Transport Network Design: A Comprehensive Analysis
VerifiedAdded on 2025/05/04
|20
|2742
|91
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

TRANSPORT NETWORK DESIGN
1
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
LO1..............................................................................................................................................................3
P1 Examine the network design models and features of scalable networks based on a given set of
business needs........................................................................................................................................3
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with reference
to layer 2 and layer 3 of OSI model..........................................................................................................5
M1 Analyze the switch and router redundancy protocols and their effectiveness in supporting scalable
networks..................................................................................................................................................6
LO2..............................................................................................................................................................8
P3 Select LAN devices based on features and requirements, and apply basic configuration commands
for network connectivity.........................................................................................................................8
P4 Implement a LAN design with layer 2 and layer 3 redundancy using switch and router redundancy
protocols................................................................................................................................................11
LO3............................................................................................................................................................12
P5 Examine the WAN technologies and select the appropriate one for a set of enterprise
requirements.........................................................................................................................................12
P6 Configure WAN protocols as a part of an enterprise network solution............................................15
LO4............................................................................................................................................................17
P7 Deploy network monitoring tools and troubleshooting methods to establish network baselines and
produce network documentation..........................................................................................................17
P8 Troubleshoot LAN and WAN connectivity issues at different networking layers..............................18
2
LO1..............................................................................................................................................................3
P1 Examine the network design models and features of scalable networks based on a given set of
business needs........................................................................................................................................3
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with reference
to layer 2 and layer 3 of OSI model..........................................................................................................5
M1 Analyze the switch and router redundancy protocols and their effectiveness in supporting scalable
networks..................................................................................................................................................6
LO2..............................................................................................................................................................8
P3 Select LAN devices based on features and requirements, and apply basic configuration commands
for network connectivity.........................................................................................................................8
P4 Implement a LAN design with layer 2 and layer 3 redundancy using switch and router redundancy
protocols................................................................................................................................................11
LO3............................................................................................................................................................12
P5 Examine the WAN technologies and select the appropriate one for a set of enterprise
requirements.........................................................................................................................................12
P6 Configure WAN protocols as a part of an enterprise network solution............................................15
LO4............................................................................................................................................................17
P7 Deploy network monitoring tools and troubleshooting methods to establish network baselines and
produce network documentation..........................................................................................................17
P8 Troubleshoot LAN and WAN connectivity issues at different networking layers..............................18
2

LO1
P1 Examine the network design models and features of scalable networks
based on a given set of business needs.
It is the hierarchical model or the three layer Cisco model. It is used to design a dependable,
scalable and proper cost network. There are three layers included in the model of network design
(Bruno, A., 2016). These are:
1. Core layer
It is used for the well settled communication. It is considered as the backbone of the
network model or the high speed network. It has some special characteristics:
Transportation is fast
Redundancy
Fault like tolerance
Manageability is better
Provide high reliability
2. Distribution layer
It provides the isolation between the core layer and access layer. It is used to implement
the functions or it plays a key role in designing of network (Gilmore, J., 2018).
Balancing the load and redundancy
Translations of media
Provide routing for VLANs
Provide filtering security
3. Access layer
It provides the facility to access the local segments for the network with the help of the
user. It has some specific functions;
Switching of layer 2
Security port
Availability is high
Classification of trust
Spanning tree
Features of scalable network:
1. Manageability
Cost of the operations is the major factor in the system running. It is proofed that the cost
involved in the operations and in the management is to high but there still some systems
which runs by using the small amount of staff.
3
P1 Examine the network design models and features of scalable networks
based on a given set of business needs.
It is the hierarchical model or the three layer Cisco model. It is used to design a dependable,
scalable and proper cost network. There are three layers included in the model of network design
(Bruno, A., 2016). These are:
1. Core layer
It is used for the well settled communication. It is considered as the backbone of the
network model or the high speed network. It has some special characteristics:
Transportation is fast
Redundancy
Fault like tolerance
Manageability is better
Provide high reliability
2. Distribution layer
It provides the isolation between the core layer and access layer. It is used to implement
the functions or it plays a key role in designing of network (Gilmore, J., 2018).
Balancing the load and redundancy
Translations of media
Provide routing for VLANs
Provide filtering security
3. Access layer
It provides the facility to access the local segments for the network with the help of the
user. It has some specific functions;
Switching of layer 2
Security port
Availability is high
Classification of trust
Spanning tree
Features of scalable network:
1. Manageability
Cost of the operations is the major factor in the system running. It is proofed that the cost
involved in the operations and in the management is to high but there still some systems
which runs by using the small amount of staff.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

