Transport Network Design: A Comprehensive Analysis
VerifiedAdded on  2025/05/02
|29
|3930
|455
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Transport network design
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
P1 Examine the network design models and features of scalable networks based on a given set
of business needs.........................................................................................................................2
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................3
M1 Analyse the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.........................................................................................................................4
LO2..................................................................................................................................................5
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity...........................................................................................5
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols...................................................................................................................7
M2 Analyse different switch redundancy protocols and their effectiveness in solving
redundancy issues......................................................................................................................10
LO3................................................................................................................................................11
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................11
P6 Configure WAN protocols as part of an enterprise network solution..................................14
M4 Analyse the benefits and drawbacks of private and public WAN technologies.................15
M5 Evaluate features and benefits of different VPN types based on organisational needs......16
LO4................................................................................................................................................17
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................17
P8 Troubleshoot LAN and WAN connectivity issues at different networking layers..............19
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
P1 Examine the network design models and features of scalable networks based on a given set
of business needs.........................................................................................................................2
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................3
M1 Analyse the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.........................................................................................................................4
LO2..................................................................................................................................................5
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity...........................................................................................5
P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols...................................................................................................................7
M2 Analyse different switch redundancy protocols and their effectiveness in solving
redundancy issues......................................................................................................................10
LO3................................................................................................................................................11
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements..............................................................................................................................11
P6 Configure WAN protocols as part of an enterprise network solution..................................14
M4 Analyse the benefits and drawbacks of private and public WAN technologies.................15
M5 Evaluate features and benefits of different VPN types based on organisational needs......16
LO4................................................................................................................................................17
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................17
P8 Troubleshoot LAN and WAN connectivity issues at different networking layers..............19

M6 Develop effective documentation of troubleshooting methods and steps based on a given
scenario’.....................................................................................................................................20
Conclusion.....................................................................................................................................22
References......................................................................................................................................23
scenario’.....................................................................................................................................20
Conclusion.....................................................................................................................................22
References......................................................................................................................................23
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LIST OF FIGURES
Figure 1: Configuration of VLAN...................................................................................................5
Figure 2: Configuring IP router connections...................................................................................6
Figure 3: Firewall............................................................................................................................6
Figure 4: Network design................................................................................................................9
Figure 5: Point-to-point linking.....................................................................................................11
Figure 6: Circuit switching of WAN.............................................................................................11
Figure 7: Packet switching in WAN..............................................................................................12
Figure 8: Virtual circuit over Frame relay.....................................................................................12
Figure 9: Configuration of point-to-point protocol.......................................................................14
Figure 10: configuration of Frame relay with device arrangement...............................................14
Figure 11: VPN..............................................................................................................................16
Figure 12: Nagios XI.....................................................................................................................17
Figure 13: PRTG dashboard..........................................................................................................18
Figure 14: Ping for connectivity within department......................................................................20
Figure 15: Traceroute command....................................................................................................20
Figure 16: Outcome of Ipconfig command...................................................................................21
Figure 1: Configuration of VLAN...................................................................................................5
Figure 2: Configuring IP router connections...................................................................................6
Figure 3: Firewall............................................................................................................................6
Figure 4: Network design................................................................................................................9
Figure 5: Point-to-point linking.....................................................................................................11
Figure 6: Circuit switching of WAN.............................................................................................11
Figure 7: Packet switching in WAN..............................................................................................12
Figure 8: Virtual circuit over Frame relay.....................................................................................12
Figure 9: Configuration of point-to-point protocol.......................................................................14
Figure 10: configuration of Frame relay with device arrangement...............................................14
Figure 11: VPN..............................................................................................................................16
Figure 12: Nagios XI.....................................................................................................................17
Figure 13: PRTG dashboard..........................................................................................................18
Figure 14: Ping for connectivity within department......................................................................20
Figure 15: Traceroute command....................................................................................................20
Figure 16: Outcome of Ipconfig command...................................................................................21
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
Organizations require an effective computer network for effective networking and data sharing
among the connected network with high security, high availability and reliability. However,
computer network with time declines in its performance thus, the network must be managed,
update and replace on demand. The current report discusses about different network design
models, along with features like redundancy, load balancing and reliability for a LAN network.
