Transport Network Design: A Comprehensive Analysis
VerifiedAdded on  2025/05/02
|35
|4219
|371
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Transport Network Design
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
Introduction......................................................................................................................................1
Task 1...............................................................................................................................................2
P1 Examine the network design models and features of scalable networks based on a given set
of business needs.........................................................................................................................2
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode [D1]............................................................4
M1 Analyse the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.........................................................................................................................5
Task 2...............................................................................................................................................6
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity...........................................................................................6
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols...................................................................................................................8
M2 Analyse different switch redundancy protocols and their effectiveness in solving
redundancy issues......................................................................................................................12
M3 Analyse Layer 3 redundancy implementations for IPv4 and IPv6.....................................12
Task 3.............................................................................................................................................14
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................14
P6 Configure WAN protocols as part of an enterprise network solution..................................17
M4 Analyse the benefits and drawbacks of private and public WAN technologies.................19
M5 Evaluate features and benefits of different VPN types based on organisational needs......20
Task 4.............................................................................................................................................21
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................21
Introduction......................................................................................................................................1
Task 1...............................................................................................................................................2
P1 Examine the network design models and features of scalable networks based on a given set
of business needs.........................................................................................................................2
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode [D1]............................................................4
M1 Analyse the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.........................................................................................................................5
Task 2...............................................................................................................................................6
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity...........................................................................................6
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols...................................................................................................................8
M2 Analyse different switch redundancy protocols and their effectiveness in solving
redundancy issues......................................................................................................................12
M3 Analyse Layer 3 redundancy implementations for IPv4 and IPv6.....................................12
Task 3.............................................................................................................................................14
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................14
P6 Configure WAN protocols as part of an enterprise network solution..................................17
M4 Analyse the benefits and drawbacks of private and public WAN technologies.................19
M5 Evaluate features and benefits of different VPN types based on organisational needs......20
Task 4.............................................................................................................................................21
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................21

P8 Troubleshoot LAN and WAN connectivity issues at different networking layers[D2].......24
M6 Develop effective documentation of troubleshooting methods and steps based on a given
scenario [D2].............................................................................................................................25
Conclusion.....................................................................................................................................28
References......................................................................................................................................29
M6 Develop effective documentation of troubleshooting methods and steps based on a given
scenario [D2].............................................................................................................................25
Conclusion.....................................................................................................................................28
References......................................................................................................................................29
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LIST OF FIGURES
Figure 1: Typical modular network.................................................................................................3
Figure 2: VLAN configuration on network switch..........................................................................6
Figure 3: IP addressing in router connections.................................................................................7
Figure 4: Configuration of Firewall.................................................................................................7
Figure 5: FHRP on router 1.............................................................................................................8
Figure 6: Configuration VRRP........................................................................................................9
Figure 7: Configuration GLBP......................................................................................................10
Figure 8: Configuration HSRP......................................................................................................10
Figure 9: Network design..............................................................................................................11
Figure 10: Model of Dual stack.....................................................................................................13
Figure 11: Model for Service block...............................................................................................13
Figure 12: Point-to-point...............................................................................................................14
Figure 13: Circuit switching in WAN network.............................................................................15
Figure 14: Packet switching...........................................................................................................15
Figure 15: Virtual circuit...............................................................................................................16
Figure 16: Dial-up connection.......................................................................................................16
