StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Local Area Network: Evaluation and Future Recommendations - Essay Example

Cite this document
Summary
The "Local Area Network: Evaluation and Future Recommendations" paper presents a comprehensive overview of the different aspects of computer network technology. This research report is based on the Local Area Network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful

Extract of sample "Local Area Network: Evaluation and Future Recommendations"

Computer Networks Local Area Network "Evaluation & Future Recommendations" Name Date Institute Table of Contents Table of Contents 2 1- Introduction 3 2- Network performance 3 2.1- Network Performance Limitation 3 2.2- Performance Assessment 4 2.3- Performance Enhancement 4 2.3.1- Selecting appropriate network technology 5 2.3.2- Fragmentation 5 3- Network Reliability and Availability 6 3.1- Network Availability 6 3.2- Network Reliability 7 3.3- Implementing Network Reliability and Availability 8 4- Network Security 9 4.1- Password Security 9 4.2- Network Equipment Security 10 4.3- Hardware Security 11 4.4- LAN/Domain Server Security 12 4.5- Workstation Security 12 5- Conclusion 14 6- References 14 1- Introduction This report presents the detailed analysis of the Local Area Network that I have selected for the discussion. This research will present the comprehensive overview of the different aspects of the computer network technology. This research report is based on the Local Area Network "Evaluation & Future Recommendations" that we will establish for the LAN that we are going to implement. The main factors we have selected for the study are network performance, reliability and availability, and security. 2- Network performance At the present we are living in a world where all the things are linked in the form of a network. The assessment of computer network performance is a main factor in any network operations. Sometimes slow network performance is one of the most exasperating as well as solvable problems.  For an individual who is studying the robes in troubleshooting LAN performance and network workstation, the table of troubleshooting slow local area network problems and how to resolve them, can approach in handy (Slater, 2009). 2.1- Network Performance Limitation Network Performance evaluation of LAN structures are really complex. Some times, the tests as well as their outcomes are misinterpreted and misapplied, a lot of times through the testing people themselves. It is no doubt that the many of LAN industry clients are perplexed by means of these problems, so a lot of differing, sometimes completely opposed results (Brenton & Hunt, 2002) and (Measurement Lab, 2004). There are lots of limitations for the enhanced LAN performance assessment such as (Measurement Lab, 2004): LAN Network Frame lengths are deterministic rather than stochastic Inter frame gap times The amount of stations is small The LAN packet propagation delay for Ethernet as well as ring latency intended for token ring are minute for the reason that the physical LAN system sections are short. 2.2- Performance Assessment These all factors are important concerning LAN effective performance assessment. Also, the LAN network traffic monitoring and generation equipment are low end devices that offer merely moderately precise information and can behave inconsistently beneath extensive network traffic loads. When examining their outcomes, we should need to keep these aspects in mind (Measurement Lab, 2004). Deciding our physical LAN installation necessitates us examining the network data and information traffic and the attributes of that network traffic. For implementing a better network structure we have to keep in mind lot of factors. These factors are regarding the LAN network performance enhancement (Press, 2000). In coming sections I will present some of the important factors regarding the better network performance and potential enhancement in the overall technology structure. 2.3- Performance Enhancement The main factors we need to keep in mind are regarding the selection of the right technology for the network (Nash, 2000). In the scenario of our network structure we need to initially select a better and right layer. 2.3.1- Selecting appropriate network technology We have selected Ethernet IEEE 802.3 network technology standard for organizational network. This technology will utilize Carrier Sense Multiple Access with Collision Detection or CSMA/CD for the network management and handling scheme. For the effective performance of the network the minimum packet size should be longer than the end-to-end propagation holdup the system. This assures the transmitter is yet transmitting when the network packet collision takes place permits retries to be done through the network layer. In our organizational network the combination of the twisted pair versions of Ethernet intended for linking end systems to the network, beside by means of the fiber optic versions for site backbones, is the majority extensive wired LAN equipment (Dslreports, 2009). 