You are on page 1of 32

3/11/2020 Local Area Network Designing Assignment | Technical Help

Call Us: +44-203.695.7898, E-Mail: help[at]programmingassignmentshelp.net 

Home (https://www.programmingassignmentshelp.net/)
/  Networking Assignment (https://www.programmingassignmentshelp.net/category/networking-assignment/)
/  Local Area Network Designing Assignment

Local Area Network Designing Assignment


 08-07-16  Rochio Varela  1 comment

Introduction
The report is prepared to analyze the use of locale LAN technologies and their role in increase the performance of the
organization. The project provides a detail glimpse about LAN and related evaluation techniques and models to
overcome security related issues by using troubleshooting and LAN hardware such as switches, routers, voice
gateways, rewalls, and other devices. These computers are getting connected with a cable through Ethernet, Fast
Ethernet and Gig Ethernet or other media for local LAN

Purpose of this course is to provide an understanding on design and implementation of Local Area network,
con guring network devices and to implement security in network.

Security is one of the main aspects of any network, as data security is very important from an organization point of
view. This course will help to learn router con guration, packet lter, troubleshooting network, test network
performance etc. This course will also help to get the understanding of an IP address/pool management, VLAN, STP,
VTP or monitoring tool for a network.

TASK 1
1.1 Evaluate various LAN technologies available in the market. Describe the
technologies in relation with scenario above.
LAN Technologies:- 

LAN: A network is an enterprise network involving of many LANs in buildings, all are connected and all commonly in
the same geographic area or network that is call LAN in other word. A company or organization typically owns the
entire campus network, as well as the physical wiring. Campus networks commonly consist of Ethernet, 802.11 wireless
Of ine LANs
LANs, higher-speed Fast Ethernet, Fast Ether Channel, and Gigabit Ethernet

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 1/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Figure 1: Diagram of LAN technologies

Institute of Electrical and Electronics Engineers (IEEE) Ethernet (802.3):-   

Ethernet is a LAN technology based on the Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard and
offers a bandwidth of 10 Mbps between end users or PC, in other work in LAN Technology is provide connectivity to
other PC through Ethernet technology and committed speed is 10 Mbps between every end user

Switched Ethernet can kill the likelihood of crashes stations don’t need to hear each out other to take a turn
transmitting on the wire. Rather, stations can work in full-duplex mode transmitting and getting at the same time.
Full-duplex mode further builds system execution with a net throughput of 10 Mbps in every heading or 20 Mbps
complete throughput on every port…

Figure 2: Diagram of LAN technologies

Half-Duplex:-

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 2/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Half duplex is components of LAN technologies where many gadgets are working with half duplex for instance HUB
or repeater these center points are essentially multiport repeaters, they develop the transport topology idea of
10Base2 and 10Base5 by recovering the same electrical sign sent by the rst sender of an edge out every other port.
Subsequently, impacts can in any case happen, so CSMA/CD access principles keep on being utilized. The operation of
Ethernet cards and the appended center point is critical to have a complete comprehension of the clogging issues
and the requirement for full-duplex Ethernet. According to Figure plots the operation of half-duplex 10BaseT with
center points.[Read more about Virtual Private Network Assignment
(https://www.programmingassignmentshelp.net/virtual-private-network-assignment/)]

Figure 3: Diagram of Half-Duplex

Find the below step for hub duplex:

1. Sending frame from network interface card (NIC)


2. Looping of sent frame by NIC onto its receiving pair
3. Frame receiving at Hub.
4. Relaying of the frame by HUB on internal bus so that all Other NICs can receive the electrical     signal
5. Signal received from each receiving pair are repeated to all other devices available in network by HUB

Full Duplex:

Full-duplex execution is permitted when the likelihood of crashes is uprooted. Consider the utilization of Ethernet
between couples of NICs, as opposed to cabling the NIC to a center point. Full duplex is likewise an alternative when
utilizing switches. At the point when a solitary gadget is joined with the switch port, the switch can guarantee that
there is no impact, which permits full duplex to work.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 3/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Since no impacts are conceivable in full duplex in the NICs handicap their loopback hardware. Both closures can send
and get at the same time. This decreases Ethernet clogging and gives the favorable circumstances, when contrasted
with half-duplex 10BaseT operation Collisions don’t happen time is not wasted in transmitting packets and it provides
10 Mbps in each direction, doubling the available capacity.

