Transport Network Design and Implementation Report
VerifiedAdded on 2025/04/10
|34
|4552
|439
AI Summary
Desklib provides past papers and solved assignments for students. This report details transport network design and implementation.

Transport Network Design
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Table of Figures...............................................................................................................................3
Introduction......................................................................................................................................5
LO1 Explore LAN design principles and their application in the network design process............6
P1 Examine the network design models and features of scalable networks based on a given set
of business need...........................................................................................................................6
P2 Discuss LAN redundancy, bandwidth, and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................8
LO2 Implement a network using LAN design principles based on a predefined set of
requirements..................................................................................................................................11
P3 Select LAN devices based on features and requirements and apply basic configuration
commands for network connectivity.........................................................................................11
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols.................................................................................................................13
LO3 Produce an appropriate WAN solution to a set of organizational requirements...................14
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................14
P6 Configure WAN protocols as part of an enterprise network solution..................................18
LO4 Solve a range of network related problems using appropriate troubleshooting techniques
and methods...................................................................................................................................19
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................19
Table of Figures...............................................................................................................................3
Introduction......................................................................................................................................5
LO1 Explore LAN design principles and their application in the network design process............6
P1 Examine the network design models and features of scalable networks based on a given set
of business need...........................................................................................................................6
P2 Discuss LAN redundancy, bandwidth, and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................8
LO2 Implement a network using LAN design principles based on a predefined set of
requirements..................................................................................................................................11
P3 Select LAN devices based on features and requirements and apply basic configuration
commands for network connectivity.........................................................................................11
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols.................................................................................................................13
LO3 Produce an appropriate WAN solution to a set of organizational requirements...................14
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................14
P6 Configure WAN protocols as part of an enterprise network solution..................................18
LO4 Solve a range of network related problems using appropriate troubleshooting techniques
and methods...................................................................................................................................19
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................19

P8...............................................................................................................................................24
Conclusion.....................................................................................................................................27
References......................................................................................................................................28
Conclusion.....................................................................................................................................27
References......................................................................................................................................28
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Table of Figures
Figure 1: Three-tier network design model.....................................................................................5
Figure 2: Two-tier network design model.......................................................................................6
Figure 3: Open System Interconnection Model...............................................................................7
Figure 4: DHCP Configuration......................................................................................................10
Figure 5: DNS Configuration........................................................................................................11
Figure 6: Email configuration........................................................................................................11
Figure 7: FTP configuration..........................................................................................................12
Figure 8: HSRP configuration.......................................................................................................12
Figure 9: Circuit Switching...........................................................................................................14
Figure 10: Point to point links.......................................................................................................14
Figure 11: Packet Switching..........................................................................................................15
Figure 12: WAN virtual circuit......................................................................................................15
Figure 13: ISDN terminal adapter.................................................................................................17
Figure 14: RIP Configuration for router 1.....................................................................................17
Figure 15: RIP Configuration for router 2.....................................................................................18
Figure 16: Bottom-up troubleshooting method.............................................................................20
Figure 17: Divide and conquer method of troubleshooting...........................................................21
Figure 18: Top-down troubleshooting...........................................................................................22
Figure 1: Three-tier network design model.....................................................................................5
Figure 2: Two-tier network design model.......................................................................................6
Figure 3: Open System Interconnection Model...............................................................................7
Figure 4: DHCP Configuration......................................................................................................10
Figure 5: DNS Configuration........................................................................................................11
Figure 6: Email configuration........................................................................................................11
Figure 7: FTP configuration..........................................................................................................12
Figure 8: HSRP configuration.......................................................................................................12
Figure 9: Circuit Switching...........................................................................................................14
Figure 10: Point to point links.......................................................................................................14
Figure 11: Packet Switching..........................................................................................................15
Figure 12: WAN virtual circuit......................................................................................................15
Figure 13: ISDN terminal adapter.................................................................................................17
Figure 14: RIP Configuration for router 1.....................................................................................17
Figure 15: RIP Configuration for router 2.....................................................................................18
Figure 16: Bottom-up troubleshooting method.............................................................................20
Figure 17: Divide and conquer method of troubleshooting...........................................................21
Figure 18: Top-down troubleshooting...........................................................................................22
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 19: Web server successful..................................................................................................23
Figure 20: FTP Successful.............................................................................................................24
Figure 21: DHCP Successful.........................................................................................................24
Figure 22: Different department ping............................................................................................25
Figure 23: Different Network ping................................................................................................25
Figure 20: FTP Successful.............................................................................................................24
Figure 21: DHCP Successful.........................................................................................................24
Figure 22: Different department ping............................................................................................25
Figure 23: Different Network ping................................................................................................25

Introduction
This report is based on the discussions and design of transport network system for an IT
company that requires a completely new infrastructure design of network system with high
security and high performance. This report will highlight the network models designs and the
most appropriate network design according to the requirement of the client. The discussions in
this report will cover the scalable network feature, LAN redundancy issues, bandwidth issue,
load issue with the Open System Interconnection model (OSI), WAN technologies and
monitoring tools and troubleshooting methods in setting network baseline. The implementation
of the design and the design protocols will also be explained in the report. This report will
provide a detailed presentat6ion of the features and workability of the designed transport
network system according to the client's requirement.
