Analysis of Scalable Networks and Redundancy Protocols
VerifiedAdded on 2025/05/04
|20
|4135
|432
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Transport Network Design
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction......................................................................................................................................3
LO1 Explore LAN design principles and their application in the network design process............4
P1 Examine the network design models and features of scalable networks based on a given set
of business needs..........................................................................................................................4
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................5
M1. Analyze the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.........................................................................................................................6
LO2 2 Implement a network using LAN design principles based on a predefined set of
requirements....................................................................................................................................7
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity............................................................................................7
M2. Analyze different switch redundancy protocols and their effectiveness in solving
redundancy issues........................................................................................................................8
M3. Analyze Layer 3 redundancy implementations for IPv4 and IPv6.......................................9
LO3 Produce an appropriate WAN solution to a set of organizational requirements...................10
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements...............................................................................................................................10
P6 Configure WAN protocols as part of an enterprise network solution..................................11
M4. Analyze the benefits and drawbacks of private and public WAN technologies................12
M5. Evaluate features and benefits of different VPN types based on organizational needs.....13
LO4 Solve a range of network related problems using appropriate troubleshooting techniques
and methods...................................................................................................................................14
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................14
P8 Troubleshoot LAN and WAN connectivity issues at different networking layers...............15
M6 Develop effective documentation of troubleshooting methods and steps based on a given
scenario......................................................................................................................................16
Conclusion.....................................................................................................................................17
References......................................................................................................................................18
Introduction......................................................................................................................................3
LO1 Explore LAN design principles and their application in the network design process............4
P1 Examine the network design models and features of scalable networks based on a given set
of business needs..........................................................................................................................4
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.....................................................................5
M1. Analyze the switch and router redundancy protocols and their effectiveness in supporting
scalable networks.........................................................................................................................6
LO2 2 Implement a network using LAN design principles based on a predefined set of
requirements....................................................................................................................................7
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity............................................................................................7
M2. Analyze different switch redundancy protocols and their effectiveness in solving
redundancy issues........................................................................................................................8
M3. Analyze Layer 3 redundancy implementations for IPv4 and IPv6.......................................9
LO3 Produce an appropriate WAN solution to a set of organizational requirements...................10
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements...............................................................................................................................10
P6 Configure WAN protocols as part of an enterprise network solution..................................11
M4. Analyze the benefits and drawbacks of private and public WAN technologies................12
M5. Evaluate features and benefits of different VPN types based on organizational needs.....13
LO4 Solve a range of network related problems using appropriate troubleshooting techniques
and methods...................................................................................................................................14
P7 Deploy network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation.........................................................................14
P8 Troubleshoot LAN and WAN connectivity issues at different networking layers...............15
M6 Develop effective documentation of troubleshooting methods and steps based on a given
scenario......................................................................................................................................16
Conclusion.....................................................................................................................................17
References......................................................................................................................................18

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
Transportation Network Design is an essential problem of enhancement of the transformational
network by selection of the optimized project out of the set of available options. It attempts to do
the optimization over few of the particular goals below the limitations of the resources. For an n-
project case, the consideration of an accept-reject choice for all the projects, there are 2 n
optional networks which are there for the comparison. However resolving this kind of an issue
out of a few options doesn’t consume much of a time, the resolution becomes highly long
process as the value of n has an increment. Different ideas have been given for the solution of the
transport network design problem. In the course of this report the different aspects of the
transport network design are discussed. While going through this report a learner would be able
to learn to answer the questions such as the exploring of the principles associated with the design
of the Local Area Network. Creating a local area network by the help of the already provided set
of requirements. Development of a proper Wide Area Network resolution to the given set of
needs. Solution of network related issue that may arise while establishing the problem.
Transportation Network Design is an essential problem of enhancement of the transformational
network by selection of the optimized project out of the set of available options. It attempts to do
the optimization over few of the particular goals below the limitations of the resources. For an n-
project case, the consideration of an accept-reject choice for all the projects, there are 2 n
optional networks which are there for the comparison. However resolving this kind of an issue
out of a few options doesn’t consume much of a time, the resolution becomes highly long
process as the value of n has an increment. Different ideas have been given for the solution of the
transport network design problem. In the course of this report the different aspects of the
transport network design are discussed. While going through this report a learner would be able
to learn to answer the questions such as the exploring of the principles associated with the design
of the Local Area Network. Creating a local area network by the help of the already provided set
of requirements. Development of a proper Wide Area Network resolution to the given set of
needs. Solution of network related issue that may arise while establishing the problem.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO1 Explore LAN design principles and their application in the network design process
P1 Examine the network design models and features of scalable networks based on a given
set of business needs.