2.3.2- Fragmentation The factor of the Fragmentation is also a main aspect of the network performance. In the scenario of our LAN network we need to address this aspect also. An 802.3 network technology station is able to make use of the elective fragmentation protocol to separate 802.3 network data frames into minor data pieces those also known as fragments. These fragments are transmitted individually to the target. Every fragment holds a MAC Layer header, a fragment number representing its ordered location inside the big data frame and frame check sequence. By means of thresholds correctly set, fragmentation is able to lessen the quantity of data that desires retransmission. The main aspect we need to address in our network regarding the network performance is deploying a better fragmentation policy. The main factor in making fragmentation develops enhanced throughput is to set the thresholds correctly. If the threshold value is too small then it will consequence in minor fragments, on the other hand the bigger figure of fragments necessitates considerable overhead for the reason that of the extra headers as well as checksums. Therefore for the enhanced network performance we need to address this aspect more effectively (Kurose & Ross, 2009) and (Lee, 1992). 3- Network Reliability and Availability Network reliability and availability are the main aspects in any network operations and working. An effectively designed network can offer and demonstrate higher reliability and availability (Kurose & Ross, 2009). This section is aimed at providing a deep insight into the Network reliability and availability aspects regarding our selected network structure. 3.1- Network Availability While deploying a network structure we are expecting High LAN Availability Configuration Solution is intended for predictable uptime of 99.999 5 or greater. In our selected network at the device level, adjacent client devices are linked to exchange workgroup switches consequently that a switch outage will up till now permit a number of clients to attempt unchanged or other users to make use of unaffected near machines. Surplus server switches permits for redundant links to the servers consequently that if one switch set-off down, the server is yet available without some corrective action needed. This arrangement as well comprises the accumulation of redundant right of entry plus distribution switches as well as redundant lanes among them. The workgroup as well as network server switches are dual homed to the right to use switch. The sharing routers are dual homed to central routers. For the reason that the sharing plus central routers are dual homed, the breakdown of an admission switch will not influence accessibility. The LAN network HACS or High Availability Configuration Solution be able to as well comprise load balancing facilities, that is illustrated in the Network Load Balancing model (Enterprisearchitecture, 2005). The aspect of the network high availability configuration choice should be employed in mission critical subnets, data and locations centers wherever uptime is seriously to the task of the NIH. For instance, the Clinical Center offers facility of the healthcare to patients in research examinations, plus the influence of network linking downtime might be life threatening intended for patient health care; so, the High Availability factor of the LAN is a suitable alternative to hold up this situation. The assessment of the LAN availability service points (like that 99.999% or 99.5%) are expected foundational upon statistical probability plus historical outage practices of chosen products as well as additional aspects, and are not certain. It is significant to work by means of the client community inside the context of generally permanence of processes to recognize when separate operations will be sufficient as an endorsement technique in the occasion that the cost of elevated accessibility choices can not be correct (Enterprisearchitecture, 2005). 3.2- Network Reliability “The capability to maintain the network operational and running following a breakdown is acknowledged as the fault tolerance” (Krakau, 2004). There are endless amount of shades of fault tolerance that we be able to utilize, relying on how risk reluctant we are as well as our organizational network are. Risk repugnance is a term usually utilized in the insurance business plus in stock trading to explain what Clint Eastwood distinguishing a bit additional graphically on film (Krakau, 2004). A significant issue that is able to influence LAN reliability is network power protection. In a network structure the constant availability of the power can make the reliable and live to the client. The protection and handling of network power is a main aspect in any network operations and implementation (Krakau, 2004). 3.3- Implementing Network Reliability and Availability Here we need to address the following aspects of the reliability. By assessing and mentoring these aspects we can have better management of the network. Continuous Monitoring The nonstop monitoring is done for the 24/7 technician accessibility that guarantees that a technician is present to reply to some network problem (Global-Messaging-Solutions, 2009) Automated monitoring & notification Though the automated monitoring and notification the service level reporting and monitoring to make sure performance as of the client viewpoint (Global-Messaging-Solutions, 2009). LAN Reliability (Global-Messaging-Solutions, 2009) and (Cisco , 2009) For the LAN Reliability the redundant switch as well as router fabric is really essential. Geographic Diversity Redundant networking mechanism in the rack Numerous switch connections or links Disaster Recovery program Establishment of the redundant links by means of automatic failover to decrease influence of planned outages as well as develop reliability Establishment of the UPS for reliability Implementation of the segmentation diminishes influence of simplifies id and failure 4- Network Security While talking about the main security aspects of any LAN network we need to make certain that whole network is efficiently protected from the outer attacks (Kurose & Ross, 2009). In our selected network the main core switch hosts all the connections of our organization servers, the active firewall connections, and the edge switches while a C2950 switch hosts the standby firewall connections. For the effective security establishment organization is currently employing the deep packet inspection firewall, web filtering and e-mail filter, anti virus solutions at Server and desktop. This structure is currently operational at the network of our organization. 