2. Security
Services based on the security are designed by using the three principles that is:
specifications are different from the codes, interpretation is different for the given
enforcement, and system security is similar to the original code module (Dooley, K.,
2017).
3. Availability
It is the ratio of the assignment that is required to perform in the particular time. The best
way to measure it by count from the 9’s.
4
Services based on the security are designed by using the three principles that is:
specifications are different from the codes, interpretation is different for the given
enforcement, and system security is similar to the original code module (Dooley, K.,
2017).
3. Availability
It is the ratio of the assignment that is required to perform in the particular time. The best
way to measure it by count from the 9’s.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P2 Discuss LAN redundancy, bandwidth and load related issues and possible
solutions with reference to layer 2 and layer 3 of OSI model.
LAN redundancy:
It is the main part of the network. It is used to save the data when the system getting shut down.
All the issues related with the network is solve by using the protocol of tree spanning and
switching. Its main advantage is to store the data of the network. The requirements of business
are fulfill by using the sustainable network in different organizations (Shimonski, R., 2012). Path
redundancy is used to provide the important task in the network.
LAN bandwidth:
Bandwidth is referred to rate of data flow in a given time period or at particular area. Bandwidth
is classified in three parts: bandwidth of network, bandwidth of data, and digital bandwidth.
Bandwidth is used for the processing of signal, transmission of modem data and the digital
communications. The measurement software of bandwidth is used to generate the
administrations for long term use and for the live readings (reddit., 2019).
Load issue:
Splitter traffic is balance by using the load balancer for different area networks. It manages the
request of user in proper manner at a particular time to generate the benefit and increase the
performance of the network. There are several reasons for the load like delay in network; no
counting of data transferred packets, congestion, etc.
5
solutions with reference to layer 2 and layer 3 of OSI model.
LAN redundancy:
It is the main part of the network. It is used to save the data when the system getting shut down.
All the issues related with the network is solve by using the protocol of tree spanning and
switching. Its main advantage is to store the data of the network. The requirements of business
are fulfill by using the sustainable network in different organizations (Shimonski, R., 2012). Path
redundancy is used to provide the important task in the network.
LAN bandwidth:
Bandwidth is referred to rate of data flow in a given time period or at particular area. Bandwidth
is classified in three parts: bandwidth of network, bandwidth of data, and digital bandwidth.
Bandwidth is used for the processing of signal, transmission of modem data and the digital
communications. The measurement software of bandwidth is used to generate the
administrations for long term use and for the live readings (reddit., 2019).
Load issue:
Splitter traffic is balance by using the load balancer for different area networks. It manages the
request of user in proper manner at a particular time to generate the benefit and increase the
performance of the network. There are several reasons for the load like delay in network; no
counting of data transferred packets, congestion, etc.
5

M1 Analyze the switch and router redundancy protocols and their
effectiveness in supporting scalable networks.
Virtual Switch Redundancy Protocols:
VSRP stands for the virtual switch redundancy protocol. It is the protocol based on the resilience
of the network. It is used to combine the layer 2 and layer 3. The links are backup for the layer 2
only but not for the IP addresses. The VSRP for layer 3 is similar with the VRRP-E. VSRP plays
the key role in providing the redundancy for both the layers at a particular time. It is used to
provide the more than one backup for the system. The traffic can’t be overloaded due to the
backups. The backups become dynamic in the condition when active device are not available.
Figure 1set up for VSRP
6
effectiveness in supporting scalable networks.
Virtual Switch Redundancy Protocols:
VSRP stands for the virtual switch redundancy protocol. It is the protocol based on the resilience
of the network. It is used to combine the layer 2 and layer 3. The links are backup for the layer 2
only but not for the IP addresses. The VSRP for layer 3 is similar with the VRRP-E. VSRP plays
the key role in providing the redundancy for both the layers at a particular time. It is used to
provide the more than one backup for the system. The traffic can’t be overloaded due to the
backups. The backups become dynamic in the condition when active device are not available.
Figure 1set up for VSRP
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Virtual Router Redundancy Protocols:
VRRP is stand for the virtual router redundancy protocol. It is much similar with the hot stand by
routing protocol. It is generally used for forming the virtual gateway. It is used for including the
host in automatic assignments for the given IP. It uses the default gateway for providing the
reliability and increases the availability for routing path. It is form by using the virtual routers,
which represents the set of multiple routers. Multiple routers include the routers of master and
backup.
Figure 2b set up for VRRP
7
VRRP is stand for the virtual router redundancy protocol. It is much similar with the hot stand by
routing protocol. It is generally used for forming the virtual gateway. It is used for including the
host in automatic assignments for the given IP. It uses the default gateway for providing the
reliability and increases the availability for routing path. It is form by using the virtual routers,
which represents the set of multiple routers. Multiple routers include the routers of master and
backup.
Figure 2b set up for VRRP
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO2
P3 Select LAN devices based on features and requirements, and apply basic
configuration commands for network connectivity.
LAN devices:
1. Switches:
They are used to provide the link between the two stations for transmitting the data. They
also used to manage and generate the address tables also called as memory of content
addressable (HOFFMAN, C., 2017).
Figure 3 switches
2. Routers:
It is used to perform the two tasks: one is to transmit the packets and another one is to
locate the path. It consists of devices, delay, load, bandwidth, etc.
Figure 4 routers
8
P3 Select LAN devices based on features and requirements, and apply basic
configuration commands for network connectivity.
LAN devices:
1. Switches:
They are used to provide the link between the two stations for transmitting the data. They
also used to manage and generate the address tables also called as memory of content
addressable (HOFFMAN, C., 2017).
Figure 3 switches
2. Routers:
It is used to perform the two tasks: one is to transmit the packets and another one is to
locate the path. It consists of devices, delay, load, bandwidth, etc.
Figure 4 routers
8