The report will be discussing about different issues of a computer network along with techniques
of troubleshooting.
1
Organizations require an effective computer network for effective networking and data sharing
among the connected network with high security, high availability and reliability. However,
computer network with time declines in its performance thus, the network must be managed,
update and replace on demand. The current report discusses about different network design
models, along with features like redundancy, load balancing and reliability for a LAN network.
The report will be discussing about different issues of a computer network along with techniques
of troubleshooting.
1

LO1
P1 Examine the network design models and features of scalable networks based on a given set of
business needs.
Network design model
Network design models generally are of three different types. The firstly is Hierarchical network
design, this design consist of different layers that are designed for performing particular job. This
network design effectively offers high flexibilities. The core layer of the network design mainly
provides optimized transportation among network branches and also provides resilience to
recover and handle failures. The Distribution layer of the network model is a boundary that has
policy and control on the basis of connectivity between the core and access layer. The main
purpose o the Access layer is to control user access and workgroup (Bogatyrev, and Parshutina,
2015). The next network model that can be used by the organisation for designing it network is
modular network, in this network design uses hierarchical design where every branch is design
as distribution and access layer, the core layer in the network effectively manages all the services
in the network. This model is effective in provides high flexibility. The third Network design
model is known as Network resilience model, it focuses mainly upon network continuance using
multiple transmission devices and channels. The model is effective in minimising complexities
but is costly.
Features of scalable network: Scalability in computer network stands for ability to add more
number of users or devices in a network without impacting much upon the configuration and
infrastructure. From the above discussion it can be stated that Modular network design is
effective in providing scalability (Yeganeh, et al 2013). Integration of new or additional devices
in the network is quite easy that enhances the overall security and communication. This design
for the network is effective in adopting to different network changes with time and for improving
organisational infrastructure.
2
P1 Examine the network design models and features of scalable networks based on a given set of
business needs.
Network design model
Network design models generally are of three different types. The firstly is Hierarchical network
design, this design consist of different layers that are designed for performing particular job. This
network design effectively offers high flexibilities. The core layer of the network design mainly
provides optimized transportation among network branches and also provides resilience to
recover and handle failures. The Distribution layer of the network model is a boundary that has
policy and control on the basis of connectivity between the core and access layer. The main
purpose o the Access layer is to control user access and workgroup (Bogatyrev, and Parshutina,
2015). The next network model that can be used by the organisation for designing it network is
modular network, in this network design uses hierarchical design where every branch is design
as distribution and access layer, the core layer in the network effectively manages all the services
in the network. This model is effective in provides high flexibility. The third Network design
model is known as Network resilience model, it focuses mainly upon network continuance using
multiple transmission devices and channels. The model is effective in minimising complexities
but is costly.
Features of scalable network: Scalability in computer network stands for ability to add more
number of users or devices in a network without impacting much upon the configuration and
infrastructure. From the above discussion it can be stated that Modular network design is
effective in providing scalability (Yeganeh, et al 2013). Integration of new or additional devices
in the network is quite easy that enhances the overall security and communication. This design
for the network is effective in adopting to different network changes with time and for improving
organisational infrastructure.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode
The are several issues related to a Local area network such a improper distribution of load and
device redundancy. Some of the major issues and its solution have been discussed below:
Bandwidth: Improper bandwidth utilisation among the networking devices will be effective in
influencing the overall performance and resources availability in the network. For offering
proper bandwidth distribution all the interconnected devices and channel must be monitored that
ensures smooth communication among the devices. Poor bandwidth distribution will lead service
discontinuance and reduce operational usability.
Redundancy: This helps in achieving an plan for disaster recovery, however in case of routine
communication, the organisational network may come across issues related slower performance.
