Transport Network Design: A Comprehensive Analysis
VerifiedAdded on 2025/05/02
|25
|3205
|60
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

TRANSPORT NETWORK DESIGN
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction...........................................................................................................................................3
Lo1........................................................................................................................................................4
Lo 2.......................................................................................................................................................8
Lo 3.....................................................................................................................................................11
Lo 4.....................................................................................................................................................20
Conclusion...........................................................................................................................................22
References...........................................................................................................................................23
Introduction...........................................................................................................................................3
Lo1........................................................................................................................................................4
Lo 2.......................................................................................................................................................8
Lo 3.....................................................................................................................................................11
Lo 4.....................................................................................................................................................20
Conclusion...........................................................................................................................................22
References...........................................................................................................................................23

List of figures
Figure 1: Hierarchical design.................................................................................................................5
Figure 2: Scalable network....................................................................................................................6
Figure 3: Design of network..................................................................................................................9
Figure 4: PC1 from sales pinging to PC8 of IT department...................................................................9
Figure 5: PC2 from sales pinging to PC0 of branch.............................................................................10
Figure 6: Screenshot 1.........................................................................................................................13
Figure 7: Screenshot 2.........................................................................................................................13
Figure 8: Screenshot 3.........................................................................................................................14
Figure 9: Screenshot 4.........................................................................................................................14
Figure 10: Screenshot 5.......................................................................................................................15
Figure 11: Screenshot 6.......................................................................................................................15
Figure 12: Screenshot 7.......................................................................................................................16
Figure 13: Screenshot 8.......................................................................................................................16
Figure 14:Screenshot 9........................................................................................................................17
Figure 15: Screenshot 10.....................................................................................................................17
Figure 16: Screenshot 11.....................................................................................................................18
Figure 17: Screenshot 12.....................................................................................................................18
Figure 18: Benefits & features.............................................................................................................20
Figure 1: Hierarchical design.................................................................................................................5
Figure 2: Scalable network....................................................................................................................6
Figure 3: Design of network..................................................................................................................9
Figure 4: PC1 from sales pinging to PC8 of IT department...................................................................9
Figure 5: PC2 from sales pinging to PC0 of branch.............................................................................10
Figure 6: Screenshot 1.........................................................................................................................13
Figure 7: Screenshot 2.........................................................................................................................13
Figure 8: Screenshot 3.........................................................................................................................14
Figure 9: Screenshot 4.........................................................................................................................14
Figure 10: Screenshot 5.......................................................................................................................15
Figure 11: Screenshot 6.......................................................................................................................15
Figure 12: Screenshot 7.......................................................................................................................16
Figure 13: Screenshot 8.......................................................................................................................16
Figure 14:Screenshot 9........................................................................................................................17
Figure 15: Screenshot 10.....................................................................................................................17
Figure 16: Screenshot 11.....................................................................................................................18
Figure 17: Screenshot 12.....................................................................................................................18
Figure 18: Benefits & features.............................................................................................................20
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
In the below assignment of network design, there will increase in the demand of the robust
network in the infrastructure that will sustain the resilience & growth of the requirements of
the business. The engineers of the network will use the technologies to fulfill the needs like
availability & scalability. The company of IT will be assigned to implement the network,
design & contain the four companies such as Finance, call center, Sales & IT department with
four servers like web, email, DNS & file server. This will include the models for designing
the network & the features of the network of scalable, issues in layer 2 & 3 like bandwidth,
load & redundancy. Also, determine protocols of switch & router. Required to select the
features of LAN & configure the commands of the network. And implement the design of
LAN in layer 2& layer 3. Determine the protocols of switch redundancy & its effectiveness
for solving & also the redundancy in layer 3 for implementation in IPV4 & IPV6. Then
inspect the technologies of WAN & configure the protocols of WAN. Determine the
advantages & disadvantage of the technologies of WAN & evaluate the benefits & features of
the VPN. Deploy the tools for monitoring the network & document the methodology of
troubleshooting. Then troubleshoot issues in LAN & WAN at a different layer. At last, make
the document for all the methods of troubleshooting.
