Local Area Networking
Local Area Networking
Local Area Networking
Unit Code & Title : Unit 44 – Local Area Network Technology (LAN)
Assessment Title & No’s : A LAN Solution for Kandy Metro College (LAN – 17 – 001)
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct way. I further
understand what it means to copy another’s work.
You are working for IT Support and Services Company. You are assigned with a project of designing
a complete LAN technology solution for one of your clients. Kandy Metro College is a private
college with more than 2000 students and five branches in Sri Lanka. They are planning to open a
new head office in Kandy and have other branches Island wide. It has a centralized distributed
database system for the students’ details. You are required to provide a complete Local Area
Customer Service: Customer Service area has 5 computers where students can approach for
assistance related to their attendance and progress or any other academic related issues.
Accounts/Finance: This department has 40 computers and a network printer and have
Lab: With 200 computers, the lab will be divided in to two rooms and each which will
contain 100 devices including a network printer. The Lab needs to be an isolated network as
the student will be allowed to use it for their Practical purpose. They should also be able to
Server Area: A control room with all the servers for the College. File Server, Web Server,
Domain Controller are located in this area and planning for minimum 10 Servers.
Web Services: It hosts the college’s intranet services. Students can log on to this server to
get the information about their account, their attendance, progress and other study related
materials.
Domain Services: Keeps the record of all the users and their access rights and permission.
Network Address Translation (NAT) or Port Address Translation (PAT) for accessing outside
network. For the college, the availability of the service and security of the personal and financial
data is very important. At the same time, it must be financially viable. So they have asked you to
come up with a complete network design and implementation that will guarantee the scalability,
security and availability of the devices and resources within the network.
Clearly state your assumptions. You are allowed to design and implement the LAN solution
according to your assumptions but main objectives should NOT be violated
a. Identify and explain different LAN Technologies available in the market. Explain different
b. What do you understand by quality of service (QoS) and bandwidth management? Evaluate
and analyze with examples why do you think it is important to perform QoS and Bandwidth
c. Discuss concerns that a LAN may face in terms of network security, availability and
a. Design network infrastructure to fulfill the requirement of above scenario, including the
diagram of the network infrastructure, and all devices (ex. Switches, routers, cables, etc.)?
b. Identify the LAN components used for the above design and evaluate the suitability of the
your choice for chosen techniques (VLSM or others) and Draw a complete LAN design
including servers, connecting devices, workstations, peripherals, etc. for the above scenario.
b. What type technologies can be used in order to keep the resources and devices secured in
the above network? Justify your choice of technology (e.g. Access Control Lists, Port
Security, etc.) for implementation in the above network. (LO 3.2, Activity 3).
c. The IT director asked you to review and test the LAN, prepare a test case form so that the
performance, availability and security of the proposed network can be tested. (LO 3.3, LO
4.2)
a. One of the computers used in the library replaced; plan a step by step process to connect
the new computer to the network and test connectivity effectively and efficiently? (LO 4.1)
b. There are many tools available in the market to monitor the performance of a network,
choose one and produce a performance monitoring report for your network.
I would like to express my deepest appreciation to all those who provided me the possibility
to complete this Assignment. A special gratitude I give to our Lecturer Mr. Geeth, whose
contribution in stimulating suggestions and encouragement, helped me to coordinate my
project especially in writing this Assignment.
Malinda Lasith Bandara
IP address Ranges...................................................................................................................15
A network is a collection of independent devices that interact with each other for sharing
information through a common means of communication. Limited geographic areas such as
local area networks, buildings or rooms. LANs 2or 3 can be small and can spread to 100
computers using thousands of computers.[ CITATION LAN18 \l 1033 ]
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
This technology for Ethernet Networks. This technology enhances the Ethernet speed limit
from 10 Mbps to 100 Mbps. But with the Ethernet cable structure, there are fewer changes to
this technology. According to the IEEE standards, this IEEE standard is known as 802.3u.
This technology was developed to enable fast communications with multimedia applications
with some technologies. This technology is known as 1000BASE-t and GigE. This can be
faster than 10 times faster than 100BASE-T Ethernet. It also uses the configuration method
for using IEEE 802.3 standards. The existing ethernet can also interact with Gigabit
Solutions. The main difference between Gigabit and Fast Ethernet is the additional full
duplex operation of the MAC layer and data rate.
These are the fastest and most recent Ethernet technology these days. IEEE Standards
802.3ae generally defines Ethernet version 10Gbit 10 times per 10 times per second than
Gigabit Ethernet. Fiber optic cabling technology.
Data traffic management is a way to reduce the cost of service, jitter and packet loss based on
the service quality ratio. Manages a specific type of QoS network. Sensitive data, such as
temporary ringtones and video, uses QoS to manage the network's automotive requirements.