1. 2 Tier Models – It is the best type of all the other models if the short sized local
networks are taken into consideration, which basically are below the 3 block- structure of
the method sharing layer. In this kind of design model, the mid and the sharing are
considered collectively as a kind of a unit layer.
2. Modular Creational Models – It is obtained in application by using the methods of the
hierarchy models around the various kinds of segments of networks of the organization of
the institution. Because of these procedures, this model is also considered to be one of the
most scalable models out of all the other ones.
3. Hierarchy Models- It is clearly a part of the explanation that the network design models
that have the ability to be held responsible for breaking a large as well as complex
network into small and simple networks which may have the capability to be configures
at an appropriate measure that can be termed as to be more efficient than the large
networks by the means of which these small and simple networks are achieved.
4. 3 Tier Models- It is generally used in mega firms of networks that are present in a
variety of institutions. These networks are produced by the blocks of more than one
methodological sharing layer.
Following mentioned are the properties of scalable networks
Availability: The scalable network must be having the capability for the maintenance of the
configuration parameters to make sure the communication happens with the failures of the
possible nodes
Optimal Decision: These nodes must have the ability to decide the parameters of the
configuration that allows the nodes themselves to increase their efficiency under some defined
variations in the state networks (Lopez and Trivino, 2014).
Confidentiality: The information that has been sent by the help of the scalable network must be
able to be read by only the people who are authorized to read the document or the file.
Scalability: The scalable networks must have the ability have an increment in their size and also
be able to handle the rapidly increasing amount of work as well as make as make sure that any of
these steps are not affecting the quality of the work and services that are being provided (Lopez
and Trivino, 2014).
P1 Examine the network design models and features of scalable networks based on a given
set of business needs.
1. 2 Tier Models – It is the best type of all the other models if the short sized local
networks are taken into consideration, which basically are below the 3 block- structure of
the method sharing layer. In this kind of design model, the mid and the sharing are
considered collectively as a kind of a unit layer.
2. Modular Creational Models – It is obtained in application by using the methods of the
hierarchy models around the various kinds of segments of networks of the organization of
the institution. Because of these procedures, this model is also considered to be one of the
most scalable models out of all the other ones.
3. Hierarchy Models- It is clearly a part of the explanation that the network design models
that have the ability to be held responsible for breaking a large as well as complex
network into small and simple networks which may have the capability to be configures
at an appropriate measure that can be termed as to be more efficient than the large
networks by the means of which these small and simple networks are achieved.
4. 3 Tier Models- It is generally used in mega firms of networks that are present in a
variety of institutions. These networks are produced by the blocks of more than one
methodological sharing layer.
Following mentioned are the properties of scalable networks
Availability: The scalable network must be having the capability for the maintenance of the
configuration parameters to make sure the communication happens with the failures of the
possible nodes
Optimal Decision: These nodes must have the ability to decide the parameters of the
configuration that allows the nodes themselves to increase their efficiency under some defined
variations in the state networks (Lopez and Trivino, 2014).
Confidentiality: The information that has been sent by the help of the scalable network must be
able to be read by only the people who are authorized to read the document or the file.
Scalability: The scalable networks must have the ability have an increment in their size and also
be able to handle the rapidly increasing amount of work as well as make as make sure that any of
these steps are not affecting the quality of the work and services that are being provided (Lopez
and Trivino, 2014).

P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.
Construction of the networks has turned out to be even more challenging in the transport network
design as it has to be economical and profitable with respect to the cost, stability and the
presence of the network (Batumalai, et. al., 2015). Due to variation of the call centers into the
import element for a company it is considered to be very essential to be sure that the
environment of the network would be having the ability to bear the large number of requests per
minute and that to at a very high flow of data all the times. The abundance of the availability is
also important as the down times may acquire the ability to cause a business as the consumers
may take the decision for transferring the services to other reliable service providers which
provide them more availability. The coming generation of the networks would be highly
dependent upon a single network with a 100% reliability and presence in the flow of traffic
(Batumalai, et. al., 2015).
In the present scene, almost every application that is associated with any kind of business and
market has been taken out to the online portals on the internet. The businesses done over the
internet does very much have reliability on the Internet in order to operate their basic tasks (Sethi
and Behera, 2017). With the heavy increase in the complexity of services that are provided by
the internet, there is dramatic increment in the delivery of the contents that are provided by the
networks that are also called the Content Delivery Networks (CDNs) and usage the internet over
the mobiles. With the increment of technology along with increment in the users, the complexity
will keep on i=observing the increment in the future. As per the studies and researches that are
done in the same field in the past it is stated that, nearly half of the global population is having
the access to the internet which even was below 1 percent two decades ago. Therefore there is a
very high demand for management of the traffic over the internet (Sethi and Behera, 2017).
reference to Layer 2 and Layer 3 of the OSI Mode.
