with the database records. A user
can access only when both the details match. The systems in the network is protected by using
unique passwords and username. Port number in the networking devices are provided by the use of
routers and switches. Encrypted commands are used for device configuration.
Configuration of Ethernet channel
Ether channel is integral share of Cisco IOS, therefore the switches implemented in the
organisational network sustenance their configuration. 8 points connections areoffer in the network.
All the ports must be kept enabled. Commands for ether channel configuring is given below:
19
Document Page
Figure 16: ethernet channel configuration on Cisco switch
20
Document Page
D2. Take responsibility for managing and organizing activities
A network consultant need to plan and design the organisational network that works efficiently to
receive maximum output and high performance. After planning the next work is setup the network as
per the network plan. Third and the most important responsibility is network maintenance. Finally,
next job is to expand the organisational as per user and network demand.
Designing the Network:Designing an organisational network includes numerous tasks associated
with decision making to create the best and appropriate design of the network by creating a logical
structure.
Network setup: Once the designing phase completes, all the devices must be configured in the
network accordingly with proper software and hardware installation along with host, server, client,
router configuration.
Maintenance of the network:Maintenance of network is one of the toughest task which involves
various tasks such as newly adding a host device, security administration, handling network services
like name service, emails etc. and at last trouble shooting various network issues for improving the
performance of the network.
Expansion of network:With time organisation may determine to expand network and service
according to requirement and demand. Therefore, all the probable possibility of network expansion
should be kept in mind while designing.
21
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
A.C 3.3 critically review and test a LAN
Table 4: Network test
Parameters Expected Network Outcome Attained Network Outcome
1. Security Security is one of the main feature which is
expected to protect all the devices and
information present in the devices and in the
organisational network. Systems in finance
and marketing department should be
secured mostly from any intruders.
Logical access system is used for
securing the network and
connected devices.
2. Servers For uninterrupted functionality of the
finance and sale department in the
organisation must have Server that can
provide security.
The network is configured with
sufficient amount of various kind
of Servers which is effective to
provide network scalability along
with effective performance.
3. Availabilit
y
The network expected to have availability
of various resource present in the network
for it effective utilisation when require.
The network implements STP
protocols that finds alternative
paths in case the primary path fails.
The network also implemented
firewall policies that not only
protects the devices but assures
resource availability.
4. Data
Management
For management of all the important data in
the network proper data management
system is expected.
Local servers are used for
managing the data load in the
network. For organising and
managing the data, they are
synchronized with main branch.
5. Scalabilit
y
The organisational network expects to have
a feature of scalability. With time number of
devices connected in all the departments
will change or increased. Consequently, the
network should be capable of overcoming
this issue and adding and removing devices
Network uses sufficient number of
switches for linking devices. so,
several unutilised Class C IP
addresses are present in the
network which can be used for
connecting more device as
22
Document Page
should be effortless. requirement of the future.
D3. Demonstrate convergent, lateral and creative thinking
The designed network has been tested according to various parameters and checked if the network
design was proficient in achieving the requirement of the network users. From the test result, this can
be determined that provided network design was effectual in attaining organisational requirements.
The organisational network delivers appropriate network scalability, data management and security.
However, various improvement can be made in the network for reaching the extreme performance
from the network along with quality of service. It is suggested that the network should implement
physical security for protecting the data and devices in the network. The network must apply all the
latest technologies and updated software and hardware components. For security of the marketing
and sales department of the organisation all the system must be connected with high quality cables.
23
Document Page
Task 4
A.C 4.1 critically discuss how this LAN infrastructure will be monitored and managed (via
troubleshooting) if there is any issue during post implementation period.
Organizational network for Foot-Fall Field Marketing Ltd should be monitored for managing and
enhancing the performance of the network. The performance of the network will decline with
time. The network should be checked for improvement of quality of service. Various tools are
applied for analysing the traffic for maintaining security and reliability.
Configuration of networking system is checked
In the organisation network, all the networking devices should be configured as per their specific
default specification. For understanding the network infrastructure, proper network management
should be done in real-time for improving the overall performance of the network.
Assessing network bandwidth and traffic
For monitoring and checking the network traffic the organisation must implement Network
monitoring tool. Using the tool, different policies can be generated and applied in the network
for enhancing bandwidth utilization and to reduce load of the shared resources.
Microsoft network monitor tool
This tool is applied in the LAN network for the organisation that is helpful in monitoring the
network. Microsoft network monitoring tool is a diagnostic tool (Talamanchi et al 2016). The
network statistics is represented graphically that can be useful for execution of various trouble-
shooting tasks. Though this tool data transmission process can be done effortlessly.
24
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 17: Image of Microsoft network monitor tool
GFI LAN guard
This is a software which is most commonly used for patch management and scanning network
security. Network administrator uses GFI LAN guard for overviewing the complete network
security. The tool is effective in identifying system weakness by means of databases(Network
Security, 2018).
Figure 18: GFI software
25
Document Page
A.C 4.2 resolve LAN issues to improve security, reliability and performance
All the user requirement in Foot-Ball Field Marketing Ltd were satisfied by the current network
designed. Still, with time the network performance declines slowing the network. Some of the
issues along with their solution is discussed below:
Security Issues:
Human is the very much responsible for causing around 80% of security issues that occurs in a
network. When a network has secure breach, it will result in occurrence of several problems
leading to distribution of vulnerable data and information in the network. For protection of the
data and the network devices various tools and measures must be implemented in the network
such as data encryption, firewall and shielding NIC.
Performance Issues:
Performance of the LAN network decline with time. Here, data passes over numerous
networking component (software and hardware) until destination device receives the sent data.
