Transport Network Design: A Comprehensive Analysis

Verified

Added on  2025/05/04

|26
|3443
|327
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
TRANSPORT NETWORK DESIGN
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction..............................................................................................................................................3
LO1..........................................................................................................................................................4
P1 Examine the network design models and features of scalable networks based on a given set of
business needs......................................................................................................................................4
P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with
reference to Layer 2 and Layer 3 of the OSI Mode.............................................................................6
LO2..........................................................................................................................................................8
P3 Select LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity....................................................................................................8
P4: Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router
redundancy protocols.........................................................................................................................10
LO3: Produce an appropriate WAN solution to a set of organizational requirements..........................11
P5: 5 Examine WAN technologies and select the appropriate one for a set of enterprise
requirements.......................................................................................................................................11
P6: Configure WAN protocols as part of an enterprise network solution.........................................11
LO4: Solve a range of network related problems using appropriate troubleshooting techniques and
methods..................................................................................................................................................19
P7: Deploy network monitoring tools and troubleshooting methods to establish network baselines
and produce network documentation.................................................................................................19
P8: Troubleshoot LAN and WAN connectivity issues at different networking layers.....................20
Conclusion.............................................................................................................................................22
Reference:..............................................................................................................................................23
Table of figure
Figure 1 Flow chart of scalable network.................................................................................................6
Figure 2 redundancy chart.......................................................................................................................7
Figure 1: 1..............................................................................................................................................14
Figure 2: 2..............................................................................................................................................14
Figure 3: 3..............................................................................................................................................15
Document Page
Figure 4: 4..............................................................................................................................................15
Figure 5: 5..............................................................................................................................................16
Figure 6:6...............................................................................................................................................16
Figure 7: 7..............................................................................................................................................17
Figure 8: 8..............................................................................................................................................17
Figure 9:9...............................................................................................................................................18
Figure 10:10...........................................................................................................................................18
Figure 11:111.........................................................................................................................................19
Figure 12:12...........................................................................................................................................19
Figure 13: 13..........................................................................................................................................20
Document Page
Introduction
This report is based on the generalized ideas of administrated systems. This report concluded
the aspects like functions of systems, different types of systems, their usability, their
advantages and their disadvantages and the solutions. Given subtitles are based on the
situation which helps to maintain the structure. The brief description of designing and
implementation is also maintained in this report. The subtitles and information also cover the
all the administration based on the systems and through which we will able to solve the
puzzling procedure. Situations are like the request for the network development which is
tough and scalable.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO1
P1 Examine the network design models and features of scalable networks based
on a given set of business needs.
Network topology is a way to design a network for smooth communication to fulfill the needs
of an enterprise. The network decided the growth of any enterprises. A good network plays
the key role to fulfill the requirement of enterprises. It helps to provide the basic requirements
like to build the connection within people and also generate the supports and applications for
the system. There are so many requirements of enterprises. Some of them are described as
follows:
Security should be strong enough. So, that no one can easily track it out.
The network has potential of adaptively.
The network has to be consistent.
The network has a capacity to stay up for all the time even in the conditi9on of
network failure or in the condition of overloaded.
Too much timing is not consuming during the period of problem solving.
Scability is considered as the main key for the network. It is the main condition for any
network that it has to be scalable. It generates the growth in the enterprise by adapt all the
features of the network.
Important features are:
1. Efficiency: it includes the optimization of cost and speed based on the network.
2. Security: transmission of data and information should be secure. There is no involvement
of thirds party during the transmission.
3. Adaptability: the network should be capable to adopt any type of changes in the
enterprise.
4. Reliability: the network is capable to deliver the data very carefully to the receiver point
in accordance to QoS (Quality of services).
VRRP refers to the Virtual Router Redundancy protocol. Its main function is to provide the