4.1- Password Security In our organizational LAN network we need to implement the password based security structure. Certainly, the less expensive as well as most significant feature of network security is utilization of suitable passwords. The Password based network protection is inbuilt in a variety of aspects of the network (Texas-State-Library, 2009): Administrative right of entry to server functions Workstation access to a variety of information and data files and services Administrative access to network switches, hubs, routers, as well as firewalls Admission to administrative data files, like that secret personnel reports or files On the other hand, given its significance as an initial feature of network security, paradoxically it is frequently the least highlighted. Password based LAN network security comprises the subsequent features: documentation, selection, and enforcement. Producing and putting into practice a password strategy is the initial step in mounting password based LAN network security. The network strategy/policy will draw the rules regarding creating high-quality passwords, known as the strong passwords in the majority security credentials: the smallest number of characters to be employed (Uskela, 2009). In the password based security we have to: Build up written password strategy as well as offer to the entire staff and patrons by means of precise user logons Expand written commands in producing strong passwords and offer to the entire employees as well as patrons by means of specific user logons File passwords intended for every one network equipment, workstations, and servers Store password credentials in safe location recognized simply through library director as well as one other person 4.2- Network Equipment Security Establishment of the LAN Network equipment security is also a main security parameters that we need to implement. For our organization we need to secure the network equipment that involves the entire devices necessary to obtain data and network signals and packet as of one computer to another. Usually, the main network equipments in our network comprise switches, hubs, firewalls, and routers. Bridges can be incorporated in older designs. These LAN network items relate to the entire these devices. There is need for the purchasing network equipment and managing through the libraries that offer management capabilities. This offers the likelihood of remote administration of the network still if the library does not deal intended for that service originally. Here we need to (Cisco , 2009): Establish suitable SNMP or (network management protocol) community/ passwords strings Document as well as secure some password settings developed through staff or contractors Through the better handling and management of the network equipment we can protect and establish the security of our business and network security. 4.3- Hardware Security In our organization the complete establishment of security involves also the hardware based security. Hardware based LAN network security is a suitable group utilized to categorize miscellaneous items linked to our network hardware and computer. The initial collection of items communicated to the BIOS of our workstations and servers. The BIOS is a famous characteristic on every one AMD/ Intel PC-compatible servers as well as workstations. It carries out fundamental tests of inner mechanism to be certain they are operational adequately. It as well stores plus directs the configuration of a lot of the fractions inside the CPU case (Cisco , 2009). 4.4- LAN/Domain Server Security Securing the LAN and Domain Server Security will also be a main aspect in the effective security management of the LAN network. In bigger environment the automation system can necessitate utilization of one more operating system. In the majority small library local area networks like our organization, there will be few servers: a core LAN network server, typically a domain controller beneath a Windows based environment that confirms the logins of the entire users, as well as a file server employed by means of the library computerization structures. In a number of libraries, these two LAN network services are united on one server. It is probable to function in a extremely small setting by means of just Windows based Workstation and no server at all, however it is additional hard to uphold security in this setting. Consequently this fundamental level of security supposed the occurrence of at least one server. The following aspects for the Domain server security can be adopted (Texas-State-Library, 2009): Configuration of the entire Windows based Server partitions by means