Construction of the networks has turned out to be even more challenging in the transport network
design as it has to be economical and profitable with respect to the cost, stability and the
presence of the network (Batumalai, et. al., 2015). Due to variation of the call centers into the
import element for a company it is considered to be very essential to be sure that the
environment of the network would be having the ability to bear the large number of requests per
minute and that to at a very high flow of data all the times. The abundance of the availability is
also important as the down times may acquire the ability to cause a business as the consumers
may take the decision for transferring the services to other reliable service providers which
provide them more availability. The coming generation of the networks would be highly
dependent upon a single network with a 100% reliability and presence in the flow of traffic
(Batumalai, et. al., 2015).
In the present scene, almost every application that is associated with any kind of business and
market has been taken out to the online portals on the internet. The businesses done over the
internet does very much have reliability on the Internet in order to operate their basic tasks (Sethi
and Behera, 2017). With the heavy increase in the complexity of services that are provided by
the internet, there is dramatic increment in the delivery of the contents that are provided by the
networks that are also called the Content Delivery Networks (CDNs) and usage the internet over
the mobiles. With the increment of technology along with increment in the users, the complexity
will keep on i=observing the increment in the future. As per the studies and researches that are
done in the same field in the past it is stated that, nearly half of the global population is having
the access to the internet which even was below 1 percent two decades ago. Therefore there is a
very high demand for management of the traffic over the internet (Sethi and Behera, 2017).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

M1. Analyze the switch and router redundancy protocols and their effectiveness in
supporting scalable networks.
SRP
It is designed to provide the recovery of a network at a high rate. It is very much different as
compared to the other protocols due to the development that is been completed by it, this
protocol is known to be created by the help of the collection of the resiliencies of the second
Layer and the third Layer that enables them to help them in completing the jobs of both, the
Switch Redundancy Protocol and the Router Redundancy Protocol (Sahoo and Goswami, 2014).
RRP
It is defined as a rule of the networks of a system which gives the tasks of the Protocols of the
routers over the internet that were themselves provided to the host which were taking part in the
whole procedure. It increases the availability and reliability of the path of the routing procedure
by taking the help from of an automatic gateway that will be chosen over the subnet of the
Internet Protocol (Sahoo and Goswami, 2014).
supporting scalable networks.
SRP
It is designed to provide the recovery of a network at a high rate. It is very much different as
compared to the other protocols due to the development that is been completed by it, this
protocol is known to be created by the help of the collection of the resiliencies of the second
Layer and the third Layer that enables them to help them in completing the jobs of both, the
Switch Redundancy Protocol and the Router Redundancy Protocol (Sahoo and Goswami, 2014).
RRP
It is defined as a rule of the networks of a system which gives the tasks of the Protocols of the
routers over the internet that were themselves provided to the host which were taking part in the
whole procedure. It increases the availability and reliability of the path of the routing procedure
by taking the help from of an automatic gateway that will be chosen over the subnet of the
Internet Protocol (Sahoo and Goswami, 2014).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO2 2 Implement a network using LAN design principles based on a predefined set of
requirements.
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity.
Hub
A hub is defined as a device that is used in networking, which is having a usage to get connected
to the 2 parts of a cabled network. In the star topologies, each and every computer is directly
cabled to the hub. In case of any failure in the hub, the data communication in the computer will
stop. In a network that is based upon the type of Ethernet that is being used in it, a hub is a
middle element that is having the usage to get connected to all the computers with each other.
Switch
A network switch is almost same to the functionality in the networks as a hub. The only
difference is that that switch doesn’t have the ability to broadcast the data to each and every
computer in a network which is one of the defining features of a hub.
Gateway
A gateway can be defined as hardware or even software that has the ability to act as a bridge
between two different networks. It is said to be an entrance point of the networks. A gateway has
the task to connect a LAN with the internet.
requirements.
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity.
Hub
A hub is defined as a device that is used in networking, which is having a usage to get connected
to the 2 parts of a cabled network. In the star topologies, each and every computer is directly
cabled to the hub. In case of any failure in the hub, the data communication in the computer will
stop. In a network that is based upon the type of Ethernet that is being used in it, a hub is a
middle element that is having the usage to get connected to all the computers with each other.
Switch
A network switch is almost same to the functionality in the networks as a hub. The only
difference is that that switch doesn’t have the ability to broadcast the data to each and every
computer in a network which is one of the defining features of a hub.
