Transport Network Design: Case Studies and Solutions

Verified

Added on  2025/05/03

|31
|4025
|410
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Transport Network Design
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction.................................................................................................................................................4
LO1.............................................................................................................................................................5
P1............................................................................................................................................................5
P2............................................................................................................................................................7
M1...........................................................................................................................................................9
LO2...........................................................................................................................................................10
P3..........................................................................................................................................................10
P4..........................................................................................................................................................12
M2.........................................................................................................................................................13
M3.........................................................................................................................................................14
LO3...........................................................................................................................................................15
P5..........................................................................................................................................................15
P6..........................................................................................................................................................17
M4.........................................................................................................................................................18
M5.........................................................................................................................................................19
LO4...........................................................................................................................................................20
P7..........................................................................................................................................................20
P8..........................................................................................................................................................21
M6.........................................................................................................................................................22
Test Cases..................................................................................................................................................23
Conclusion.................................................................................................................................................29
References.................................................................................................................................................30
Document Page
Table of Figures
Figure 1 Creating LAN redundancy using multiple switches.........................................................7
Figure 2 Design..............................................................................................................................12
Figure 3 VSRP paths for the traffic...............................................................................................13
Figure 4 Cisco Enterprise Architecture.........................................................................................16
Figure 5 Modules of the Enterprise Architecture..........................................................................17
Figure 6 Test Case 1......................................................................................................................24
Figure 7 Test Case 2......................................................................................................................25
Figure 8 Test Case 3......................................................................................................................25
Figure 9 Test Case 4......................................................................................................................26
Figure 10 Test Case 5....................................................................................................................27
Figure 11 Test Case 6....................................................................................................................27
Figure 12 Test Case 7....................................................................................................................28
Figure 13 Test Case 8....................................................................................................................28
Figure 14 Test Case 9....................................................................................................................29
Figure 15 Test Case 10..................................................................................................................30
Figure 16 Test Case 11..................................................................................................................30
Document Page
Introduction
This report will underline the basic concepts of networking. In this report we will understand
how a network works, different types of network, their implementations, their drawbacks and
their solutions. Given scenario demands a development of a robust network infrastructure which
is scalable for a given enterprise. The essential details are provided in the case study which will
help in building the architecture. In this infrastructure we will cover all the networking basics
after which we will implement the complex protocols. This report will cover the designing of the
architecture and then implement in for the enterprise.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO1
P1
Network topology is used to fulfill the requirements of any enterprise network design. The
success of any business either large or small depends upon the information and computers
networks (Academy, 2019). To fulfill the daily needs of the business like connecting with
people, providing services and support applications and allocating resources, the network plays a
very important role. The most common requirements of any business are:
The network must stay online 24x7. It mustn’t get affected by any failure in links or
equipment and conditions resulting in overloading.
The network must be reliable to deliver and receive any information from any host to host.
Security should be on the utmost priority. The transmission of data should be secure.
The network must get modified easily and adapt to any changes.
The experts advise using the hierarchical network design model in developing a topology. The
hierarchical model is widely used by small, medium or large scale enterprises because,
1. It is reliable.
2. It is scalable.
3. It is secure.
4. It is adaptable
5. It is cost-efficient.
Scalability is the ability of a network or a system to adapt to a growing environment of work and
expand for the accommodation of that growth. The features of a scalable network are as follows:
1. Reliability: The network must provide the QoS (Quality of Service) for protocols and
applications without interfering with the responses of the desktop.
2. Efficiency: The network must be efficient and should minimize the cost. The optimization
should be the best when it comes to allocating the resources or bandwidth.
Document Page
3. Security: The transmission and storage of data must be secure and untouchable by external
forces.
4. Adaptability: The network should be adaptable to any changes in the growth of the
enterprise and expand with respect to it.
Document Page
P2
LAN redundancy is a way to refer at the network redundancy which is the most crucial part of
any operating network. If the Wireless connection shuts down then all the work which was
operational will be lost and furthermore, you cannot access or work on anything as the network
is not online. In that case network redundancy gets your back (Edrawsoft, 2019). It refers to the
support system which gets activated when the main connection fails down then you have another
way to connect with the resources and keep the work going on. To solve the issues Spanning
Tree Protocol and switches are used.
Figure 1 Creating LAN redundancy using multiple switches
The bandwidth of a network is responsible to maximize the transmission of data from one point
to another point in a specific span of time. Bandwidth on a network can be via two basic
approaches:
1. Broadband: The technologies that use broadband divides the bandwidth over a medium such
as copper cabling or fiber optic cabling into various channels. After that, the send can start the
transmission of data over different channels.
2. Baseband: The technologies that use baseband uses the available frequencies to transmit the
data. Example: Ethernet.
Load issues happen on a network due to various reasons like:
Non-determination of the number of packets transmitting from one host to another.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Congestion issues refers to the immense amount of packets transmitting at the same time.
Delay or jitter is a major drawback when it comes to the quality of the service provided by
the network.
Intervening of heterogeneous networks.
Document Page
M1
Virtual Switch redundancy protocol (VSRP) provides redundancy to Layer 2 and Layer 3
topologies. It is based on the Ruckus proprietary protocol. It provides more than one backups for
one device. When the active device shuts down then the backup replaces the active device and
keeps forwarding the traffic (Ruckus, 2019). You either use the protocol on layer 2 or layer 3 or
you can use it on both the layers. On layer 2, the links get backed up but the particular IP
addresses do not whereas, on layer 3, both the links and IP address gets backed up at the same
time.
Virtual Router redundancy protocol (VRRP) provides redundancy to the network. It comes under
the network layer protocol. Numerous routers come in a group which makes it a virtual logical
router. This virtual logical router acts as the default gateway for every local host. If any router
shuts down, then another router in the same group will take the responsibilities to forward the
traffic. The virtual router rejects the packets if the authentication schemes appear to be different.
VRRP supports three types of authentication which include No authentication, Plain text
authentication and MD5 authentication.
Document Page
LO2
P3
The following network devices are required for network connectivity:
1. Hub- A hub is called the home of the network. All the numerous wires which come from
different branches are connected to the hub. It is also known as a multiport repeater.
2. Repeater- It operates on the physical layer (CRC Press, 2019). The main purpose of the
repeater is the regeneration of the signal before it becomes corrupted or weak over the same
network.
3. Switch- This device comes under the data link layer. It is used to check the error before
forwarding the data which results in the more efficient transmission of packets on the accurate
port.
4. Bridge- It operated on the data link layer. It is also a repeater with an added functionality of
filtering the content of MAC addresses of sender and receiver.
5. Brouter- This device combines both the features of the router and bridge. It can work on
both network layer and data link layer. The capability of the device is to provide routing to
packets over networks and even work as a bridge.
6. Router- A router is like a switch. It provides routing to the data packets on the basis of their
IP addresses.
7. Gateway- It is the way which is used for connecting two networks working on different
models.
The configuration commands used for network connectivity are as follows:
1. Ping: It is used to confirm that there is a stable communication between the computer and
any other device over a network.
2. Nslookup: This command is used to query the DNS and helps in fetching the IP address and
domain name.
3. Host: This command is used in finding the domain name of any particular IP address.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. Ipconfig: This command is used as a utility as it displays the IP address of a network
interface.
Document Page
P4
The design is implemented below.
Figure 2 Design
chevron_up_icon
1 out of 31
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]