of NTFS file systems Configuration of the separate data partitions as well as operating system Mirror server drives, if financial support permits 4.5- Workstation Security Establishment of the workstation security in our organization will also bring a main step towards the better security environment establishment. While sometimes this security aspect treated as a detached topic, correctly securing workstations is an tremendously significant fraction of the whole LAN network security. There are a huge amount of configuration matters to deal with when protecting workstations. By means of the Windows-NT, Workstation/2000 Professional OS offers an enhanced security establishment than does Windows 98 (Cisco , 2009) and (Nash, 2000). Organizing Windows NT Workstation/2000 Professional partitions by means of NTFS file systems 4.6-Secuity Policy We will implement the following security policy for our organizational operational environment. Network security is first step toward the organizational data and information security. Our corporation communication Network will require more effective network security parameters for the better safety to the business and data and information. Here we will follow following steps for the better departmental security of the network. Development of the Unified Threat Management System policy Establishment of the strong firewall Implementation of the Strong Antivirus software Installation of the Internet Security Software Legal authentication through utilize of the strong passwords and user accounts For the Corporation communication Network we will use a robust password Implementation of the network monitor or the optional network analyzer Increasing the awareness among the business employees for the better physical security of the data and information Handling the network through the an progressive administrator or manager 5- Conclusion In this report I have presented a detailed analysis of the LAN based management. In this report I have discussed three main aspects those are really significant for any organizational network. Here I have presented the suitable recommendations for its development with respect to the following criteria: a) Performance b) Reliability and Availability C) Security. I hope this research based report will provide a deep insight in to the overall areas of the organizational LAN network establishment. 6- References Brenton, C., & Hunt, C. (2002). Mastering Network Security. Sybex. Cisco . (2009). Cisco Wireless LAN Security Overview. Retrieved 09 26, 2009, from http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps430/ps4076/prod_brochure09186a00801f7d0b.html Enterprisearchitecture. (2005). LAN High Availability Configuration Pattern. Retrieved 09 26, 2009, from http://enterprisearchitecture.nih.gov/ArchLib/AT/TA/LANHighAvailabilityConfigurationPattern.htm Global-Messaging-Solutions. (2009). Global Messaging Solutions, Inc. Retrieved 09 26, 2009, from PROVEN RELIABILITY. PROVEN SECURITY: http://www.gmsi1.com Krakau, W. M. (2004). LAN DESIGN - Part 2. Retrieved 09 26, 2009, from http://www.krakau-inc.com/199411.htm Kurose, J. F., & Ross, K. W. (2009). Computer Networking: A Top-Down Approach. New York: Addison Wesley. Lee, R. (1992). Identifying Test Workloads in LAN Performance Evaluation Studies. Retrieved 09 26, 2009, from http://support.novell.com/techcenter/articles/ana19920504.html Measurement Lab. (2004, February). LAN Performance Measurements Lab. Retrieved 09 26, 2009, from http://74.125.153.132/search?q=cache:GGqxDd5WFukJ:www.tele.pitt.edu/resources/lab_manuals/lab_lan.pdf+LAN+Performance&cd=8&hl=en&ct=clnk&gl=pk&client=firefox-a Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Press, B. (2000). Estimating LAN Performance Requirements. Retrieved 09 26, 2009, from http://www.informit.com/articles/article.aspx?p=20008 Saito, Y. (2002). Baseline performance in a LAN . Retrieved 09 26, 2009, from http://www.ysaito.com/osdi2002/node28.html Slater, W. F. (2009). Solving Performance Problems in a Slow LAN. Retrieved 09 26, 2009, from http://billslater.com/uop/Course_work/TCM_537_Week_5_Example.htm Tanenbaum, A. S. (2002). Computer Networks . London: Prentice Hall. Texas-State-Library. (2009). Local Area Network Security. Retrieved 09 26, 2009, from http://www.tsl.state.tx.us/ld/pubs/compsecurity/pttwolansec.html Uskela, S. (2009). Security in Wireless Local Area Networks. Retrieved 09 25, 2009, from Department of Electrical and Communications Engineering: http://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/wireless_lan.html Dslreports. (2009). What is wired ethernet? . Retrieved 09 26, 2009, from http://www.dslreports.com/faq/2731 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(URGENT: Computer Networks. Local Area Network "Evaluation &, n.d.)
URGENT: Computer Networks. Local Area Network "Evaluation &. https://studentshare.org/logic-programming/2048186-urgent-computer-networks-local-area-network-quotevaluation-future-recommendationsquot
(URGENT: Computer Networks. Local Area Network &Quot;Evaluation &)
URGENT: Computer Networks. Local Area Network &Quot;Evaluation &. https://studentshare.org/logic-programming/2048186-urgent-computer-networks-local-area-network-quotevaluation-future-recommendationsquot.
“URGENT: Computer Networks. Local Area Network &Quot;Evaluation &”. https://studentshare.org/logic-programming/2048186-urgent-computer-networks-local-area-network-quotevaluation-future-recommendationsquot.
  • Cited: 0 times