Gateway
A gateway can be defined as hardware or even software that has the ability to act as a bridge
between two different networks. It is said to be an entrance point of the networks. A gateway has
the task to connect a LAN with the internet.

M2. Analyze different switch redundancy protocols and their effectiveness in solving
redundancy issues.
The S. R. P is known to be configured in two different ways that is just for layer 2 and for both
layer 2nd and layer 3rd.
1. Layer 2: In this kind of configuration, the given link that is present in the layer 2nd is safe
as a backup file of all the links is produced but the similar scenario cannot be assured if
the specified internet protocol address is talk about because the backup in this case is not
produced (Sahoo and Goswami, 2014).
2. Layer 2nd and Layer 3rd: In this kind of set up, the link that is made available in the layer
2nd is safe because the backup file of each and every one of the links is created just as it
happens in the protocol that is only for the Layer 2nd. The one thing that makes this
protocol different from the other one is that in it the IP address is also secured as its
backup file is also produced. The entire procedure of the Layer 3 Switch Redundancy
Protocols is much similar to entire procedure of the VSRP- E. However, while having the
usage of the VSRP-E, the redundant that occurs is considered to be given to layer 2nd and
the layer 3rd at the same time (Sahoo and Goswami, 2014).
redundancy issues.
The S. R. P is known to be configured in two different ways that is just for layer 2 and for both
layer 2nd and layer 3rd.
1. Layer 2: In this kind of configuration, the given link that is present in the layer 2nd is safe
as a backup file of all the links is produced but the similar scenario cannot be assured if
the specified internet protocol address is talk about because the backup in this case is not
produced (Sahoo and Goswami, 2014).
2. Layer 2nd and Layer 3rd: In this kind of set up, the link that is made available in the layer
2nd is safe because the backup file of each and every one of the links is created just as it
happens in the protocol that is only for the Layer 2nd. The one thing that makes this
protocol different from the other one is that in it the IP address is also secured as its
backup file is also produced. The entire procedure of the Layer 3 Switch Redundancy
Protocols is much similar to entire procedure of the VSRP- E. However, while having the
usage of the VSRP-E, the redundant that occurs is considered to be given to layer 2nd and
the layer 3rd at the same time (Sahoo and Goswami, 2014).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

M3. Analyze Layer 3 redundancy implementations for IPv4 and IPv6.
IPv6 routing protocol makes sure the router to router resiliencies and fails over. However, in
scenarios in which the rout in the idle of a host and the first hop routers fail, or the first hop
routers itself fail, the first-hop redundancy protocol (FHRP) also ensures host to router resilience
and fails over (Cisco, 2012).
In the case of the IPv4 the Internet Protocols hosts have various methods of choosing the default
routers or default gateways that are to be used. Some of the ways in this case are DHCPs,
BOOTPs, ICMPs Router Discovery Protocols (IRDP), manual configurations, or in some cases
by routing the protocols. However is not generally usual that host is controlling the routing
protocol, it can be done. The most used way of it is DHCPs as it is known to be is automated and
there is considered to be a DHCP server on almost every user LAN segments. The other frequent
resolution is manual configurations that are in simple words, typing the address of the default
gateway of the internet protocol into the device. The outcome with manual configurations is of
course in the hosts having the knowledge of a single IP address of its default gateways
(Popeskic, 2019).
IPv6 routing protocol makes sure the router to router resiliencies and fails over. However, in
scenarios in which the rout in the idle of a host and the first hop routers fail, or the first hop
routers itself fail, the first-hop redundancy protocol (FHRP) also ensures host to router resilience
and fails over (Cisco, 2012).
In the case of the IPv4 the Internet Protocols hosts have various methods of choosing the default
routers or default gateways that are to be used. Some of the ways in this case are DHCPs,
BOOTPs, ICMPs Router Discovery Protocols (IRDP), manual configurations, or in some cases
by routing the protocols. However is not generally usual that host is controlling the routing
protocol, it can be done. The most used way of it is DHCPs as it is known to be is automated and
there is considered to be a DHCP server on almost every user LAN segments. The other frequent
resolution is manual configurations that are in simple words, typing the address of the default
gateway of the internet protocol into the device. The outcome with manual configurations is of
course in the hosts having the knowledge of a single IP address of its default gateways
(Popeskic, 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO3 Produce an appropriate WAN solution to a set of organizational requirements
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements.
Dynamic Multipoint Virtual Private Network - It is a proprietary solution works on different
devices for the production of VPN in a much easier way. It is considered to be largely scalable
and flexible at the real- time in its natural existence. It uses IP security and GRE to produce the
VPN. IT itself is having 2 technologies in itself Next Hop Resolution Protocol (NHRP) and the
second is the Multipoint Tunnel Interface (Kaur and Gurm, 2015).