Figure 4: Diagram of Full-Duplex

Fast Ethernet IEEE 802.3u: 

Fast Ethernet is another innovation to increase expanded transfer speed in Ethernet environment or other word the
systems administration industry added to a higher-speed Ethernet taking into account existing Ethernet measures
that is called Fast Ethernet. Quick Ethernet works at 100 Mbps and is characterized in the IEEE 802.3u standard. The
Ethernet cabling plans, CSMA/CD operation, and all upper-layer convention operations are kept up with Fast Ethernet.
The net result is the same information join Media Access Control (MAC) layer converged with another physical layer.

Gigabit Ethernet IEEE 802.3z or IEEE 802.3ab:

Gigabit Ethernet is based on the IEEE 802.3ab and IEEE 802.3z standard and Gigabit Ethernet is supports 1000 Mbps
or 1 Gbps per port of network switch and the physical layer has been modi ed to increase data-transmission speeds
and Gigabit Ethernet can connect access-layer switches to distribution-layer switches for example Gigabit Ethernet in
the switch block, core layer, and server block. [Read more about Network Management System Assignment
(https://www.programmingassignmentshelp.net/virtual-private-network-assignment/)]

10-Gigabit Ethernet IEEE 802.3ae: 

Gigabit Ethernet utilizes 1000BASE-X to show the media sort, 10-Gigabit Ethernet utilizes 10GBASE-X. The diverse
PMDs characterized in the standard, alongside the sort of ber and separation limits. All the ber-optic PMDs can be
utilized as either a LAN or a WAN PHY, aside from the 10GBASE-LX4, which is just a PHY. Be mindful that the long-
https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 4/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

wavelength PMDs convey a fundamentally more noteworthy cost than the others.

LAN Hardware

This segment covers the hardware of network devices or LAN device and categorized based on OSI model in the
segment nd the below computer LAN hardware (https://www.programmingassignmentshelp.net/computer-
hardware-clock-assignment/)

Repeaters

Hubs

Bridges

Switches

Routers

Layer 3 switches

Repeaters

Repeaters are the basic unit in the systems that unite single divisions. Repeaters take approaching edges, datagram
or parcel and send the casing out every other interface aside from accepting port .Repeaters working at the physical
layer of the OSI model. Repeaters are unconscious of datagram/parcels or casing con gurations, they don’t control
shows and multicast or crash spaces. Repeaters are thought to be convention straightforward in light of the fact that
repeater is ignorant of upper-layer conventions, for example, IP, Internetwork Packet Exchange (IPX), and so on.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 5/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Figure 5: Diagram of Repeaters

HUB:-

Hub is basic unit in LAN technology and they are working in Layer 1: physical of OSI module layer 1 and they can
understand in bit and main difference is between hubs have more ports than basic repeaters.

Bridges:-

Bridges are store-and-forward devices. They store the entire frame or datagram and verify the cyclic redundancy
check (CRC) before forwarding. If the bridges detect a CRC error in frame or datagram they discard the frame or
datagram. Bridges are protocol-transparent; they are unaware of the upper-layer protocols such as IP, IPX, and
AppleTalk etc. Bridges are designed to ood all unknown and broadcast or multicast traf c.

Bridges implement Spanning Tree Protocol (STP) to manufacture a circle free system topology. Bridges correspond
with one another and trading data, for example, need and scaffold interface MAC addresses. Extensions select a root
scaffold and afterward execute STP.

Figure 6: Diagram of Bridges

Switches:- 

Switch is essentially a multiport straightforward scaffold and switch port is its own Ethernet LAN fragment and 
disconnected from the others switch port and Frame sending is construct totally with respect to the MAC locations
contained in every casing, such that the switch won’t forward an edge unless it knows the destination’s area.

