Transport Network Design and Implementation Report

Verified

Added on  2025/04/10

|34
|4552
|439
AI Summary
Desklib provides past papers and solved assignments for students. This report details transport network design and implementation.
Document Page
Transport Network Design
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Table of Figures...............................................................................................................................3
Introduction......................................................................................................................................5
LO1 Explore LAN design principles and their application in the network design process............6
P1 Examine the network design models and features of scalable networks based on a given set
of business need...........................................................................................................................6
P2 Discuss LAN redundancy, bandwidth, and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................8
LO2 Implement a network using LAN design principles based on a predefined set of
requirements..................................................................................................................................11
P3 Select LAN devices based on features and requirements and apply basic configuration
commands for network connectivity.........................................................................................11
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols.................................................................................................................13
LO3 Produce an appropriate WAN solution to a set of organizational requirements...................14
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................14
P6 Configure WAN protocols as part of an enterprise network solution..................................18
LO4 Solve a range of network related problems using appropriate troubleshooting techniques
and methods...................................................................................................................................19
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................19
Document Page
P8...............................................................................................................................................24
Conclusion.....................................................................................................................................27
References......................................................................................................................................28
Document Page
Table of Figures
Figure 1: Three-tier network design model.....................................................................................5
Figure 2: Two-tier network design model.......................................................................................6
Figure 3: Open System Interconnection Model...............................................................................7
Figure 4: DHCP Configuration......................................................................................................10
Figure 5: DNS Configuration........................................................................................................11
Figure 6: Email configuration........................................................................................................11
Figure 7: FTP configuration..........................................................................................................12
Figure 8: HSRP configuration.......................................................................................................12
Figure 9: Circuit Switching...........................................................................................................14
Figure 10: Point to point links.......................................................................................................14
Figure 11: Packet Switching..........................................................................................................15
Figure 12: WAN virtual circuit......................................................................................................15
Figure 13: ISDN terminal adapter.................................................................................................17
Figure 14: RIP Configuration for router 1.....................................................................................17
Figure 15: RIP Configuration for router 2.....................................................................................18
Figure 16: Bottom-up troubleshooting method.............................................................................20
Figure 17: Divide and conquer method of troubleshooting...........................................................21
Figure 18: Top-down troubleshooting...........................................................................................22
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 19: Web server successful..................................................................................................23
Figure 20: FTP Successful.............................................................................................................24
Figure 21: DHCP Successful.........................................................................................................24
Figure 22: Different department ping............................................................................................25
Figure 23: Different Network ping................................................................................................25
Document Page
Introduction
This report is based on the discussions and design of transport network system for an IT
company that requires a completely new infrastructure design of network system with high
security and high performance. This report will highlight the network models designs and the
most appropriate network design according to the requirement of the client. The discussions in
this report will cover the scalable network feature, LAN redundancy issues, bandwidth issue,
load issue with the Open System Interconnection model (OSI), WAN technologies and
monitoring tools and troubleshooting methods in setting network baseline. The implementation
of the design and the design protocols will also be explained in the report. This report will
provide a detailed presentat6ion of the features and workability of the designed transport
network system according to the client's requirement.
Document Page
LO1 Explore LAN design principles and their application in the network
design process
P1 Examine the network design models and features of scalable networks based on a given
set of business needs.
Network Design Models
Network design models for an enterprise is designed according to Hierarchical network design