In the below assignment of network design, there will increase in the demand of the robust
network in the infrastructure that will sustain the resilience & growth of the requirements of
the business. The engineers of the network will use the technologies to fulfill the needs like
availability & scalability. The company of IT will be assigned to implement the network,
design & contain the four companies such as Finance, call center, Sales & IT department with
four servers like web, email, DNS & file server. This will include the models for designing
the network & the features of the network of scalable, issues in layer 2 & 3 like bandwidth,
load & redundancy. Also, determine protocols of switch & router. Required to select the
features of LAN & configure the commands of the network. And implement the design of
LAN in layer 2& layer 3. Determine the protocols of switch redundancy & its effectiveness
for solving & also the redundancy in layer 3 for implementation in IPV4 & IPV6. Then
inspect the technologies of WAN & configure the protocols of WAN. Determine the
advantages & disadvantage of the technologies of WAN & evaluate the benefits & features of
the VPN. Deploy the tools for monitoring the network & document the methodology of
troubleshooting. Then troubleshoot issues in LAN & WAN at a different layer. At last, make
the document for all the methods of troubleshooting.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Lo1
The network design model according to the requirement of business-
Hierarchical network
In this design model, all the layers will be focused to select the correct system & features.
Like high-speed routers of WAN will carry the traffic among the enterprises etc. The typical
model of hierarchical is the layer of the core that is for the routers of high end & the switches
that will be used to make it most effective for the performance & for availability. The layer
of distribution of switches & routers will implement the policy. The layer of access will link
the customers through the switches of lower end & the wireless points of access.
It contains the three layers
Access Layer
- It has two layer switching.
- Provide high availability.
- Security for the port.
- Spanning tree
Distribution layer
- Load balancing & redundancy
- Collection of WAN or LAN links.
- Security of the policy based on the configuration of ACLs that is an
access control list & the filtering (Du, 2015).
Core layer
- This will gives the switching high speed.
- This will tolerate the fault & reliability
- Avoid the manipulation in the intensive packet of CPU that is caused by
the inspection, security & classification of service quality.
Advantages
- It will manage or maintain the cost, scalable & trustworthy.
- Troubleshooting & management is better(Yang, 2016).
The network design model according to the requirement of business-
Hierarchical network
In this design model, all the layers will be focused to select the correct system & features.
Like high-speed routers of WAN will carry the traffic among the enterprises etc. The typical
model of hierarchical is the layer of the core that is for the routers of high end & the switches
that will be used to make it most effective for the performance & for availability. The layer
of distribution of switches & routers will implement the policy. The layer of access will link
the customers through the switches of lower end & the wireless points of access.
It contains the three layers
Access Layer
- It has two layer switching.
- Provide high availability.
- Security for the port.
- Spanning tree
Distribution layer
- Load balancing & redundancy
- Collection of WAN or LAN links.
- Security of the policy based on the configuration of ACLs that is an
access control list & the filtering (Du, 2015).
Core layer
- This will gives the switching high speed.
- This will tolerate the fault & reliability
- Avoid the manipulation in the intensive packet of CPU that is caused by
the inspection, security & classification of service quality.
Advantages
- It will manage or maintain the cost, scalable & trustworthy.
- Troubleshooting & management is better(Yang, 2016).

Figure 1: Hierarchical design
(Source: Yang, 2016)
Scalable network features:
It has the ability to add to the existing network.
It will support the new customers & the application without the performance
decrement of the system.
It is the network that will deliver the video, data & voice among various devices
(Benny, 2015).
(Source: Yang, 2016)
Scalable network features:
It has the ability to add to the existing network.
It will support the new customers & the application without the performance
decrement of the system.
It is the network that will deliver the video, data & voice among various devices
(Benny, 2015).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 2: Scalable network
(Source: Benny, 2015)
Issues at layer 2 & 3
Redundancy issues in layer2
The redundancy in the layer second will be achieved by utilizing the spanning tree. In every
network, it will experience the loops in the network. When the second layer will occur in the
packets that will be replicated to the infinite no. of times that will bring down the network.
The protocols of spanning tree will keep the topology of logical free from loops. There are
some failures, that is incorrect wiring, bugs in the loops & unidirectional links.
Redundancy issues in layer3
The redundancy in the layer third will be achieved by the protocol of routing. The routing
protocol will be more stable than the spanning tree. This layer will carry the VLAN which is
basically utilized to merely making the switches from the routing viewpoint. This will
deploy the pair of switches & each pair will subnet of the other one.
Bandwidth issues in layer 2
In this layer, the issues come across are, if there is no proper internet connection like no
signals of Wi-Fi or modem & the signals are not that strong to transmit the data through the
network. If the data is not identified then also it will make the trouble in the layer of datalink.