CHECK THESE SAMPLES OF Local Area Network: Evaluation and Future Recommendations

Information and Communication Technology ICT

local area network ... In summary, Cisco 3845 integrated service router is implemented for exchanging communication from the local area network interface to the WAN interface.... demonstrates the local area network of an organization below: Figure 1.... (local area network) Structure and Cabling The current network is constructed on Star topology that is the most widely adopted topology, as it has many benefits when compared to other topologies....
13 Pages (3250 words) Essay

Computer Networks Issues

The protocols for the network stay to be the same whether it is a small firm or a large wide area network.... local area networks are very essential to let the work going for any kind of organization, then may it be a software development firm or a bank, or any other organization, which requires a large number of computers connected for easy data transfer.... To have a network of computers working and serving the required purpose of data storage and retrieval, several computers need to be connected....
7 Pages (1750 words) Essay

Critical evaluation of Intercontinental hotel network

his project will be based on a critical evaluation of the Intercontinental Hotel Network.... ased on the critical evaluation of the network a new and improvised network will be suggested.... It was found that the network in use was outdated and there were some obvious loopholes.... By critically evaluating the hotel's network infrastructure, this project will suggest ways in which the system can be improved, such as better network type and design, network security, bandwidth, Aspects to be considered will include hardware and software, in addition to strategies and policies....
48 Pages (12000 words) Essay

Social Entrepreneur and Student Network

The conclusions and the recommendations sections are the last ones of this paper.... Also, in the recommendations section of this paper suggestions are made for further research, referring to gaps identified while reviewing the literature published in the particular field.... The author of this following paper under the title "Social Entrepreneur and Student network" will make an earnest attempt to focus on the design and the presentation of a social media strategy appropriate for the promotion of a specific social enterprise....
13 Pages (3250 words) Essay

Device Hardening and Secure Network Design

This paper presents the hardening and secure network design analysis.... The objective of this research is to present a detailed analysis of the secure network design.... Access control lists (ACLs) could be configured to authorize or refute UDP and TCP network traffic.... Additionally, the firewalls are implemented for additional in-depth examination; tactically positioned router ACLs thus they augment network security.... At present, network security has become the most important subject of discussion....
12 Pages (3000 words) Term Paper

Climate Change and Hydraulic Impacts on Water Networks Supply

One of the most important aspects of climate change seems to be its potential impact on the water network supply.... "Climate Change and Hydraulic Impacts on Water Networks Supply" paper states that the findings of empirical research and data published by governmental and non-governmental organizations have been employed for offering an in-depth analysis in regard to this study's subject....
12 Pages (3000 words) Literature review

Strategic Analysis for Tesco

It is a general merchandise and multinational grocery retailer founded in 1924.... The prime aim of this strategic report is to analyze the external and internal environment of Tesco PLC. ... ... he success of any.... ... ... The paper 'Strategic Analysis for Tesco" is a great example of a management assignment....
8 Pages (2000 words) Assignment

Improving Public Safety During Tsunami Emergencies

The author of the "Improving Public Safety During Tsunami Emergencies" paper discusses tsunami occurrences and effects, recommendations made by various agencies to reduce the impact of such disaster, and tsunami emergency management systems implementation.... Aside from streamlining emergency communication, coordination, and procedures, the government may include actions that can mitigate future devastation and large losses by implementing a strong coastal management policy....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us