Read more about Routing Protocol Assignment (https://www.programmingassignmentshelp.net/routing-protoco

Switches are more speci c incorporated circuits or more insightful LAN gadget to diminish the inactivity normal to
standard extensions or lessen to show area in LAN section or environment. Switches are the movement of scaffolds.
Switches can keep running in cut-through mode in this mode , switches does not sit tight for the whole edge or
datagram  to enter its support in its place of  it starts to forward the casing when the destination MAC address. Cut-
through operation expands the likelihood that casings with mistakes are engendered on the system, in light of the
fact that it advances the casing before the whole edge is cradled and checked for lapses. In view of these issues, most

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 6/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

switches today perform store-and-forward operation as scaffolds do, switches are precisely the same as extensions
regarding impact space and telecast area qualities. Every port on a switch is a different crash area. Naturally, all ports
in a switch are in the same telecast area. Task to distinctive VLANs changes that conduct.

Figure 7: Diagram of Switch

Broadcasts:-

Broadcasts are speci c edges or datagram, parcels that are bound for all gadgets on an Ethernet system. Telecasts
system a MAC location of FF-FF-FF-FF-FF-FF. This is a telecast l MAC address, it is the most astounding number
permitted in the 48-bit blueprint of MAC locations. In the parallel, each of the 48 bits is situated to 1.

Multicasts:-

Multicasts are speci c broadcast. Multicasts are utilized by higher layer conventions to direct activity to more than one
select destination, as opposed to a show, which is sent to all destinations. Application layer multicasts begin with 01-
00-5E pre x. Whatever remains of the digits are allotted by the application layer convention taking care of the
multicast. Be that as it may, other Layer 2-just multicast locations don’t have the pre x of 01-00-5E; for instance, STP
with MAC location of 01-00-0c-cc-cc-compact disc. Generally, Ethernet systems treat multicasts like shows of course. A
few higher layer conventions, for example, IGMP (Internet Group Messaging Protocol), can be utilized by changes to
separate the activity and forward just multicast out particular ports.

Multilayer Switching:-

Switches perform multilayer exchanging at Layer 3 and Layer 4. At Layer 3, the Catalyst group of switches stores
activity streams taking into account IP addresses. At Layer 4, activity streams are reserved taking into account source
and destination addresses, notwithstanding source and destination ports. All exchanging is performed in equipment,
giving equivalent execution at both Layer 3 and Layer 4 exchanging.[Read more about Database Management
System Assignment (https://www.programmingassignmentshelp.net/database-management-system-assignment/)]

LAN Topologies:-

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 7/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

We can con gure logical topologies with equipment’s such as router or switch. There are basically 6 types of
topologies:

Bus

Star

Ring

Mesh

Tree

Hybrid

Bus here each node is connected to single cable and signal from each node travels to both the direction. Since
this consist of only single wire thus inexpensive to setup. These are of two types linear and distributed both are
same just that in the later one the common transmission medium has more than 2 end points.

Figure 8: Diagram of Bus Topology

Star in this topology one single node is connected to all other nodes which act as server and others as client.
These are of two type extended star and distributed in the later nodes are connected in daisy chain with no
central or top level connection point.

Figure 9: Diagram of Star Topology

Ring in this topology nods are connected in circular fashion in which data travels from one node to other until
it reaches particular node in one direction in this all the nodes work as server and repeat the signals the only
dis-advantage of this is each node is critical if one node stops the whole network goes down.

Figure 10: Diagram of Ring Topology

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 8/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Mesh in this topology each node is directly connected to the other node. There is two types in this fully
connected network and partially connected network in fully connected all the nodes are inter connected
directly to each other, fully connected network is practically impossible for large network as cost associated will
be very high and to complex mesh will be very dif cult to maintain and in the later-one its some of the nodes
are connected to more than what other nodes are connected this is comparatively in expensive and still able to
take advantage to redundancy provided by the fully connected mesh.

Figure 11: Diagram of Mesh Topology  

Tree this topology has just tree like structure with root node then intermediate nodes and nally the branch
nodes the outermost nodes known as leaves though there must be 3 level at least in the hierarchy to form a
tree otherwise it would form star topology physically with one root node and other nodes connected to it as
leaves. In this fault identi cation is easy as it is easy to manage nodes in hierarchy structure and it allows point
to point connection of the nodes.