Figure 17: Configuration of Point-to-Point Protocol.....................................................................17
Figure 18: Frame relay configuration............................................................................................18
Figure 19: configuration of Frame Relay between two network routers.......................................18
Figure 20: Working of Virtual Private Network............................................................................20
Figure 21: GFI LAN Guard...........................................................................................................21
Figure 22: Pandora FMS................................................................................................................22
Figure 23: Network design............................................................................................................23
Figure 24: Ping for connectivity test.............................................................................................25
Figure 25: Tracert command in Command prompt.......................................................................26
Figure 26: information shown with ipconfig command................................................................27
Figure 1: Typical modular network.................................................................................................3
Figure 2: VLAN configuration on network switch..........................................................................6
Figure 3: IP addressing in router connections.................................................................................7
Figure 4: Configuration of Firewall.................................................................................................7
Figure 5: FHRP on router 1.............................................................................................................8
Figure 6: Configuration VRRP........................................................................................................9
Figure 7: Configuration GLBP......................................................................................................10
Figure 8: Configuration HSRP......................................................................................................10
Figure 9: Network design..............................................................................................................11
Figure 10: Model of Dual stack.....................................................................................................13
Figure 11: Model for Service block...............................................................................................13
Figure 12: Point-to-point...............................................................................................................14
Figure 13: Circuit switching in WAN network.............................................................................15
Figure 14: Packet switching...........................................................................................................15
Figure 15: Virtual circuit...............................................................................................................16
Figure 16: Dial-up connection.......................................................................................................16
Figure 17: Configuration of Point-to-Point Protocol.....................................................................17
Figure 18: Frame relay configuration............................................................................................18
Figure 19: configuration of Frame Relay between two network routers.......................................18
Figure 20: Working of Virtual Private Network............................................................................20
Figure 21: GFI LAN Guard...........................................................................................................21
Figure 22: Pandora FMS................................................................................................................22
Figure 23: Network design............................................................................................................23
Figure 24: Ping for connectivity test.............................................................................................25
Figure 25: Tracert command in Command prompt.......................................................................26
Figure 26: information shown with ipconfig command................................................................27
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
The main concern of any established computer network is redundancy management mostly in
layer 2 and layer 3 for maintaining availability and network scalability. For an IT organisation,
the baseline to be followed for configuring any network is to achieve high performing and
redundant network with high security. In the current report, discussion will be made regarding
different models of network design and scalable networks that can be established in an
organisation for connectivity and data sharing (Bogatyrev, and Parshutina, 2015). The report will
also discuss about various network issues such as load balancing, redundancy and improper
bandwidth. The present report also provides and network design that has redundancy protocols
for offering services at the network layers. Moreover, the report also focuses on various features
and characteristics of wide area network technologies and virtual private network that can be
effective for an enterprise network system for maintaining high security and attaining high
performance. Lastly, the report has lime lighted deployment of various tools used for network
monitoring and troubleshooting.
1
The main concern of any established computer network is redundancy management mostly in
layer 2 and layer 3 for maintaining availability and network scalability. For an IT organisation,
the baseline to be followed for configuring any network is to achieve high performing and
redundant network with high security. In the current report, discussion will be made regarding
different models of network design and scalable networks that can be established in an
organisation for connectivity and data sharing (Bogatyrev, and Parshutina, 2015). The report will
also discuss about various network issues such as load balancing, redundancy and improper
bandwidth. The present report also provides and network design that has redundancy protocols
for offering services at the network layers. Moreover, the report also focuses on various features
and characteristics of wide area network technologies and virtual private network that can be
effective for an enterprise network system for maintaining high security and attaining high
performance. Lastly, the report has lime lighted deployment of various tools used for network
monitoring and troubleshooting.
1

Task 1
P1 Examine the network design models and features of scalable networks based on a given set of
business needs
Network design model
Generally there are three types of network design models. In the hierarchical network design it
has layers that are designed specifically for some purposes. The core layer of the designed is
used for managing overall services and communication among the layers. This has high
availability and scalability, with limitation like high load over the core layer. For network design
the organisation also use modular network, here each branch has access layer and distribution,
the core layer works for managing all the network services. This design for the network is
effective in providing high network flexibility for offering scalability and management. Every
branch can effectively adopt customisations and different configurations. The main disadvantage
of the network design is lacking of high module control and complexities of scalability. The last
model that can be used in the organisation for its network is Network resilience model that
focuses mainly over network continuance via multiple devices and transmission channels. This
design is effective in providing highly scalable network with proper load distribution. The main
issue associated with this model is complexity and high cost (Comer,and Droms,2003. ).