Reduction of quality destruction.[ CITATION Alh18 \l 1033 ]
Packet Loss – This happens when the network connection has deteriorated. Then the routers
and switches start packet dropping. In real-time, packets are packed, you can see the gates
and gaps.
Jitter – This event is due to the replacement of the signal clock in a digital signal. Two
variations of network variation on two-stream packet streaming. Instant communication, such
as mobile phone and video conferencing, leads to a fatal accident. Hosting also desktops and
virtual desktops infrastructure.
4.1.1. Security
This is easy to upgrade and manage. Variable security options can be configured for
changeable switches. The administrator can also use the most powerful security features in
distribution switches.[ CITATION cis09 \l 1033 ]
4.1.2. Availability
For networks, getting is more important. It is possible to dramatically improve the user with
convenient redundancy with the hooking networks. Layer-layers need to be connected to a
variety of distribution layouts.[ CITATION cis09 \l 1033 ]
Sources of networks are perfectly scalable. When the design module network grows, the
design elements will be reset. It's easy to design and run widgets every time.[ CITATION
cis09 \l 1033 ]
To fulfil the network architecture several devices and several technologies needed. To get
maximum performance from the network design important devices are needed. That are,
7.1.1. Switch
All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 13 of 34
In the context of networking, a switch is a high-speed device that receives data from the
Internet. Redirects them to the local destination network (LAN) on their destination. LAN
switch data layer layer (Layer 2) or OSI model layer layer. Hence all packet packets can be
supported.[ CITATION tec186 \l 1033 ]
7.1.2. Router
A router is an analytics tool that analyzes the content of packets that are transmitted in a
network or other network. Whether the source and destination are the same on the same
network, or whether they should switch from a different type of another network type
determines a packet data with a routine header information for the new network type.
[ CITATION tec187 \l 1033 ]
7.1.3. Firewall
IP address Ranges
Creating VLANs
Configuring ACL
To overcome the requirements of the network there should be several technologies. There are
several technologies that can use for basic network management.
That are,
ACLs are a set of rules used most commonly to filter network traffic. They are used on
network devices with packet filtering compatibilities (e.g. routers or firewalls). ACLs are
applied on the interface basis to packets leaving or entering an interface.[ CITATION stu18 \l
1033 ]
VLAN has the same idea about Local Area Network but the connectivity is based on subnets.
Switches can provide multiple independent VLANs for configure subnets. VLANs are mainly
associated with Broadcast domain. It is usually composed of one or more Ethernet switches.
VLANs make administrators to partition a single switch network into several departments
with special features.[ CITATION Sla18 \l 1033 ]
Port Security
Ethernet LANs are vulnerable to attacks such as address spoofing and Layer 2 rejection of
service on network devices. This feature help to protect the data transferring port on device
against loss of information and productivity that such attack can cause. Basic Port security
features is enabled in device default configuration. Administrator can do further modification
with a minimal configuration steps.[ CITATION Jun18 \l 1033 ]
All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 18 of 34
11. Review and test the LAN
There are few steps to connect a new computer to the network. That are,
Step 2 - Accessing the window that can assign the IP addresses on operating system.
There are several tools and applications in the networking industry based on network
regulation. Network Monitoring means improving traffic congestion and monitoring traffic
flows. Of all these, wireshark can be a great tool with a number of bad experimenting
methods. These are only a few. But there are hundreds of filters to analyze a network
From here users can start capturing packets and this will take us to a filter selection
These are the protocols available to capture different ongoing data traffic.
This is a general filtering of the network over wireless interface and the red details are TCP
packet flow with ACK tag. The three way hand shaking is all covered up here in the
monitoring
Juniper Networks, 2018. Understanding Port Security Features to Protect the Access Ports on Your
Device Against the Loss of Information and Productivity. [Online]
Available at: https://www.juniper.net/documentation/en_US/junos/topics/concept/port-security-
overview.html
[Accessed 02 10 2018].
Mitchell, B., 2018. 802.11 Standards Explained: 802.11ac, 802.11b/g/n, 802.11a. [Online]
Available at: https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-
816553
[Accessed 20 09 2018].
Slattery, T., Gibbs, A. & Spence, S., 2018. subnet (subnetwork). [Online]
Available at: https://searchnetworking.techtarget.com/definition/subnet
[Accessed 03 10 2018].
Wilson, T., 2012. Securing Networks: Access Control List (ACL) Concepts. [Online]
Available at: https://www.pluralsight.com/blog/it-ops/access-control-list-concepts
[Accessed 01 10 2018].
Gantt chart
D3 Demonstrate
convergent/lateral/creative thinking