Hybrid this is basically combination of any two or more of the above topology to form hybrid model but these
both connected network must be of different topology. Common combinations are star-ring topology and star
bus topology.

1.2 What do you understand by quality of service (QoS) and bandwidth


management? Evaluate and analyze with examples why do you think it is
important to perform QoS and Bandwidth Management? 
Quality of service QoS:-

Quality of service (QoS), at a primary level and QoS is de ned as providing better usage for priority traf c. It does this
on the expense of low-priority traf c and the motivation behind QoS is to allow network and user-critical data to have
consistent and reliable access to the network. QoS deployment is central to converged networks where IP telephony
has merged with traditional data network. QoS helps with management of latency and bandwidth on the network.
Some general terms will be outlined

QoS objectives are to provide reliable and available resources for applications and services on the network. In other
word QoS should offer some obviousness of traf c ow seen on the network. Most networks today are implementing
QoS for these very same reasons. Customers are looking for cheaper alternate means than simply increasing
bandwidth on the network to support the various services they are supporting. However, bandwidth scarcity is not the
only reason for QoS. Some applications are delay sensitive and require special handling on the network device itself.

 The discussion of this chapter will be based on DiffServ model.

QoS operational model consists of ve steps:

1. Classi cation

1. Input scheduling

1. Marking and policing

1. Marking

1. Output scheduling
https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 9/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Classi cation

Classi cation is differentiate one incoming frame from another so that it can appropriately forward the packet
through the switch’s port is programmed to be untrusted which means that any frame received on the port will have
its CoS value reset to 0.

Figure 12: Diagram of CoS

Input scheduling

Data planning or input scheduling is taking care of the casing after the edge has touched base at the entrance port
and accepting the port has been designed for trust. Info booking fundamentally doles out approaching casings to
lines. In the event that trust-cos is not designed and the approaching edges will sidestep the Receive limit line and are
sent speci cally to the exchanging motor.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 10/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Figure 13: Diagram of QoS

Figure 14: Diagram of QOS (Output Scheduling)

1.3 Discuss LAN concerns in terms of network security, availability and performance? Explain how a Hierarchical
Network Design can improve on availability, security, scalability and performance 

Hierarchical Network Design:-

A various leveled way to deal with system plan that empowers system originators to legitimately make a system by
characterizing and utilizing layers of gadgets. The subsequent system is security, accessibility, execution, productive,
smart, adaptable, and effectively oversaw. Progressive outline encourages changes. In a system plan, seclusion gives
you a chance to make outline components that you can duplicate as the system develops. As every component in the
system con guration obliges change, the expense and intricacy of making the redesign are contained to a little
subset of the general system. In expansive, level system architectures, changes have a tendency to effect countless.
Restricted cross section topologies inside of a layer or segment, for example, the grounds center or spine uniting focal
locales, hold esteem even in the progressive outline models.

Organizing the system into little, straightforward components enhances issue detachment. Systems supervisors can
without much of a stretch comprehend the move focuses in the system, which aides distinguish disappointment
focuses.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 11/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Today’s quick merging conventions were intended for progressive topologies. To control the effect of directing
convention preparing and data transfer capacity utilization, you must utilize particular various leveled topologies in
light of conventions planned with these controls, for example, Open Shortest Path First (OSPF).Hierarchical network
design facilitates route summarization. EIGRP and all other routing protocols bene t greatly from route
summarization. Route summarization reduces routing-protocol overhead on links in the network and reduces
routing-protocol processing within the routers.

Access Layer:-

The entrance layer or access layer is giving or offer client access to neighborhood fragments on the system and other
word the entrance layer is giving Low cost per switch port, High port thickness, Scalable uplinks to higher layers
Resiliency through various uplinks and they utilized User access capacities, for example, VLAN participation,
movement and convention sifting, and QoS and over Ethernet (PoE) and assistant VLANs for VoIP. The entrance layer
is portrayed by exchanged and shared-data transmission LAN portions in a grounds domain.