This report is based on the discussions and design of transport network system for an IT
company that requires a completely new infrastructure design of network system with high
security and high performance. This report will highlight the network models designs and the
most appropriate network design according to the requirement of the client. The discussions in
this report will cover the scalable network feature, LAN redundancy issues, bandwidth issue,
load issue with the Open System Interconnection model (OSI), WAN technologies and
monitoring tools and troubleshooting methods in setting network baseline. The implementation
of the design and the design protocols will also be explained in the report. This report will
provide a detailed presentat6ion of the features and workability of the designed transport
network system according to the client's requirement.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO1 Explore LAN design principles and their application in the network
design process
P1 Examine the network design models and features of scalable networks based on a given
set of business needs.
Network Design Models
Network design models for an enterprise is designed according to Hierarchical network design
that breaks the complex design of the network systems into smaller and simpler networks that are
manageable. Further Hierarchical model is categorized into a three-tier model and two-tier
model.
Three tier model
Three tier models for network design are used in the large enterprises that are consisting of more
than one distribution layers blocks of network systems.
Figure 1: Three-tier network design model
Source: (Al-shawi, 2016)
Two tier model
design process
P1 Examine the network design models and features of scalable networks based on a given
set of business needs.
Network Design Models
Network design models for an enterprise is designed according to Hierarchical network design
that breaks the complex design of the network systems into smaller and simpler networks that are
manageable. Further Hierarchical model is categorized into a three-tier model and two-tier
model.
Three tier model
Three tier models for network design are used in the large enterprises that are consisting of more
than one distribution layers blocks of network systems.
Figure 1: Three-tier network design model
Source: (Al-shawi, 2016)
Two tier model
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Two tier network design models are suitable for medium or small size networks That does not
contains more than three interconnected disruption blocks that are functional. Two tier model is
used where the distribution and the core function of the hierarchical model can be combined into
a single layer. This is also known as a Collapsed core-distribution system.
Figure 2: Two-tier network design model
Source: (Al-shawi, 2016)
Scalable networks
Scalable networks have the capability to accommodate the growing traffic of work and have the
potentiality of enlarging itself according to the work pressure. Scalability of a network system is
important as it plays an important role in the databases, routers, networking and electronic
systems.
Features of scalable networks
Scalable networks are available and reliable as it provides quality of service top every
protocols and application without interrupting the user experience at the desktop.
Scalable networks are responsive as it has the capability of responding to the latency
issue regarding SNA system network architecture traffic.
Scalable networks are efficient in using bandwidth resource by increasing the data
throughput and not increasing the hardware or WAN services. It decreases unnecessary
broadcast, routing updates and service location request.
Sca; able networks are adaptable as it can adapt itself to different hardware technologies,
protocols, and applications.
contains more than three interconnected disruption blocks that are functional. Two tier model is
used where the distribution and the core function of the hierarchical model can be combined into
a single layer. This is also known as a Collapsed core-distribution system.