Figure 1: Typical modular network
2
P1 Examine the network design models and features of scalable networks based on a given set of
business needs
Network design model
Generally there are three types of network design models. In the hierarchical network design it
has layers that are designed specifically for some purposes. The core layer of the designed is
used for managing overall services and communication among the layers. This has high
availability and scalability, with limitation like high load over the core layer. For network design
the organisation also use modular network, here each branch has access layer and distribution,
the core layer works for managing all the network services. This design for the network is
effective in providing high network flexibility for offering scalability and management. Every
branch can effectively adopt customisations and different configurations. The main disadvantage
of the network design is lacking of high module control and complexities of scalability. The last
model that can be used in the organisation for its network is Network resilience model that
focuses mainly over network continuance via multiple devices and transmission channels. This
design is effective in providing highly scalable network with proper load distribution. The main
issue associated with this model is complexity and high cost (Comer,and Droms,2003. ).
Figure 1: Typical modular network
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Features of scalable network
Scalability for a network stands for ability to add more number of users or devices without
impacting or compromising the network configuration and infrastructure. The modular network
designs are scalable in nature. Scalable network is effective in offering easy integration to add
more devices and services and also enhances overall network security and communication
considering future network and infrastructural requirement.
3
Scalability for a network stands for ability to add more number of users or devices without
impacting or compromising the network configuration and infrastructure. The modular network
designs are scalable in nature. Scalable network is effective in offering easy integration to add
more devices and services and also enhances overall network security and communication
considering future network and infrastructural requirement.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode [D1]
Issues and solutions to Redundancy
If an network has many devices at its layer 2, it will be possibly impact the VLAN or virtual
local area network management, influence performance during data transmission, along with
availability and security. This may also result in creation of loops in the network impacting the
overall services and lowering of network capabilities distribution. These issues can be solved by
introducing redundancy protocols in layer 2 and layer 3 of the network (Bogatyrev,. and
Parshutina, 2015). It supports in managing overall functionality of multiple networking devices,
improving the performance and scalability of the network.
Issues of Bandwidth and its solutions
In a network, the main issues associated with Layer 2 are regarding allocation and distribution of
among the connected devices. This issue rises because of restraint cable limit and device. On
other hand, issue of bandwidth may rise in layer 3 due incorrect configuration of networking
devices. Thus, for resolving issues related to bandwidth the organisation can effectively use
Ethernet channel along with adequate number of switch and router configuration (Zhang, et al
2012).
Load related issues and solutions
Improper devices in layer 2 of the network will be the reason to increase load per device. Along
with that incorrect configuration of the devices in the network may direct most of traffic to a
specific networking device. Considering both the cases, it can be stated that high failure chance
of the network can be found. For effective load balancing the organisation utilise Ether-Channel
for connecting the networking devices and configuration of multi-layer switches will also be
effective in improve load balancing and gateway.
4
reference to Layer 2 and Layer 3 of the OSI Mode [D1]
Issues and solutions to Redundancy
If an network has many devices at its layer 2, it will be possibly impact the VLAN or virtual
local area network management, influence performance during data transmission, along with
availability and security. This may also result in creation of loops in the network impacting the
overall services and lowering of network capabilities distribution. These issues can be solved by
introducing redundancy protocols in layer 2 and layer 3 of the network (Bogatyrev,. and
Parshutina, 2015). It supports in managing overall functionality of multiple networking devices,
improving the performance and scalability of the network.
Issues of Bandwidth and its solutions
In a network, the main issues associated with Layer 2 are regarding allocation and distribution of
among the connected devices. This issue rises because of restraint cable limit and device. On
other hand, issue of bandwidth may rise in layer 3 due incorrect configuration of networking
devices. Thus, for resolving issues related to bandwidth the organisation can effectively use
Ethernet channel along with adequate number of switch and router configuration (Zhang, et al
2012).
Load related issues and solutions
Improper devices in layer 2 of the network will be the reason to increase load per device. Along
with that incorrect configuration of the devices in the network may direct most of traffic to a
specific networking device. Considering both the cases, it can be stated that high failure chance
of the network can be found. For effective load balancing the organisation utilise Ether-Channel
for connecting the networking devices and configuration of multi-layer switches will also be
effective in improve load balancing and gateway.