It will be resolved when the network connection is proper.
Bandwidth issues in layer 3
(Source: Benny, 2015)
Issues at layer 2 & 3
Redundancy issues in layer2
The redundancy in the layer second will be achieved by utilizing the spanning tree. In every
network, it will experience the loops in the network. When the second layer will occur in the
packets that will be replicated to the infinite no. of times that will bring down the network.
The protocols of spanning tree will keep the topology of logical free from loops. There are
some failures, that is incorrect wiring, bugs in the loops & unidirectional links.
Redundancy issues in layer3
The redundancy in the layer third will be achieved by the protocol of routing. The routing
protocol will be more stable than the spanning tree. This layer will carry the VLAN which is
basically utilized to merely making the switches from the routing viewpoint. This will
deploy the pair of switches & each pair will subnet of the other one.
Bandwidth issues in layer 2
In this layer, the issues come across are, if there is no proper internet connection like no
signals of Wi-Fi or modem & the signals are not that strong to transmit the data through the
network. If the data is not identified then also it will make the trouble in the layer of datalink.
It will be resolved when the network connection is proper.
Bandwidth issues in layer 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

It will deliver the packet from source to the destination, it will support the connection &
connectionless protocols. But if the connection is not strong then it will not transfer the data,
will not handle the errors & congestion will occur. It will be solved by utilizing good & fast
internet.
Load issue in layer2
This will be balanced in layer 2 as it will not able to transmit the data over the network. For
balancing the load it is necessary to use the some protocols. So, it will not occur any problem.
Load issue in layer3
It is the network layer where the load will require being a balance to provide the fast routing
& transferring the packets over the network. This will be balanced by using the gateway of
the protocol.
connectionless protocols. But if the connection is not strong then it will not transfer the data,
will not handle the errors & congestion will occur. It will be solved by utilizing good & fast
internet.
Load issue in layer2
This will be balanced in layer 2 as it will not able to transmit the data over the network. For
balancing the load it is necessary to use the some protocols. So, it will not occur any problem.
Load issue in layer3
It is the network layer where the load will require being a balance to provide the fast routing
& transferring the packets over the network. This will be balanced by using the gateway of
the protocol.

Protocols for redundancy:
Redundancy in switch protocol
It is the VSRP (Virtual Switch Redundancy Protocol) is the protocol of broadepropritary; it
gives redundancy & failure in layer 2 & 3. This also means that the second layer will be
backed up.
Redundancy in router protocol
It is VRRP (Virtual Router Redundancy Protocol) is the protocol of the computer network
that will produce for the automatic assignments that of available IP routers for the host
participation.
This will support the network of scalable by growing in size without affecting other users &
by backing up the data. As decreasing the load in the traffic & also decrease the traffic in the
network (Evens, 2017).
Lo 2
Types of LAN devices
Network hub
It is used to link many host of networks. It will utilize to transfer the data. The data will
transfer in the form of the packets on the network of computer. As when the host will transfer
the data to the hub of the network. Then the hub will copy the data to the linked port.
Network switch
It is likewise the hub but it smarter than the hub. As hub only forward the data but switch will
do both filterings & forwarding the data. This is a more smart way to deal with the packets of
data.
Modem
It is the device that will use by many of us. This will use to carry the connection of the
internet to transfer the data outside the world of the internet. It will modulate & demodulates,
signals among the digital computer data & the signal of analog type.
Network router
It will be responsible for the traffic of the router from one network to another. This will be
the network of a private company to the network of public.
Bridge
Redundancy in switch protocol
It is the VSRP (Virtual Switch Redundancy Protocol) is the protocol of broadepropritary; it
gives redundancy & failure in layer 2 & 3. This also means that the second layer will be
backed up.
Redundancy in router protocol
It is VRRP (Virtual Router Redundancy Protocol) is the protocol of the computer network
that will produce for the automatic assignments that of available IP routers for the host
participation.
This will support the network of scalable by growing in size without affecting other users &
by backing up the data. As decreasing the load in the traffic & also decrease the traffic in the
network (Evens, 2017).
Lo 2
Types of LAN devices
Network hub
It is used to link many host of networks. It will utilize to transfer the data. The data will
transfer in the form of the packets on the network of computer. As when the host will transfer
the data to the hub of the network. Then the hub will copy the data to the linked port.
