Loading learning content...
Local Area Networks exist to serve applications. The cables, switches, and access points we've studied are means to an end—enabling people and systems to communicate, share resources, and accomplish work. Understanding LAN applications helps network professionals design infrastructure that meets actual business needs rather than arbitrary technical specifications.
LAN applications span a remarkable range—from simple file sharing to real-time financial trading systems, from basic printing to immersive video conferencing, from centralized backups to distributed computing clusters. Each application has unique requirements for bandwidth, latency, reliability, and security. A network that excels at bulk file transfers might fail miserably for voice communications if designed without understanding these requirements.
This page explores the major categories of LAN applications, their technical requirements, and the network design considerations each demands.
By the end of this page, you will understand the major applications that LANs support—file and print services, email and messaging, voice and video, directory services, network management, and business-critical applications. You'll know the bandwidth, latency, and reliability requirements for each category and how these requirements influence network design.
File sharing was the original driving force behind LAN development. The ability to access shared files without physical media exchange remains fundamental to organizational productivity.
Server-Based File Sharing:
Centralized file servers provide:
Common File Sharing Protocols:
| Protocol | Platform | Port | Characteristics |
|---|---|---|---|
| SMB/CIFS | Windows, cross-platform via Samba | TCP 445 | Active Directory integration, encryption, signing |
| NFS | Unix/Linux, macOS | TCP/UDP 2049 | Root-level mounting, stateless v3, stateful v4 |
| AFP | macOS (legacy) | TCP 548 | Deprecated in favor of SMB |
| iSCSI | Block-level access | TCP 3260 | Storage area networking over IP |
| FTP/SFTP | Cross-platform | TCP 21/22 | Simple transfers, SFTP for security |
SMB (Server Message Block):
SMB is the dominant file sharing protocol in enterprise environments:
Performance Considerations:
Network Requirements:
| Workload | Bandwidth Need | Latency Sensitivity | Notes |
|---|---|---|---|
| Office documents | Low-Medium | Moderate | Small files, frequent access |
| Design files (CAD/video) | High | Low | Large files, infrequent access |
| Databases | Medium | Critical | Random I/O, locks |
| Home directories | Medium | Moderate | Profile loading on login |
Modern Approaches:
SMB3 multichannel can aggregate multiple network paths between client and server. With two 10 GbE connections, a single file transfer can approach 20 Gbps. This also provides redundancy—if one NIC fails, transfers continue over the remaining path. Requires NICs in same subnet or spanning VLANs.
Network printing enables shared access to printing resources, reducing costs and improving management compared to direct-connected printers.
Print Architecture Components:
1. Network Printers:
2. Print Servers:
3. Print Clients:
Print Protocols:
Enterprise Print Management:
Pull Printing (Secure Print Release):
Print Tracking and Accounting:
Network Requirements for Printing:
Printing is surprisingly network-intensive:
Common Issues:
| Problem | Cause | Solution |
|---|---|---|
| Slow printing | Network congestion | QoS, dedicated VLAN |
| Jobs disappear | Firewall blocking | Allow print protocol ports |
| Can't find printer | Discovery blocked | Allow mDNS/SSDP or use static config |
| Authentication fails | Kerberos issues | Check time sync, DNS |
| Driver problems | Version mismatch | Centralize driver distribution |
The Windows Print Spooler has been the source of critical vulnerabilities (PrintNightmare, etc.). Best practices include: disable Print Spooler where not needed, restrict driver installation privileges, segment printers into dedicated VLANs, and keep systems patched.
Voice over IP has largely replaced traditional telephony in enterprise environments. VoIP transforms voice communication into data packets that traverse the same LAN infrastructure as other traffic—but with stringent performance requirements.
VoIP Architecture:
IP Phones:
Call Control Systems:
VoIP Codecs:
| Codec | Bandwidth | Quality | Use Case |
|---|---|---|---|
| G.711 (a-law/μ-law) | 64 kbps + overhead | Toll quality | LAN, high-quality calls |
| G.729 | 8 kbps + overhead | Near-toll quality | WAN, bandwidth-constrained |
| G.722 | 48-64 kbps + overhead | Wideband (HD voice) | High-quality conferencing |
| Opus | 6-510 kbps (variable) | Excellent, adaptive | WebRTC, modern UC platforms |
Network Requirements for VoIP:
VoIP is extremely sensitive to network performance issues:
Latency:
300ms causes noticeable awkwardness in conversation
Jitter:
Packet Loss:
QoS Requirements:
VoIP must be prioritized over bulk data traffic:
Voice VLAN:
Best practice separates voice and data into distinct VLANs:
Modern 'VoIP' is really Unified Communications (UC)—voice, video, messaging, presence, and collaboration integrated into single platforms like Microsoft Teams, Cisco Webex, or Zoom. UC traffic has varying requirements: a persistent IM connection uses minimal bandwidth, while a 4K video call needs 8+ Mbps. Networks must accommodate this variability.
Video is among the most demanding LAN applications, consuming significant bandwidth while requiring consistent performance. Video applications range from one-on-one video calls to large-scale surveillance systems with hundreds of cameras.