4

M1 Analyse the switch and router redundancy protocols and their effectiveness in supporting
scalable networks
For effective establishment of the network, the organisation can prefer using hot standby
redundancy protocol through which the routing services can be managed. This protocol is
effective in enhancing the network services with the help of static router that remain standby
until every configured device with dynamic routing are working. It do not require contribution in
the process of transmission. These protocols become active only during when the primary
devices become not reachable or fail. This protocol in the network makes is scalable via traffic
distribution on redundant routers.
The organisation also can utilise virtual router redundancy protocols, this protocol is effective in
increasing the number of routing devices and also supports in managing more traffic. This
protocol is capable of defining virtual routers that effectually can handle network scalability with
accurately and also helps in minimising the rate of packet dropping improving the overall
performance. Moreover, the organisation can implement gateway load balancing protocol for
proper balancing of traffic among the networking devices and also for attaining a highly scalable
network with limited number of devices.
5
scalable networks
For effective establishment of the network, the organisation can prefer using hot standby
redundancy protocol through which the routing services can be managed. This protocol is
effective in enhancing the network services with the help of static router that remain standby
until every configured device with dynamic routing are working. It do not require contribution in
the process of transmission. These protocols become active only during when the primary
devices become not reachable or fail. This protocol in the network makes is scalable via traffic
distribution on redundant routers.
The organisation also can utilise virtual router redundancy protocols, this protocol is effective in
increasing the number of routing devices and also supports in managing more traffic. This
protocol is capable of defining virtual routers that effectually can handle network scalability with
accurately and also helps in minimising the rate of packet dropping improving the overall
performance. Moreover, the organisation can implement gateway load balancing protocol for
proper balancing of traffic among the networking devices and also for attaining a highly scalable
network with limited number of devices.
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Task 2
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity
Device selection
Currently the main requirement of the organisation from the current network is availability,
scalability and security. Thus, the network must deploy redundancy protocols along with the
mentioned devices:
Standard and Multi-layer switches: This device in the network is required for managing load,
redundancy, and gateway services. With the help of network switches the designed network will
have high resources availability and scalability for expansion. The Standard switch having 24
ports are required in the network for supporting connection of end devices and for improving
virtual local area networking.
Figure 2: VLAN configuration on network switch
Router: In a WAN network every branch are connected with one router that further are used for
connecting end devices. The main need of router in the organisational network is to provide
6
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity
Device selection
Currently the main requirement of the organisation from the current network is availability,
scalability and security. Thus, the network must deploy redundancy protocols along with the
mentioned devices:
Standard and Multi-layer switches: This device in the network is required for managing load,
redundancy, and gateway services. With the help of network switches the designed network will
have high resources availability and scalability for expansion. The Standard switch having 24
ports are required in the network for supporting connection of end devices and for improving
virtual local area networking.
Figure 2: VLAN configuration on network switch
Router: In a WAN network every branch are connected with one router that further are used for
connecting end devices. The main need of router in the organisational network is to provide
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

access control, address and routing translation with the external network. Routers are configured
for addressing Ethernet connection and serial cable in the network. Router support configuration
of several redundancy protocols for attaining effective services (Cahn, 1998).
Figure 3: IP addressing in router connections
Firewall: The network formed in the can effectively use firewall mainly for establishing and
maintaining proper security using ACLs or access control lists and through demilitarised zone.
The main function performed by the firewall is filtering the data packets and then accessing them
according to the security protocol (Ciampa, 2012. ).
7
for addressing Ethernet connection and serial cable in the network. Router support configuration
of several redundancy protocols for attaining effective services (Cahn, 1998).
Figure 3: IP addressing in router connections
Firewall: The network formed in the can effectively use firewall mainly for establishing and
maintaining proper security using ACLs or access control lists and through demilitarised zone.
The main function performed by the firewall is filtering the data packets and then accessing them
according to the security protocol (Ciampa, 2012. ).
7

Figure 4: Configuration of Firewall
8
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 35
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.