Redundancy in the network increases complexity in the network and management of the
networking devices become hard due to loop creation. With increasing redundancy the overall
delay in the communication increase (Ciampa, 2012).
Load related issues: When a network is designed with limited devices when compared with the
number of network users, then a situation rises where the networking devices face higher traffic
load for traffic management and routing. This as a result leads to overall failure of network and
traffic get stuck interrupting the overall services.
Solutions
In the Data link layer of the organisational, multiple switches and routers must be configured that
will be effective in providing adequate bandwidth among the networking devices with equal
distribution, that will support in managing load in the network increasing the performance level.
The switches in the network must be redundant that will be effective in minimising the
centralization of the network load and it also improves the bandwidth allocation. Connectivity
among the devices must be done using High quality ether cables. And for improving the
performance and proper management of traffic the organization chose to use small network
packet size.
3
reference to Layer 2 and Layer 3 of the OSI Mode
The are several issues related to a Local area network such a improper distribution of load and
device redundancy. Some of the major issues and its solution have been discussed below:
Bandwidth: Improper bandwidth utilisation among the networking devices will be effective in
influencing the overall performance and resources availability in the network. For offering
proper bandwidth distribution all the interconnected devices and channel must be monitored that
ensures smooth communication among the devices. Poor bandwidth distribution will lead service
discontinuance and reduce operational usability.
Redundancy: This helps in achieving an plan for disaster recovery, however in case of routine
communication, the organisational network may come across issues related slower performance.
Redundancy in the network increases complexity in the network and management of the
networking devices become hard due to loop creation. With increasing redundancy the overall
delay in the communication increase (Ciampa, 2012).
Load related issues: When a network is designed with limited devices when compared with the
number of network users, then a situation rises where the networking devices face higher traffic
load for traffic management and routing. This as a result leads to overall failure of network and
traffic get stuck interrupting the overall services.
Solutions
In the Data link layer of the organisational, multiple switches and routers must be configured that
will be effective in providing adequate bandwidth among the networking devices with equal
distribution, that will support in managing load in the network increasing the performance level.
The switches in the network must be redundant that will be effective in minimising the
centralization of the network load and it also improves the bandwidth allocation. Connectivity
among the devices must be done using High quality ether cables. And for improving the
performance and proper management of traffic the organization chose to use small network
packet size.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

M1 Analyse the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.
Redundancy protocols are set or services used mainly for redundant of various critical services in
a networks. For instance, router and switches in the network can use following protocol of
redundancy for obtaining a scalable network:
Hot Standby Router Protocol: This protocol is mainly used for establish a network that is fault
tolerance at the gateway. Primary router is configured within the network with highest priority to
the virtual router. Router is assigned with previously defined IP address for gateway and is liable
of handling the ND and ARP requests in LAN (Ciampa, 2012). When the router fails, a
secondary router having highest priorities is utilised immediately for request processing with the
help of virtual MAC address offering availability and reliability.
Gateway load balancing protocol: The main purpose of this protocol is to overcome issues in
the network related to router redundancy protocol through proper load balancing. This protocol
in the organisational network will be effective in protecting the network traffic from that of a
failed router and then distribute the load of the packet among redundant routers (Das, and Roy,
2013). This protocol in the network is used for managing network performance and for ensuring
highly scalable network.
Virtual Router Redundancy Protocol: This protocol in the organisation automatically assigns
routers for handling network traffic and for improving the overall availability and scalability
feature of the network. It allocates subnet considering the default gateway. And for having a
virtual default gateway for the host this protocol uses a master and backup virtual routers.
4
scalable networks.
Redundancy protocols are set or services used mainly for redundant of various critical services in
a networks. For instance, router and switches in the network can use following protocol of
redundancy for obtaining a scalable network:
Hot Standby Router Protocol: This protocol is mainly used for establish a network that is fault
tolerance at the gateway. Primary router is configured within the network with highest priority to
the virtual router. Router is assigned with previously defined IP address for gateway and is liable
of handling the ND and ARP requests in LAN (Ciampa, 2012). When the router fails, a
secondary router having highest priorities is utilised immediately for request processing with the
help of virtual MAC address offering availability and reliability.