Network switch
It is likewise the hub but it smarter than the hub. As hub only forward the data but switch will
do both filterings & forwarding the data. This is a more smart way to deal with the packets of
data.
Modem
It is the device that will use by many of us. This will use to carry the connection of the
internet to transfer the data outside the world of the internet. It will modulate & demodulates,
signals among the digital computer data & the signal of analog type.
Network router
It will be responsible for the traffic of the router from one network to another. This will be
the network of a private company to the network of public.
Bridge
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The bridge will link the two subnetworks & router will link the different network types of
similar network.
Figure 3: Design of network
Figure 4: PC1 from sales pinging to PC8 of IT department
similar network.
Figure 3: Design of network
Figure 4: PC1 from sales pinging to PC8 of IT department
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 5: PC2 from sales pinging to PC0 of branch
Different types of protocols for the switch redundancy
1) Protocol for Spanning tree
It is the protocol for the network that will construct the logical topology that is loop-
free for the network of Ethernet.
2) Protocol for the redundancy of common address
It is the protocol for the network of the computer that will allow the various hosts on
the similar LAN to share the IP addresses set.
3) Protocol for the redundancy of virtual router
It is the protocol for the network of the computer that will produce the automatic
assignment for the IP routers that are available for host participation.
4) Protocol for the router of Hot standby
If the protocol for the redundancy of proprietary to establishing the default gateway to
tolerate the fault(Xu, 2018).
To solve the issues of redundancy is important & effective as it is implemented by the
network of enterprise & will provide a redundant source for network communication. It will
serve the operation for swapping the network in the infrastructure of redundant that is for the
not planned network.
Different types of protocols for the switch redundancy
1) Protocol for Spanning tree
It is the protocol for the network that will construct the logical topology that is loop-
free for the network of Ethernet.
2) Protocol for the redundancy of common address
It is the protocol for the network of the computer that will allow the various hosts on
the similar LAN to share the IP addresses set.
3) Protocol for the redundancy of virtual router
It is the protocol for the network of the computer that will produce the automatic
assignment for the IP routers that are available for host participation.
4) Protocol for the router of Hot standby
If the protocol for the redundancy of proprietary to establishing the default gateway to
tolerate the fault(Xu, 2018).
To solve the issues of redundancy is important & effective as it is implemented by the
network of enterprise & will provide a redundant source for network communication. It will
serve the operation for swapping the network in the infrastructure of redundant that is for the
not planned network.

Implement the redundancy in layer 3 for IPv4 & IPv6:
IPV4
The VRRP will be designed to remove the failure of a single point that is inherent in the
environment of static routed. It will specify the protocol for the election that a.ssign the
dynamically responsible for the router of virtual to the router of VRRP on the LAN. The
process of election will produce the dynamic fail in the responsibility for forwarding the
unavailable. Any IPV4 address on the LAN will be utilized as the default hop router by the
end hosts. The benefit of using this is higher availability for the default path (Lindem, 2018).
IPV6
The VRRP in the IPV6 will produce the switch that is faster to the other alternative router
that is default & may be obtained by utilizing the procedure of ND. By utilizing the VRRP
router for backup may be failed over the default router. This will be done without any
contacting with host & minimum traffic amount of VRRP.
Lo 3
WAN technologies
1) SONET
It is the type of protocol that will transmit the speed of the data of 150 Gbps by use of the
links of the fiber but will be controlled by the clocks of atomic.
IPV4
The VRRP will be designed to remove the failure of a single point that is inherent in the
environment of static routed. It will specify the protocol for the election that a.ssign the
dynamically responsible for the router of virtual to the router of VRRP on the LAN. The
process of election will produce the dynamic fail in the responsibility for forwarding the
unavailable. Any IPV4 address on the LAN will be utilized as the default hop router by the
end hosts. The benefit of using this is higher availability for the default path (Lindem, 2018).
IPV6
The VRRP in the IPV6 will produce the switch that is faster to the other alternative router
that is default & may be obtained by utilizing the procedure of ND. By utilizing the VRRP
router for backup may be failed over the default router. This will be done without any
contacting with host & minimum traffic amount of VRRP.
Lo 3
WAN technologies
1) SONET
It is the type of protocol that will transmit the speed of the data of 150 Gbps by use of the
links of the fiber but will be controlled by the clocks of atomic.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 25
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.