Figure 2: Two-tier network design model
Source: (Al-shawi, 2016)
Scalable networks
Scalable networks have the capability to accommodate the growing traffic of work and have the
potentiality of enlarging itself according to the work pressure. Scalability of a network system is
important as it plays an important role in the databases, routers, networking and electronic
systems.
Features of scalable networks
Scalable networks are available and reliable as it provides quality of service top every
protocols and application without interrupting the user experience at the desktop.
Scalable networks are responsive as it has the capability of responding to the latency
issue regarding SNA system network architecture traffic.
Scalable networks are efficient in using bandwidth resource by increasing the data
throughput and not increasing the hardware or WAN services. It decreases unnecessary
broadcast, routing updates and service location request.
Sca; able networks are adaptable as it can adapt itself to different hardware technologies,
protocols, and applications.

Scalable networks are secure and accessible as it is accessible for different connections
with the use of switch services and dialups by maintaining the integrity of the network
(Cisco, 2018).
P2 Discuss LAN redundancy, bandwidth, and load related issues and possible solutions
with reference to Layer 2 and Layer 3 of the OSI Model
LAN redundancy
The redundancy of a network is the key to maintaining the reliability of a network system. The
physical links between the devices of a network system form the redundant paths. On the failure
of a single link nor port network operations does not stop. The reluctant links help in increasing
the capacity of a network system by sharing the network traffic. Multiple paths are been selected
for maintaining the loops created due to the LAN redundancy. Routers or multilayer switches are
been used as redundant devices that are used as an alternative gateway when the primary route
gateway fails.
OSI (Open system Interconnection) Model
Open system interconnections standardize the functionality of the computing system and
telecommunication system in the world.
Figure 3: Open System Interconnection Model
Source: (Electrical, 2019)
with the use of switch services and dialups by maintaining the integrity of the network
(Cisco, 2018).
P2 Discuss LAN redundancy, bandwidth, and load related issues and possible solutions
with reference to Layer 2 and Layer 3 of the OSI Model
LAN redundancy
The redundancy of a network is the key to maintaining the reliability of a network system. The
physical links between the devices of a network system form the redundant paths. On the failure
of a single link nor port network operations does not stop. The reluctant links help in increasing
the capacity of a network system by sharing the network traffic. Multiple paths are been selected
for maintaining the loops created due to the LAN redundancy. Routers or multilayer switches are
been used as redundant devices that are used as an alternative gateway when the primary route
gateway fails.
OSI (Open system Interconnection) Model
Open system interconnections standardize the functionality of the computing system and
telecommunication system in the world.
Figure 3: Open System Interconnection Model
Source: (Electrical, 2019)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The layers of open system interconnections:
Physical layer: Physical layer is the first layers it concerns with the transmission of data
bits with the help of the physical medium.
Data Link: Data layer is the second layer that enables the transfer of frames between the
nodes that are connected between the physical layers.
Network Layer: Routing, traffic control and addressing of the transfer nodes are
controlled by network layer.
Transport layer: the transport layer is the fourth layer which defines the multiplexing,
and acknowledgment between the points of the network system.
Session layer: The exchange of network data between nodes into continuous manner is
controlled by the session layer.
Presentation Layer: layer six is the presentation layer that concerns with the
encryption/decryption, encoding and data compression between the services of the
network.
Application layer: High-level API's, remote file access and resource sharing are
described by the seventh layer of the open system interconnection model.
1st, 2nd, and 3rd layer are known as the media layer of Open system interconnection model and 4th,
5th, 6th, and 7th layer are known as host layers of Open System Interconnection model (O'Keefe,
2018).
Redundancy is important in a hierarchical network as it prevents the disruption of network
services from resource to users. Physicals paths are to be added top redundant networks but this
is not enough to use physical paths logical redundancy is also important in designi8ng of a
network process. A layer 2 loop in an open system interconnection model occurs due to the
switches operations that involve the learning and the4 forwarding processes. A layer 2 loop
occurs due to multiple paths connections between two devices and there is no spanning tree is
implemented in the switches.
There occur three issues due to layer 2 loop:
Physical layer: Physical layer is the first layers it concerns with the transmission of data
bits with the help of the physical medium.
Data Link: Data layer is the second layer that enables the transfer of frames between the
nodes that are connected between the physical layers.