Multiprotocol Label Switching: MPLS is the primary technology that is having its usage in
Internet Service Provider Core network for label changing purpose. The MPLS has a usage of
VRF to separate among the routing tables that are associated with the consumers. Each of the
given Provider’s Edge routers gets the swept IP packets from Customer’s Edge routers and then
it provides an addition to the label with those packets and packets are sent in the front direction
from their sources to the destinations where they where they were supposed to be sent with the
help of labeled switchings (Kaur and Gurm, 2015).
Frame Relay - Frame Relay is a packet switching technology that is used to work at the Layer
2nd of O. S. I. Models. It is generally having its usage among LAN over the WANs. The
logically thought path which is developed in between 2 routers is called by the name of Virtual
Circuits. These VC can be permanent virtual circuits (PVCs) or even has the ability to be
switched virtual circuit (SVCs). The Framed Relays uses Layer 2nd addresses are known as D. L.
C. I. (Data Link Connection Identifiers) which is having the usage of identifying the type of the
Virtual Circuit that whether it is the permanent virtual circuit or the switched virtual circuit.
DLCIs are locally significant to a link and can change when passes from frame relay cloud(Kaur
and Gurm, 2015).
P5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements.
Dynamic Multipoint Virtual Private Network - It is a proprietary solution works on different
devices for the production of VPN in a much easier way. It is considered to be largely scalable
and flexible at the real- time in its natural existence. It uses IP security and GRE to produce the
VPN. IT itself is having 2 technologies in itself Next Hop Resolution Protocol (NHRP) and the
second is the Multipoint Tunnel Interface (Kaur and Gurm, 2015).
Multiprotocol Label Switching: MPLS is the primary technology that is having its usage in
Internet Service Provider Core network for label changing purpose. The MPLS has a usage of
VRF to separate among the routing tables that are associated with the consumers. Each of the
given Provider’s Edge routers gets the swept IP packets from Customer’s Edge routers and then
it provides an addition to the label with those packets and packets are sent in the front direction
from their sources to the destinations where they where they were supposed to be sent with the
help of labeled switchings (Kaur and Gurm, 2015).
Frame Relay - Frame Relay is a packet switching technology that is used to work at the Layer
2nd of O. S. I. Models. It is generally having its usage among LAN over the WANs. The
logically thought path which is developed in between 2 routers is called by the name of Virtual
Circuits. These VC can be permanent virtual circuits (PVCs) or even has the ability to be
switched virtual circuit (SVCs). The Framed Relays uses Layer 2nd addresses are known as D. L.
C. I. (Data Link Connection Identifiers) which is having the usage of identifying the type of the
Virtual Circuit that whether it is the permanent virtual circuit or the switched virtual circuit.
DLCIs are locally significant to a link and can change when passes from frame relay cloud(Kaur
and Gurm, 2015).

P6 Configure WAN protocols as part of an enterprise network solution.
Interior Gateway Protocol- the Routing protocols that are used in the Wide area connection,
are among some autonomous systems. All routers in this type of protocol will be having the
routing process among the similar autonomous limitations. It is considered to be largely scalable
and flexible at the real- time in its natural existence. The abundance of the availability is also
important as the down times may acquire the ability to cause a business as the consumers may
take the decision for transferring the services to other reliable service providers which provide
them more availability.
Exterior Gateway Protocol- Routing that is known to be having the usage of the protocol that is
among the various autonomous system is typically called by the name of the exterior gateway
protocol. The Routers in the various autonomous systems always are in heavy need of the
Exterior Gateway Protocol. Border Gateway Protocol is extensively used as EGP. The businesses
done over the internet does very much have reliability on the Internet in order to operate their
basic tasks.
Interior Gateway Protocol- the Routing protocols that are used in the Wide area connection,
are among some autonomous systems. All routers in this type of protocol will be having the
routing process among the similar autonomous limitations. It is considered to be largely scalable
and flexible at the real- time in its natural existence. The abundance of the availability is also
important as the down times may acquire the ability to cause a business as the consumers may
take the decision for transferring the services to other reliable service providers which provide
them more availability.
Exterior Gateway Protocol- Routing that is known to be having the usage of the protocol that is
among the various autonomous system is typically called by the name of the exterior gateway
protocol. The Routers in the various autonomous systems always are in heavy need of the
Exterior Gateway Protocol. Border Gateway Protocol is extensively used as EGP. The businesses
done over the internet does very much have reliability on the Internet in order to operate their
basic tasks.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 20
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.