3. Gateway:
It may be in two forms that is hardware or software. It performs the role of bridge for the
two or more networks.
Figure 5 gateway
4. Repeater:
They are used to transmit the weak signals again to destination. It also removes the extra
noise from the main signal and then sends it to the destination (pandorafms., 2017).
Figure 6 Repeater
5. Hub:
Hub is referred to the center of particular network in which small-small devices are
connecting with each other to make a device. It has no software for load and
configuration. It is a type of normal multiport repeater.
9
It may be in two forms that is hardware or software. It performs the role of bridge for the
two or more networks.
Figure 5 gateway
4. Repeater:
They are used to transmit the weak signals again to destination. It also removes the extra
noise from the main signal and then sends it to the destination (pandorafms., 2017).
Figure 6 Repeater
5. Hub:
Hub is referred to the center of particular network in which small-small devices are
connecting with each other to make a device. It has no software for load and
configuration. It is a type of normal multiport repeater.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 7 Hub
Configuration command for connectivity:
1. Ping command: It is used for detect the devices of network and for the problems based on
troubleshoot network.
2. ipconfig command: It is used for finding the information of network based on the local
machines.
3. hostname command: It is used for displaying the host name for the system. It is the fast
process and saves the time (Lee, J., 2016).
4. getmac command: It is used to display the MAC address for the network interfaces.
5. arp command: It is used to show the resolution cache for the address.
6. NSlookup command: It is used to check out the records of entries of DNS.
7. Nbtstat command: Its main function is to diagnose the problems of troubleshoot.
8. Net command: It is used to balance out all the services and shares.
9. Netstat command: It is used to show the data based on the tcp and udp ports.
10. TaskKIll command: It uses the task list to show the detail of the ongoing tasks (Neagu,
C., 2016).
10
Configuration command for connectivity:
1. Ping command: It is used for detect the devices of network and for the problems based on
troubleshoot network.
2. ipconfig command: It is used for finding the information of network based on the local
machines.
3. hostname command: It is used for displaying the host name for the system. It is the fast
process and saves the time (Lee, J., 2016).
4. getmac command: It is used to display the MAC address for the network interfaces.
5. arp command: It is used to show the resolution cache for the address.
6. NSlookup command: It is used to check out the records of entries of DNS.
7. Nbtstat command: Its main function is to diagnose the problems of troubleshoot.
8. Net command: It is used to balance out all the services and shares.
9. Netstat command: It is used to show the data based on the tcp and udp ports.
10. TaskKIll command: It uses the task list to show the detail of the ongoing tasks (Neagu,
C., 2016).
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P4 Implement a LAN design with layer 2 and layer 3 redundancy using switch
and router redundancy protocols.
The design is create in order to provide the flexibility, scalability, etc. these blocks generate the
control and enforcement between the layer 2 and layer 3. The core layers provide the
transportation with high capability within the different attachment blocks. Each block of design
is competing with the architecture. For providing the scalability and high speed, core layer is
used for the network (Sutton. C., 2013).
Figure 8 Set up
11
and router redundancy protocols.
The design is create in order to provide the flexibility, scalability, etc. these blocks generate the
control and enforcement between the layer 2 and layer 3. The core layers provide the
transportation with high capability within the different attachment blocks. Each block of design
is competing with the architecture. For providing the scalability and high speed, core layer is
used for the network (Sutton. C., 2013).
Figure 8 Set up
11

LO3
P5 Examine the WAN technologies and select the appropriate one for a set of
enterprise requirements.
WAN technologies: Generally, there are 4 types of technologies include in WAN.
1. Point-to-point
It provides a point-to-point communication between the two points of nodes. It involves
the connections based on the leased line such as T1 or E1. The service provides them
with the help of the service provider. So, that it makes possible to provide the point-to-
point connection.
Figure 9 Point-to-point communication
2. Hub-and-spoke
This technology is used to share a single interface through the hub to all the spoke
circuits. Hub site can be connected with the spoke sites by using the virtual circuits at
the center of hub. It generally has a combination of 4 routers in which one router is
connected as the hub with rest of the three routers. Its main disadvantage is that all the
communiqué is done from the hub.
12
P5 Examine the WAN technologies and select the appropriate one for a set of
enterprise requirements.
WAN technologies: Generally, there are 4 types of technologies include in WAN.
1. Point-to-point
It provides a point-to-point communication between the two points of nodes. It involves
the connections based on the leased line such as T1 or E1. The service provides them
with the help of the service provider. So, that it makes possible to provide the point-to-
point connection.
Figure 9 Point-to-point communication
2. Hub-and-spoke
This technology is used to share a single interface through the hub to all the spoke
circuits. Hub site can be connected with the spoke sites by using the virtual circuits at
the center of hub. It generally has a combination of 4 routers in which one router is
connected as the hub with rest of the three routers. Its main disadvantage is that all the
communiqué is done from the hub.
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 20
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.