that breaks the complex design of the network systems into smaller and simpler networks that are
manageable. Further Hierarchical model is categorized into a three-tier model and two-tier
model.
Three tier model
Three tier models for network design are used in the large enterprises that are consisting of more
than one distribution layers blocks of network systems.
Figure 1: Three-tier network design model
Source: (Al-shawi, 2016)
Two tier model
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Two tier network design models are suitable for medium or small size networks That does not
contains more than three interconnected disruption blocks that are functional. Two tier model is
used where the distribution and the core function of the hierarchical model can be combined into
a single layer. This is also known as a Collapsed core-distribution system.
Figure 2: Two-tier network design model
Source: (Al-shawi, 2016)
Scalable networks
Scalable networks have the capability to accommodate the growing traffic of work and have the
potentiality of enlarging itself according to the work pressure. Scalability of a network system is
important as it plays an important role in the databases, routers, networking and electronic
systems.
Features of scalable networks
Scalable networks are available and reliable as it provides quality of service top every
protocols and application without interrupting the user experience at the desktop.
Scalable networks are responsive as it has the capability of responding to the latency
issue regarding SNA system network architecture traffic.
Scalable networks are efficient in using bandwidth resource by increasing the data
throughput and not increasing the hardware or WAN services. It decreases unnecessary
broadcast, routing updates and service location request.
Sca; able networks are adaptable as it can adapt itself to different hardware technologies,
protocols, and applications.
Document Page
Scalable networks are secure and accessible as it is accessible for different connections
with the use of switch services and dialups by maintaining the integrity of the network
(Cisco, 2018).
P2 Discuss LAN redundancy, bandwidth, and load related issues and possible solutions
with reference to Layer 2 and Layer 3 of the OSI Model
LAN redundancy
The redundancy of a network is the key to maintaining the reliability of a network system. The
physical links between the devices of a network system form the redundant paths. On the failure
of a single link nor port network operations does not stop. The reluctant links help in increasing
the capacity of a network system by sharing the network traffic. Multiple paths are been selected
for maintaining the loops created due to the LAN redundancy. Routers or multilayer switches are
been used as redundant devices that are used as an alternative gateway when the primary route
gateway fails.
OSI (Open system Interconnection) Model
Open system interconnections standardize the functionality of the computing system and
telecommunication system in the world.
Figure 3: Open System Interconnection Model
Source: (Electrical, 2019)
Document Page
The layers of open system interconnections:
Physical layer: Physical layer is the first layers it concerns with the transmission of data
bits with the help of the physical medium.
Data Link: Data layer is the second layer that enables the transfer of frames between the
nodes that are connected between the physical layers.
Network Layer: Routing, traffic control and addressing of the transfer nodes are
controlled by network layer.
Transport layer: the transport layer is the fourth layer which defines the multiplexing,
and acknowledgment between the points of the network system.
Session layer: The exchange of network data between nodes into continuous manner is
controlled by the session layer.
Presentation Layer: layer six is the presentation layer that concerns with the
encryption/decryption, encoding and data compression between the services of the
network.
Application layer: High-level API's, remote file access and resource sharing are
described by the seventh layer of the open system interconnection model.
1st, 2nd, and 3rd layer are known as the media layer of Open system interconnection model and 4th,
5th, 6th, and 7th layer are known as host layers of Open System Interconnection model (O'Keefe,
2018).
Redundancy is important in a hierarchical network as it prevents the disruption of network
services from resource to users. Physicals paths are to be added top redundant networks but this
is not enough to use physical paths logical redundancy is also important in designi8ng of a
network process. A layer 2 loop in an open system interconnection model occurs due to the
switches operations that involve the learning and the4 forwarding processes. A layer 2 loop
occurs due to multiple paths connections between two devices and there is no spanning tree is
implemented in the switches.
There occur three issues due to layer 2 loop:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Broadcast storms: Each switch in a loop when broadcast endlessly due to the absence of
any loop avoidance process. Such situation where switches broadcast endlessly is known
as broadcast storms.
MAC database instability: When different parts of a switch receive the same frame of the
MAC address tables then there occurs instability in the content of MAC address.
Multiple frame transmission: Sometimes the destination stations are p[provide with more
than one copies of unicast frames but the protocols at different stations expect only one
frame so this cause error which is not recovered easily.
Bandwidth Issues
Layer 3 is the network layer routing issue and network addressing the issue are most common in
layer 3. The causes for network issues are the incorrect configuration of the device, networking
devices that are damaged, the bandwidth of the network and issue related to authentication. The
improper connection of the switches leads to bandwidth problem in layer 2 and layer 3 of the
OSI model that can be solved by correcting the protocols at different layers.
Load Issues
In layers 2 and layer 3 load issues arise because of high traffic of network devices that may
direct the entire network connection to a single device that leads to loading failure of a network
system. Multi-switches are used in the connections of the nodes to solve the problem of load
issue (Techgenix, 2019).
LO2 Implement a network using LAN design principles based on a predefined
set of requirements
P3 Select LAN devices based on features and requirements and apply basic configuration
commands for network connectivity.
DHCP Configuration
Document Page
Figure 4: DHCP Configuration
Dynamic host configuration protocol is the basic internet configuration protocol, Suffix of the
domain name, DNS servers by which the computer communicate with the internet through the
routers and servers.
DNS Configuration
chevron_up_icon
1 out of 34
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]