Professional Documents
Culture Documents
MBA Faiz LAN SEM3
MBA Faiz LAN SEM3
MBA-IT
Semester III
SAVITRIBAI PHULE PUNE UNIVERSITY
Basics of Networking
(LAN)
LOCAL AREA NETWORK SYSTEM
CERTIFICATE
This is to certify that Faiz Ahmed Syed Shah, student of
MBA – Information Technology II year has successfully completed
the Project, entitled “Local Area Network System” by the Approval
of his respected professors.
Place: Pune
Date:
Time:
LOCAL AREA NETWORK SYSTEM
Content:
I. Introduction
What is LAN?
Definition of LAN.
Evolution of LAN.
II. Objective
V. Design Specifications
VII. Testing
IX. Conclusion
X. Summary_____________________________________
XI. References
I. Introduction
What is LAN
LAN Definition
The term LAN can also refer just to the hardware and software that allows
you to connect all the devices together. In this sense, Local Talk is one kind of
LAN, Ethernet is another. (AppleTalk is the protocol for Local Talk.)
In 1982, 10 Mbps Ethernet cards came into existence and they were very
expensive. By 1988, 10 Mbps Ethernet had acceptable performance for large
LANs and was still good for small installations. By 1990, large installations
were beginning to see congestion. Hence, alternatives to 10 Mbps cards were
becoming popular. One of these alternatives was to install a switched
architecture, rather than constructing architecture with hubs.
Now, Gigabyte Ethernet cards are available for sale. The 10 Mbps cards
are not used anymore. Now-i-days 10/100, 10/100/1000 auto-sensing cards
are available in the market. Everything is moving to dual mode auto-sensing
technology. Even though Gigabyte Ethernet is getting more popular now-a-
days, Gigabyte LANs are 10 times faster than a 100Mbps LAN. Ethernet was
evolved from a protocol called ALOHA. ALOHA was mainly used in packet
radio network which communicate using satellites. In brief, an earth station
sends some data, as soon as the data is ready it waits for an acknowledgement
(ACK). If it fails to get an ACK, it would time out and sends the same thing
again. The sender keeps trying until the transmission is successful. The lesson
to be learned here is that it is important to limit the number of users on a
shared network medium. Traffic analysis can help determine the maximum
number of users to ensure a reasonable Quality of Service (QOS).
II. Objective
In this project, a LAN system will be designed for a medium-sized
company. Through this networking system, the company can effectively
reduce daily running cost, the company internal works can be more systematic
and well organized, and the communication of the employees in the company
can become more efficiently. The network can be used to share files, share
company programme. Employees can communicate with one another through
some network communication programme such as ICQ and MSN Messengers.
Besides, some expensive hardware such as color printer can be shared by a lot
of employees. Finally, employees can use the network to search information.
III. Problem Specification
The following is the assumptions for the medium-sized company:
CAT5 UTP cables are used because the cost of UTP cable is very low and
can be easily installed. Also, CAT5 UTP cable can support high bandwidth and
up to 100Mbit per second.
Coaxial cable is also very cheap and easy to install. However, network
connected by coaxial cable cannot support a lot of computers. Wireless
connection is another good choice since it does not need to deploy a cabling
system which makes installation very easy. With wireless connection, you do
not need to make any cable trays. You can also move computers around the
company and do not need to concern any cable issues. However, the cost of
wireless LAN is much expensive. Wireless LAN requires a lot of wireless hubs
and transmitters which are quite expensive. Besides, the transmission speed of
wireless LAN is much slower than that of cable-based LAN. Hence, in my
network design, wireless connection will not be used.
Since the marketing department is very large and has a lot of computers.
Hence, marketing department is spilt to another domain and so the internal
traffic of the marketing department will not use up the bandwidth of the whole
network. In this sub-network, a primary domain server is used to maintain a
database of usernames and passwords. A file server is used for storing and
sharing files for all client computers. It also enforces security on the network
by ensuing that only individuals holding proper permissions can access the
files. In addition, a router is used to connect the marketing department’s
network to the main network. This lets computers in the marketing
department’s network can still access the company’s database server, proxy
server and email server.
Given the trend towards web-based computing, a web server is put into
the company’s network. Web-based systems provide efficient ways to share
information, either within the company's private network or externally via the
Internet. As this is a trading company, the company can create and maintain a
company web site in the web server. Through this web site, the company can
promote its product to customers. In future, company can even extend the
function of the web site, so that customer can buy products through the web
site.
Database server supports the applications used in the company and it can
store all daily company operation information such as employee’s personal
record, company financial information, company product information and etc.
Many businesses have specialized applications that operate from network
servers. These applications may operate in conjunction with the database
systems.
In order to speed up the Internet connection, a proxy server is employed
into the network. Besides, proxy server can prevent employee’s computer
directly communicate with external computers. This can further protect the
network from attack.
Since some information stored in the file server and database server may
be very important, so we should backup all this information constantly.
Backup server should have a tape drive are added into the network. We can
schedule the computer to make a full back up every week and make an
incremental backup every day.
There are two ways to assign IP addresses in a LAN. You can manually
assign a static IP address to each computer in the LAN, or you can use a special
type of server that automatically assigns a dynamic IP address to each
computer as it logs into the network.
Static IP addressing
Dynamic IP addressing
We should first use cable tester to test each CAT 5 cable and ensure
that every cable is connectable and no broken inside.
To test the completely configured LAN, make sure that the computers
are able to communicate with each other after the bootup process.
To determine whether each computer can communicate with every
other computer in the LAN, use the ping command. Open any terminal
window on the current host and type the command ping <IP address>
or <hostname>.
Note that you must type either the IP address or the hostname in order
for the ping command to work properly.
If you have configured the DNS name server specification properly, the
ping <hostname> command should resolve the hostname into a
corresponding IP address. Otherwise, you will need to use the IP
address that you should currently already have listed for all computers
in the LAN. The ping command will send messages across the LAN to
the designated IP address or computer.
After the above checking, we can let employees of that company to test the
network.
VIII. Summary
The process of setting up a LAN using Red Hat Linux is a relatively
straightforward task even for users with little or no LAN background when the
preceding steps are carefully understood and performed. Moreover, there are
vast resources available on the Web that describe in more detail the topics
covered in this article. A good start would be to feed keywords (like LANs,
configuring LANs, Linux network configuration, and TCP/IP) into your
favorite Web search engine. You will be amazed at the wealth of information
that is available on configuring LANs, building networks, Red Hat Linux
network installation/configuration, the TCP/IP protocol suite, and on and on.
Good luck!
In this network design, there are some feasibilities for further expansion
of the network. The backbone of the whole network can use fiber-optics which
can support much more computers.
If the company extends its size and opens many branches in different
countries, Virtual Private Network (VPN) server can be added into the
network. Then company branches’ network in different countries can be
connected together. In another point of view, individual employee may access
company network at home through VPN connection. This is a cheap way to
enhance the network since we only need to spend about $30,000 to buy a VPN
server.
To be more stable and secure, web and email server can be split into two
servers, so that when one server is hacked or down, another server will not be
affected.
XI. References
[1] Google.com
[2] https://viptela.com
[3] https://developer.ibm.com
THANK YOU