Distribution Layer 

The appropriation/distribution layer gives interconnection in the middle of access and center layers. Gadgets in this
layer, _ High Layer 3 throughput for parcel taking care of, Security and strategy based network works through access
records or bundle channels, QoS elements and Scalable and strong rapid connections to the center and access layers

Core Layer

A center/core layer conveys integration of all appropriation layer gadgets. The center layer at times alluded to as the
spine, Very high throughput at Layer 2 or Layer 3 and No immoderate or pointless bundle controls and Redundancy
and strength for high accessibility

TASK 2
2.1 Design network infrastructure to ful ll the requirement of above scenario,
including the diagram of the network infrastructure, and all devices (i.e.
Switches, routers, cables, etc.)

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 12/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Figure 15: LAN Implementation

In this above network design we have used following network resources

Router:-

As per our senior we are using 5 branches Routers (Edinburgh, Birmingham, Liverpool, Manchester and Glasgow) and
one new head of ce in Central London and all router exchange information about destination networks using routing
protocols. Routers use routing protocols to build a list of destination networks and to identify the best routes to reach
those destinations.
https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 13/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Switches: –   we need these types of switches for connectivity as per our network scenario

 Switch: – router are connected to switch

Switches: – all end device are connected to switch

Customer Service Switch: – As per scenario 5 device or PC are required so we can installed 24 port switch in
Customer service

Accounts/Finance Switch: – This department has 34 PC and a network printer and has access to only those working
in nance department

Library:-  With 200 system , the library will be divided in two rooms with three  48 port switch  each of which will
contain 100 devices including a network printer, They should also be able print to a network printer from these
machines

2.2 Critically evaluate the suitability of network components in your design in


terms of Security, Scalability and Availability 
2.2.1 Security
An organization has a security policy in place; it can begin to apply the document and its rules to their particular
environment. Organizations with truly comprehensive security policies nd that what they have created is a roadmap
that helps them implement the correct security appliances, mechanisms, and controls that satisfy their particular
security needs. The organization will also quickly begin to nd the weaknesses in their security posture through the
process of identifying important resources and associated policies and tying that information to current inadequate
security controls. This documentation is sure to change over time as the computing and physical environments
change, which should be expected and accepted as normal security policy maintenance. . The underlying network
provides a perfect place to implement core and advanced security solutions. The center of these secure network
solutions includes the Adaptive Security Appliances (ASA), Integrated Services Routers (ISR), and Cisco Catalyst
switches that have integrated security embedded in them. These are highly intelligent network security devices with
many built-in security features that provide a framework for incorporating security throughout the network

2.2.2 Scalability 
The concept of scalability is necessary in technology as well as our origination or business settings. The base idea is
reliable – the ability for a business, our origination  to accept increased volume without impacting and we do any up
gradation and enhancement without any outage and downtime or other word  it can refer to the ability of a system to
increase its total output under an improved load when resources are added. For instance we are using copper coaxial
cable and now we need to upgrade it to UTP cable

2.2.3 Availability
Availability is signi ed as a percentage of time. How many days, hours, and minutes is the DC electrical infrastructure
operational and supplying power over a given time period? Just as a baseball player’s batting average drops any time
he or she fails to hit and safely reach base, so does a DC availability number suffer whenever the electrical
infrastructure fails to provide power to the room. Unlike in baseball, a .400 average does not make you an all-star.
Assuming there are no additional outages of any kind, which means that the DC is running for all but 12 of the 8760
hours in the year. That’s 99.863% of the time, or two nines of availability.

TASK 3
3.1 Draw a complete LAN design including servers, connecting devices,
workstations, peripherals, etc. for the above scenario. Please include the
con guration scripts in the appendix.
https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 14/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Figure 16: LAN Implementation

With the help of cisco packet tracer , we have design our network scenario and we are explaining    this below
mention  scenario step by step  which we design for  new head of ce in Central London .