Gateway load balancing protocol: The main purpose of this protocol is to overcome issues in
the network related to router redundancy protocol through proper load balancing. This protocol
in the organisational network will be effective in protecting the network traffic from that of a
failed router and then distribute the load of the packet among redundant routers (Das, and Roy,
2013). This protocol in the network is used for managing network performance and for ensuring
highly scalable network.
Virtual Router Redundancy Protocol: This protocol in the organisation automatically assigns
routers for handling network traffic and for improving the overall availability and scalability
feature of the network. It allocates subnet considering the default gateway. And for having a
virtual default gateway for the host this protocol uses a master and backup virtual routers.
4

LO2
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity.
Switches: In the network multiple and standard switches are used for managing load, redundancy
and for gateway services. Switches in the network are effective in establishing a network that has
high availability and scalability. There are 24 ports in standard switch for connecting all the end
devices and for improving the VLAN.
Figure 1: Configuration of VLAN
Router: All the network branches require one router each for connecting networking devices of
WAN. The router in the organisational network is effectively required for access control, address
translation and routing with the external network. Router configuration is effective for
addressing the Ethernet connection and with serial cable in the network, while the same is also
configured for effective access control (White, et al 2017). For attaining services network
services the organisational network implement several redundancy protocols.
5
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity.
Switches: In the network multiple and standard switches are used for managing load, redundancy
and for gateway services. Switches in the network are effective in establishing a network that has
high availability and scalability. There are 24 ports in standard switch for connecting all the end
devices and for improving the VLAN.
Figure 1: Configuration of VLAN
Router: All the network branches require one router each for connecting networking devices of
WAN. The router in the organisational network is effectively required for access control, address
translation and routing with the external network. Router configuration is effective for
addressing the Ethernet connection and with serial cable in the network, while the same is also
configured for effective access control (White, et al 2017). For attaining services network
services the organisational network implement several redundancy protocols.
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 2: Configuring IP router connections
Firewall: The network has firewall for enhancing the overall organisational security via ACLs or
access control list and for establishing demilitarised zone in the network. Firewall effectively
filters the data packets in the network as per the set security rules.
Figure 3: Firewall
6
Firewall: The network has firewall for enhancing the overall organisational security via ACLs or
access control list and for establishing demilitarised zone in the network. Firewall effectively
filters the data packets in the network as per the set security rules.
Figure 3: Firewall
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols.
The network of the organization has consideration of redundancy protocols to ensure high
availability and scalability. Conversely, at the level of basic hardware, presently the
organisational network has 4 servers for meeting the demands of the organization from the
services (White, et al 2017). The VLAN network is configured using switches for ensuring that
the departments are isolated with configuration of security for accessing network resources. The
network devices are connected using star topology for dedicated connections. For proper
connection in the network Multi layer switches are used. The network uses for Private IP address
for achieving the local addressing, on the other hand the public IP address is for effective
identification of each branches. Some of the major protocols implemented on the network
Hot Standby Router Protocol
Router 1 and 2 are connected via protocol. Configuration of the devices:
Configuration of Gateway load balancing protocol
7
redundancy protocols.
The network of the organization has consideration of redundancy protocols to ensure high
availability and scalability. Conversely, at the level of basic hardware, presently the
organisational network has 4 servers for meeting the demands of the organization from the
services (White, et al 2017). The VLAN network is configured using switches for ensuring that
the departments are isolated with configuration of security for accessing network resources. The
network devices are connected using star topology for dedicated connections. For proper
connection in the network Multi layer switches are used. The network uses for Private IP address
for achieving the local addressing, on the other hand the public IP address is for effective
identification of each branches. Some of the major protocols implemented on the network
Hot Standby Router Protocol
Router 1 and 2 are connected via protocol. Configuration of the devices:
Configuration of Gateway load balancing protocol
7

Configuration of Virtual Router Redundancy Protocol
8
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 29
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.