Unexpected errors can also occur in the network (Network issues, 2018). Bus topology is applied
for connecting the devices in the network, and if a new device is added in the network it may
decline the network performance. To overcome this issue in the organisational network, it is
suggested to implement sufficient number of switches and router for connecting the network
devices that will maintain the bandwidth and network performance.
Connectivity Issues:
For establishing connection and data transmission among various networking device, all the
devices are connected with each other either logically or physically. One of the most common
issue arises in a network is issue of Connectivity, this occurs in case of any changes made in the
network such as switching off a remote device, or refusal of connection it will result in
deterioration of network performance (Kwon et al 2015). Therefore, to mitigate the issue
numerous measures are applied like using a PING command for checking connectivity among
devices.
Foot-Fall Field Marketing Ltd need to enhance its features of maintenance and configuration
among all the connected devices. It will enhance the security and monitoring is supported for
improving the performance of the entire network.
26
Document Page
A.C 4.3 critically evaluate the performance of a LAN
According to the bandwidth availability, and access control performance of the LAN network can
be evaluated.
Bandwidth With adequate bandwidth in the network communication among the
network can be established efficiently without generation of
congestion in the network traffic. It is recommended that for gaining
high network performance all the devices in the network need to have
equivalent bandwidth for receiving and sending data in the network to
the destination.It is suggested that the devices in the organisation must
be connected and grouped via a switchesthrough packet switching
method.
Resource utilisation The network consists of various hardware and software components
that influenced the performance of the network as a whole. The
productivity of these components is tested and understoodthrough
feedbacks from network users deployed in different departments at a
regular interval. Sufficient switches and routers must be used in the
network for gaining high performance, stability as well as scalability
for the future requiremnts.
Access Control Performance of LAN network is high affected by users outside the
network, who unwantedly gains the capabilities to access the private
data and information of the organisation, this is called as
eavesdropping. For solving this issue and protecting the network ACLs
can be applied in marketing and sales department for monitoring and
permitting the users.
27
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
M3. Present and communicate appropriate findings.
From the above evaluation of the current organisational network it has been concluded that the
network is capable of satisfying the demand and requirements of the users in the organisational.
However, there are few ambiguities that need to be mitigated for improving the overall performance
of the organisational network.
It is suggested that all the networking devices must be connected by wired connection using proper
and high-quality Ethernet and Fibre cables. It will help in delivering quality of service to the end
users by allowing them to communicate efficiently.
The network can also implement various wireless devices in the network, that will be help in
managing the network easily and low-cost accessibility. Monitoring tools must be provided to all the
higher-level authorities and the network administrator for regulating the flow of data traffic that will
be helpful in enhancing network performance.
Device in the network must be connected using proper ethernet cables and adequate network
switches must be implemented in the network for maintaining the bandwidth in all the devices.
Lastly, it is a common recommendation to all the organisation to train and appoint educated and
skilled employees to attain maximum useful output. Proper and regular training must be provided
regarding the advance technologies used in the organisation for their effective utilization.
28
Document Page
Conclusion
The above has discussed regarding Local Area Network (LAN) along its efficiency in network
performance, security and reliability for an organisation of medium size, Foot-Fall Marketing Ltd.
LAN technologies implemented for a LAN network has been illustrated in this report. A LAN has
been designed in the report along with configuration of various network component. The network
has been tested for knowing the network efficiency, security, performance and reliability as from the
it has been cleared that the provided network structure satisfies the organisational need. Proper
recommendation has also been provided for enhancing the overall performance as per future
requirements.
29
Document Page
References
Books and Journals
Kavuri, S. and Madeira, A.D., CommVault Systems Inc, 2015. Hierarchical systems and methods for
performing storage operations in a computer network. U.S. Patent 9,003,117.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Kottomtharayil, R., Gokhale, P., Prahlad, A., Vijayan, M.K., Ngo, D. and Devassy, V., CommVault
Systems Inc, 2015. System and method for sharing media in a computer network. U.S. Patent
9,021,213.
Kwon, J. and Ammirato, J., Brocade Communications Systems Inc, 2015. Switch With Network
Services Packet Routing. U.S. Patent Application 14/741,112.
Talamanchi, V.S.R., Dietrich, K.W., Boice, E.T., Kowalczyk, A.W. and Gadhe, G.P., Honeywell
International Inc, 2016. Infrastructure monitoring tool for collecting industrial process control and
automation system risk data. U.S. Patent Application 14/871,732.
Tanenbaum, A.S. and Wetherall, D., 1996. Computer networks(pp. I-XVII). Prentice hall.
Thakkar, P., Zhang, R. and Koponen, T., NICIRA Inc, 2016. Logical L3 routing with DHCP. U.S.
Patent 9,356,906
Yamamoto, Y., Higuchi, H. and Nomi, M., ALAXALA Networks Corp, 2016. Authentication
switch and network system. U.S. Patent 9,325,685.
Online References
NOS, 2018 [ONLINE] [ACCESSED
THROUGH]<https://www.webopedia.com/TERM/N/network_operating_system_NOS.html>
[ACCESSED ON: 08th may, 2018]
Network security, 2018 [ONLINE] [ACCESSED THROUGH] <https://www.gfi.com/products-and-
solutions/network-security-solutions/gfi-languard> [ACCESSED ON: 08th may, 2018]
30
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network issues, 2018[ONLINE] [ACCESSED THROUGH] <https://www.wikihow.com/Fix-
Common-Computer-Network-Issues> [ACCESSED ON: 08th may, 2018]
31
chevron_up_icon
1 out of 35
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]