Frist we can installed router that is connected with service provider router and after that we con gure core switch and
implementing all LAN technology

1. First of all we are going to connect core switch with access switch and distribution switch, at access switch all
end user are connected and all server and critical device with distribution switch.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 15/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

2. Con gure host name of core switch router and all network device
3. We create new 3 VLAN  (Finance Accounts, Library department, Customer Service department VLAN )   and
server vlan in core switch
4. After that we con gure VTP domain ( virtual trunking protocol ) in core switch
5. We on gure STP in core switch so we can protract  for network loop or loop free network
6. All access switch should be in trunking mode so all vlan traf c will pass through trunk
7. All access switch port (PC connected )   should be in access mode

3.2 Prepare a list of IP addresses, subnet IDs, Broadcast IDs for each
department, Justify your choice for chosen techniques (VLSM or others)
https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 16/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

The college will be using private IP address 192.168.0.0/16 within LAN and we will user same ip pool for accessing
outside network or WAN network.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 17/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 18/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

IP Address and VLSM    

The term variable-length subnet mask (VLSM) describes a single Class C network in network which more than one
subnet mask is used. Whenever implement a VLSM design. If you understood the previous paragraph, you already
understand the concepts behind VLSM. Planning, implementing, and operating a network that uses VLSM requires a
full, comfortable understanding of subnetting. [Read about Secure Shell Linux Assignment
(https://www.programmingassignmentshelp.net/secure-shell-linux-assignment/)]

For Example

Now we are con gure new head of ce in Central London with subnet mask 192.168.10.0/23

192.168.10.0 /23

Start Host 192.168.10.1

End Hot 192.168.11.255

Subnet Mask 255.255.254.0

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 19/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Finance department IP address list-: In nance department we have required 34 IP addresses for Systems and one
IP address for printer. So here we have created /26 series of IP address, each block contain 64 addresses there one IP
address is used for gateway & one is used for broadcasting.

Customer Service has only ve work station. 192.168.11.64/26

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 20/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Library department -: 200 workstation are installed in Library so we require /24 subnet IP address. 192.168.10.0/24

Server IP address:  192.168.11.128/26     File Server, Web Server, and Domain Controller 

TASK 4
4.1 Create a performance baseline for the above company network and
evaluate the designed LAN
Generating the base line of network in education university of London and a plan outlines the upgrade process from
beginning to end so    we have to pull the performance data of education university network traf c, bandwidth
utilization, device loges and device errors.  We know there was no change done after setup. We need to pull daily or
weekly or motherly and quarterly    performance, network bandwidth utilization and traf c analyzing reports from
monitoring tools or other tool for example ticketing tools so that we check how much bandwidth or traf c has been
used or consuming during the peak working hours in day also we check on other monitoring tool whether we get any

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 21/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

breaching threshold in monitoring tools or getting error on the interfaces or not. All Distribution switch  port where
server  are connected; those were put in monitoring tool which helps us to identify how much data have been used.
Network devices which we con gured during the time of setup are these using all features of network technology.
Security policy which we applied on network LAN segment like mac binding or port security policies are those
working or not. We ping router ip from core switch continuously to check latency and drops.

Below is the baseline parameter which was con gured.

Reviewing the applied policy through creating base line and checking breaching threshold by monitor tools

Bandwidth thresholds on monitoring tool, it generates the alerts.

4.2 There are many tools available in the market to monitor the performance
of a network, choose one and produce a performance monitoring report for
your network.
Education university of London are using 2 monitoring tools  solar winds , MRTG art ant tools are play main roll in
network stability or availability of network device and tools are  helps us to categorize any link failure and device down.
MRTG checks the devices, link performance. If any abnormality occurs on the network, proactively send the alert. It
helps us to the action in advance so that we can take quick action. Below are the key advantages of the monitoring
tools.

We can Audit network device con guration through monitoring tools solar winds

We can health monitoring of network and servers device.

It auto sends alerts of link failure and device failure.

It provides real time monitoring and also provide historical data

If any logs generates on the devices, it also send informal alerts.

4.3 One of the computers used in the library replaced, plan a step by step
process to connect the new computer to the network and test connectivity
effectively and ef ciently?

