Computer Network LAN
Informatikos kursinis darbas. Task 1 LAN(Local Area Network) technologies. LAN Technologies available in the market. (QoS) Quality of Service and bandwidth management. LAN network security, availability and performance. Task 2 LAN design infrastructures. Design network using switches, routers, cables. Evaluate the problems for Security, Scalability and Availability the network of design from scenario. Network Security. Network Scalability. Network Availability. Task 3 Local Area Network infrastructures. Show scenario Local Area Network design with all workstations (PC, Server, Router, Switches and etc). Choice LAN techniques (VLSM or others and prepare IP address, subnet, Broadcast). Network technologies and devices security such as Access Control Lists, Port Security, VLANs. Network test for performance, availability and security and give for IT director test result. Task-4 Manage Local Area Network infrastructures. Do Local Area Network performance baseline for our scenario Local Area Network. Write about some of network monitoring software. To help administrator monitor network. Connect for Library new device such as PC show process step by step. Task -5 Network Lab Work. Give all configurations and design Files to show Local Area Network design and configuration.
Bus topology. Connections such as backbone or trunk, called the bus topology. This topology Data sent between two networks goes along the bus and are received by all network stations at once. (10.Stacie Durkin. 2007)
Star topology – all devices connected to one network station. Sending data transmitted from first network nodes to central node (10.Stacie Durkin. 2007).
Ring topology. All devices connected to each other in closed loop. Packet travels from one node to another, usually network flows in a single direction (9.Stacie Durkin 2007).
Mesh Topology. Every node in the network has individual connectivity with every other node in the network. Mesh topology is mainly used in networks, to connect Routers/Switches together. This topology is more useful because if something happens with one of connections the device can connect another way (11.computernetworkingsimplified 2010).
Ethernet - is a Local Area Network implementation technology. It was standardized in IEEE 802.3. Network Interface cards are equipped with 48bits MAC address. Ethernet provides transmission speed up to 10mbps uses Coaxial cable or Cat5 Twisted Pair cable with RJ5 connector (12.tutorialspoint. (2012).
Fast-Ethernet can be connected by Optical Fibre cable or it can be connected wireless. The Fast Ethernet connection speed can be up to 100 mbps and can connect device longer than 100m distance (12.tutorialspoint. 2012).
Giga-Ethernet. Speed up to 1000 Mbps. IEEE802.3ab connection device can be up to 30 miles distance and can be connected over UTP using Cat5, Cat5e and Cat6 cables (12.tutorialspoint. 2012).
Virtual LAN - VLAN. To connect VLAN single Broadcast domain and one single domain are used. VLAN is a method that one single real network can be separate into more Virtual networks (VLANs). VLAN is good when talking about security because it is inside main network and Administrator can configure all VLANs. Administrator can do Access control between VLANs what gives more security inside the network and Administrator can easily monitor all VLANs (12.tutorialspoint.2012).
LAN covers a small geographic area connecting a group of computers. LAN is able to serve from few to thousands of users. LAN can use FDDI technology for higher speed communication. At the moment Ethernet is the most popular LAN technology in the market. Token Ring technology is not as popular but is still used by some of the companies. LAN is mostly used in business market such as our college that contains 239 computers; 2 local printers and 2 servers. In this case to make a network I use LAN with switch Ethernet cables Technology but for Security and Availability I convert our LAN to VLANs technology to secure all VLANs. VLANs can be configured as Access control List and can share same network in different places without losing connectivity speed (1.Edrawsoft 2012).
The QoS is used to prioritize network traffic. QoS is used to control latency and jitter, make sure that the applications get adequate bandwidth, also to reduce data loss.
Quality of service and bandwidth management ensures that specific groups, users, or some of the specific network types are appropriate by level of service. Qos can be used only if current network maintains ToS bit. QoS is able to manipulate ToS bits to dictate how the network traffic is treated. Bandwidth Management provides the traffic coming in or out by assigning administrators prioritize traffic. Bandwidth can be minimum or maximum speed depending on users, sources, destinations and etc. If external Type of Service values work in conjunction with bandwidth management it can regulate which bandwidth management class applies to a special transaction which allows the device to co-operate with more QoS enabled networking appliances.