Network Layer: Routing, traffic control and addressing of the transfer nodes are
controlled by network layer.
Transport layer: the transport layer is the fourth layer which defines the multiplexing,
and acknowledgment between the points of the network system.
Session layer: The exchange of network data between nodes into continuous manner is
controlled by the session layer.
Presentation Layer: layer six is the presentation layer that concerns with the
encryption/decryption, encoding and data compression between the services of the
network.
Application layer: High-level API's, remote file access and resource sharing are
described by the seventh layer of the open system interconnection model.
1st, 2nd, and 3rd layer are known as the media layer of Open system interconnection model and 4th,
5th, 6th, and 7th layer are known as host layers of Open System Interconnection model (O'Keefe,
2018).
Redundancy is important in a hierarchical network as it prevents the disruption of network
services from resource to users. Physicals paths are to be added top redundant networks but this
is not enough to use physical paths logical redundancy is also important in designi8ng of a
network process. A layer 2 loop in an open system interconnection model occurs due to the
switches operations that involve the learning and the4 forwarding processes. A layer 2 loop
occurs due to multiple paths connections between two devices and there is no spanning tree is
implemented in the switches.
There occur three issues due to layer 2 loop:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Broadcast storms: Each switch in a loop when broadcast endlessly due to the absence of
any loop avoidance process. Such situation where switches broadcast endlessly is known
as broadcast storms.
MAC database instability: When different parts of a switch receive the same frame of the
MAC address tables then there occurs instability in the content of MAC address.
Multiple frame transmission: Sometimes the destination stations are p[provide with more
than one copies of unicast frames but the protocols at different stations expect only one
frame so this cause error which is not recovered easily.
Bandwidth Issues
Layer 3 is the network layer routing issue and network addressing the issue are most common in
layer 3. The causes for network issues are the incorrect configuration of the device, networking
devices that are damaged, the bandwidth of the network and issue related to authentication. The
improper connection of the switches leads to bandwidth problem in layer 2 and layer 3 of the
OSI model that can be solved by correcting the protocols at different layers.
Load Issues
In layers 2 and layer 3 load issues arise because of high traffic of network devices that may
direct the entire network connection to a single device that leads to loading failure of a network
system. Multi-switches are used in the connections of the nodes to solve the problem of load
issue (Techgenix, 2019).
LO2 Implement a network using LAN design principles based on a predefined
set of requirements
P3 Select LAN devices based on features and requirements and apply basic configuration
commands for network connectivity.
DHCP Configuration
any loop avoidance process. Such situation where switches broadcast endlessly is known
as broadcast storms.
MAC database instability: When different parts of a switch receive the same frame of the
MAC address tables then there occurs instability in the content of MAC address.
Multiple frame transmission: Sometimes the destination stations are p[provide with more
than one copies of unicast frames but the protocols at different stations expect only one
frame so this cause error which is not recovered easily.
Bandwidth Issues
Layer 3 is the network layer routing issue and network addressing the issue are most common in
layer 3. The causes for network issues are the incorrect configuration of the device, networking
devices that are damaged, the bandwidth of the network and issue related to authentication. The
improper connection of the switches leads to bandwidth problem in layer 2 and layer 3 of the
OSI model that can be solved by correcting the protocols at different layers.
Load Issues
In layers 2 and layer 3 load issues arise because of high traffic of network devices that may
direct the entire network connection to a single device that leads to loading failure of a network
system. Multi-switches are used in the connections of the nodes to solve the problem of load
issue (Techgenix, 2019).
LO2 Implement a network using LAN design principles based on a predefined
set of requirements
P3 Select LAN devices based on features and requirements and apply basic configuration
commands for network connectivity.
DHCP Configuration

Figure 4: DHCP Configuration
Dynamic host configuration protocol is the basic internet configuration protocol, Suffix of the
domain name, DNS servers by which the computer communicate with the internet through the
routers and servers.
DNS Configuration
Dynamic host configuration protocol is the basic internet configuration protocol, Suffix of the
domain name, DNS servers by which the computer communicate with the internet through the
routers and servers.
DNS Configuration
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 34
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.