Video Conferencing:
Modern video conferencing platforms (Teams, Zoom, WebEx) are essential for remote collaboration:
Bandwidth Requirements:
| Quality | Resolution | Video Bitrate | Audio | Total (with overhead) |
|---|---|---|---|---|
| Low | 360p | 400 kbps | 50 kbps | ~500 kbps |
| Standard | 720p | 1.2 Mbps | 80 kbps | ~1.5 Mbps |
| HD | 1080p | 2.5 Mbps | 100 kbps | ~3 Mbps |
| Gallery view (15+ participants) | Mixed | 4-6 Mbps | — | ~6 Mbps |
| 4K | 2160p | 8-10 Mbps | 100 kbps | ~10 Mbps |
Screen Sharing: Screen sharing can be more bandwidth-intensive than video when content changes frequently (scrolling, animations). Static content compresses well; dynamic content may use 2-5 Mbps.
Video Surveillance (CCTV):
IP-based video surveillance places sustained, predictable load on networks:
Camera Bandwidth Calculation:
Bandwidth = Resolution × Frame Rate × Color Depth × Compression Factor
Example: 1080p @ 30fps with H.264 compression
Surveillance Network Design:
Digital Signage:
LAN-connected displays for information, advertising, and wayfinding:
Streaming Media:
IGMP snooping enables switches to forward multicast video only to ports with interested receivers, rather than flooding all ports. Without IGMP snooping, a 5 Mbps surveillance multicast stream floods every access port in the VLAN. With IGMP snooping, only ports connected to viewers receive the stream.
Directory services provide centralized identity management—the foundation for authentication, authorization, and policy enforcement across the LAN.
Active Directory Domain Services (AD DS):
Microsoft's Active Directory remains dominant in enterprise environments:
AD Network Requirements:
| Service | Protocol/Port | Purpose | Criticality |
|---|---|---|---|
| Kerberos | TCP/UDP 88 | Authentication | Essential |
| LDAP | TCP/UDP 389 | Directory queries | Essential |
| LDAPS | TCP 636 | Secure directory queries | Recommended |
| Global Catalog | TCP 3268 (3269 SSL) | Forest-wide queries | Multi-domain essential |
| DNS | TCP/UDP 53 | Name resolution | Essential |
| SMB | TCP 445 | Group Policy, SYSVOL | Essential |
| NTP | UDP 123 | Time synchronization | Critical for Kerberos |
| RPC | Dynamic (49152-65535) | Replication, management | Essential |
Domain Controller Placement:
For reliable authentication and fast logon:
LDAP and Other Directory Services:
DNS in the LAN:
DNS is the most critical network service after basic connectivity:
DHCP:
Dynamic Host Configuration Protocol automates IP address assignment:
Kerberos authentication fails if clocks differ by more than 5 minutes. All domain members must sync to domain controllers, and DCs sync to authoritative time sources. NTP misconfiguration is a common cause of authentication failures and can be difficult to diagnose ('it just stopped working').
Network management encompasses the tools and services that enable administrators to configure, monitor, and troubleshoot the LAN infrastructure itself.
Management Protocols:
Monitoring Systems:
| Category | Examples | Function |
|---|---|---|
| SNMP Monitoring | PRTG, Zabbix, LibreNMS | Device availability, performance metrics |
| Performance/APM | Datadog, Dynatrace, SolarWinds | Application performance, user experience |
| Log Management | Splunk, ELK Stack, Graylog | Centralized logging, search, correlation |
| Flow Analysis | Plixer Scrutinizer, ntopng | Traffic patterns, bandwidth utilization |
| Configuration | Oxidized, RANCID, Ansible | Config backup, change tracking, automation |
Out-of-Band Management:
For critical infrastructure, management should not depend on the production network:
Automation and Orchestration:
Modern LAN management increasingly relies on automation:
If you can't reach a device to configure it, you can't fix problems. Management network design should ensure reachability even during failures. This might mean separate management VLANs, diverse paths to critical devices, or cellular backup for truly critical sites. The management network should be the most reliable network in your infrastructure.
Beyond general-purpose services, many organizations run mission-critical applications on their LANs—applications where network performance directly impacts business outcomes, safety, or regulatory compliance.
Database Applications:
Database traffic has unique characteristics:
Requirements:
ERP/Business Systems:
Enterprise Resource Planning systems (SAP, Oracle, workday) are operational lifelines:
Healthcare Systems:
Financial Trading:
Financial applications have extreme requirements:
Industrial Control (OT Networks):
Virtualization and Cloud:
Network engineers must understand application requirements before designing infrastructure. A network that's 'fast enough' for file sharing may be completely inadequate for real-time trading or industrial control. Always engage with application owners to understand their specific requirements for bandwidth, latency, and reliability.
We've explored the diverse applications that LANs support—from fundamental infrastructure services to demanding real-time and mission-critical applications. Understanding these applications is essential for designing networks that meet actual business needs.
What's Next:
Now that we understand LAN applications, we'll explore practical home and office LAN implementations. The next page examines how LAN concepts apply to real-world deployments—from small home networks to enterprise office environments.
You now understand the major applications that LANs support and their network requirements. This application-aware perspective is essential for designing, sizing, and troubleshooting networks that serve real organizational needs rather than abstract specifications.