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 22/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

As per our network scenario we can con gure HO PC in DHCP is getting ip address from DHCP per VLAN (Customer
Service, Accounts/Finance Library)   then it is getting ip address though dhcp or DNS. as per below scenario DHCP is
con gured so that system can get ip dynamically .Once system gets ip address .We need to check on core switch side
also because port security is con gured and MAC address is binded with earlier system. So we will disable port and
remove old mac address and add new system mac address. Now we will check on the system whether cross sign has
been disappeared.  Now system will be able to connect on the network and will be able to access intranet and internet
based application.[Also read Network Management System Assignment
(https://www.programmingassignmentshelp.net/network-management-system-assignment/)] 

TASK 5
5.1 Use a network simulator to simulate the designed LAN including the
following
Building and con guration of devices and services within the LAN and Implementation of specialized
con guration and security mechanisms within the LAN

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 23/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

First i con gured Router, then connate core switch to router

We have con gure host name of router with command

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 24/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

I am con guring New HO location in Central London so rst I will con gure Router and connected with Core switch
mention below.

We have con gure host name of router with command

We are con guring new HO location LAN segment so rst we will con gure Core switch and we can create 4 VLAN in
core switch mention below.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 25/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 26/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 27/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 28/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 29/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

REFERENCES
Carol, X, Computer‐mediated communication and social networking tools at work.Information Technology and
People. 26 (2). PP.172 – 190.

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 30/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Morten H. A.,2011, Sensemaking in Networks: Using Network Pictures to Understand Network Dynamics,
in Roger Baxter, Arch G. Woodside (ed.) Inter rm Networks: Theory, Strategy, and Behavior.17. Emerald Group
Publishing Limited. PP.1 – 197.

Jason B. F. And Thomas L. M., 2012. Tools for interdisciplinary design of pervasive computing. International
Journal of Pervasive Computing and Communications. 8. PP.112 – 132.

Sheynblat, L., Krasner, N. F., U.S. Patent No. 6,677,894. Washington, DC: U.S. Patent and Trademark Of ce.

Programming Assignment Help (https://www.programmingassignmentshelp.net/) provides plagiarism free


assignments i.e. all our solutions are genuine and written by best technical assignment writers who have years of
experience. Get a quote now (https://www.programmingassignmentshelp.net/get-a-quote/).

Local Area Network Designing Assignment (https://www.programmingassignmentshelp.net/tag/local-area-network-


designing-assignment/)

Related Articles
 10-02-17

Cyber Security Assignment Help


(https://www.programmingassignmentshelp.net/cyber-security-assignment-help/)

 11-01-17

Network Security Architecture Assignment


(https://www.programmingassignmentshelp.net/network-security-architecture-assignment/)

Discussion

Local Area Network Designing Assignment | Techn...

[…] Programming Assignments help brings Local Area Network Designing Assignment: Local
Area Network (LAN) setup, Local Area Network Advantages  […]

08-07-16

Comments are closed.

tawk

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 31/32
3/11/2020 Local Area Network Designing Assignment | Technical Help

Web

Web programming assignment help (https://www.programmingassignmentshelp.net/web-programming-


assignment-help/)

Python Assignment Help (https://www.programmingassignmentshelp.net/python-assignment-help/)

Dot Net assignment help (https://www.programmingassignmentshelp.net/dot-net-assignment-help/)

PHP Assignment help (https://www.programmingassignmentshelp.net/php-assignment-help/)

Programming

Java assignment help (https://www.programmingassignmentshelp.net/java-assignment-help/)

OOPS Assignment Help (https://www.programmingassignmentshelp.net/oops-assignment-help/)

C Programming Assignment Help (https://www.programmingassignmentshelp.net/c-programming-


assignment-help/)

Android Assignment Help (https://www.programmingassignmentshelp.net/android-assignment-help/)

Database

SQL Assignment help (https://www.programmingassignmentshelp.net/sql-assignment-help/)

Microsoft Access Assignment Help (https://www.programmingassignmentshelp.net/ms-access-assignment-


help/)

Database Assignment Help (https://www.programmingassignmentshelp.net/database-assignment-help/)

Others

Policies (https://www.programmingassignmentshelp.net/policies/)

Connect Us (https://www.programmingassignmentshelp.net/connect-us/)

About Us (https://www.programmingassignmentshelp.net/about-us/)

Blog (https://www.programmingassignmentshelp.net/blog/)

© Copyright 2015 - Bell Technology

https://www.programmingassignmentshelp.net/local-area-network-designing-assignment/ 32/32

You might also like