redundancy to the network. A virtual router is the combination of many routers. VRRP is
considered as the layer of network. Another router from the combination takes place of
Document Page
another router when it gets fail to fulfill its load. So, that the work remains continue through-
out the whole process. Virtual router rejects the whole packet if any question is present in the
network.
Generally, there are 3 types of authentication:
1. No Authentication
2. Authentication of plain text
3. MD5 Authentication
It has a capability of multiple backups for an individual device. The traffic wills on through
the process because if any device fails to backup than another device come in existence.
Figure 1 Flow chart of scalable network
Document Page
P2 Discuss LAN redundancy, bandwidth and load related issues and possible
solutions with reference to Layer 2 and Layer 3 of the OSI Mode.
It is the main important part of network. For example: suppose a person is working on a
wireless connection. The major drawback of network is the all the work is lost whenever the
system shut down. So, to get rid from this problem the network redundancy comes in
existence. Network redundancy is considered as the main part of the network because it helps
to save or store all the data. It comes in existence whenever the shut down problem is
occurring. Switches and spanning tree protocols are used to manage all the problems. For
many of organizations, the business needs are fulfill by the efficient network. That’s why the
designing of the network is the crucial and important task. Multiple network services are
provided by the path redundancy. It provides this facility by eliminating the failure of single
point. Redundancy is considered as the important aspect of designing which is used to
prevent the network through the disruption to users.
Figure 2 redundancy chart
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The speed of transmission is gain by the bandwidth in the network. The data is transferred
with the speed by the help of bandwidth. Bandwidth can be provided by using the two
approaches:
1. Baseband: the data can be transmitted with the help of frequencies.
2. Broadband: broadband is used for the division of the bandwidth. It can be divided
through the means of optic cables or the copper cables.
The software of bandwidth measurement is used to generate the administrators with live
readings or with the long term trends for the use. It is used to graphs which are easy to read or
the clear data. The LAN can be used in the accurate way with the proper information related
to network traffic or with the use of bandwidth.
Reasons for occur the load:
Congestion
Delay in the network
When mixed networks try to interfere.
When there is no counting of transferred packets.
Solution for load issue:
A load balancer is used to balance the splitter traffic between different-different area
networks. It is also used to manage the different user requests at a particular time in a proper
manner to increase the performance and provide the reliability to the network. Small
networks are combined to make the huge network. A network should be small as a home and
it is large in size like an internet. The network is considered to be local area network when
the computers or the networks are in combined from.
A GSLB stands fo9r the global server load balancer it is also a type of balancer which is used
to distribute the request of the user among different parts of the server. Users get the fast
response in regards of their requests. This is done mainly of because servers and companies
are too much confident about all these availability of the websites and in the most severe
cases related to the failure of the data and the information or the server failure.
Document Page
LO2
P3 Select LAN devices based on features and requirements, and apply basic
configuration commands for network connectivity.
Devices used for the network connectivity:
1. Repeater: the main reason behind the repeater is the signal recovery. It is used to work
for a physical layer.
2. Hub: it is generally known as home of the network. Hub is used to combine the
different wires from the different-different branches.
3. Bridge: it is similar to the repeater. It has the additional functions. The main function
is to filter out the MAC data. It normally does the work for the data link layer.
4. Switch: it commonly work under the data link layer. It is used for checking the error
before transmit the data to the receiver.
5. Router: router is similar to the switch. It used to provide the routing in accordance
with the IP addresses of data packets.
6. Gateway: it is the way to connect the two or more than two networks.
Commands used in the network are:
1. Host: it is used to find the domain name of an IP addresses.
2. Ping: it is used to verify whether the connection is stable or not.
3. ipconfig: it is referred as a utility command. It is used to perform the task in
accordance with the IP address.
4. netstat: it is used to show the TCP connections like: which port is listening, where the
port is, the routing table, statistics of IPv4 and IPv6.
5. tracert: it is used to show the transverse of network from initial point to destination
point.
6. nslookup: it is commonly used to show the data which used in the phase of diagnosing
the DNS structure.
7. nbtstat: it is used to show the statics based on the protocol and active TCP
connections.
8. netsh: it is used to reset the TCP or IP.
Document Page
VSRP stands for the Virtual Switch Redundancy Protocol. It is the part of the Ruckus
protocols. It is used to provide the redundancy among seven layers during the failure. This
protocol is based on the Ruckus Virtual Router Redundancy Protocol Extended. It plays the
important role to create the backups. These backups are used to replace the main data from
the network during the failure. It ensures that the data is transferred without any loss of
information due to the net2work issue. When nodes start to connect with peer, it able the
connections to be start. Then the session is occureed and the messages are exchanged with
registered down the services. Sessions are used for the redundancy.
P4: Implement a LAN design with Layer 2 and Layer 3 redundancy using switch
and router redundancy protocols
This includes the design which has the data center foundation and helps to improve the
security of the system. This application provides the services of the offloading processes
which have the way to farm the network.
There are various services which include layers such as:
1. Firewalls: This is the protection layer which helps to have for the purpose of security.
2. Intrusion Detection System
3. SSL offloaders
4. Caches
This also has different implementations:
1. HSRP: This helps to develop the Cisco which allows for the multiple routers and the layers
which are switched to have one gateway.
2. Standby Router: This is the active router which has the backups for the entire message over
the network.
3. Active router: This router is active because it involves the gateway.
4. Listening router: This router is the backup router for the entire message over the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
LO3: Produce an appropriate WAN solution to a set of organizational
requirements
P5: 5 Examine WAN technologies and select the appropriate one for a set of
enterprise requirements
WAN stands for the Wide-Area Network this means there is no limitation in the range of the
network this can be used for a wide range. This basically most important for the business or
the organization because the organization has a vast area, therefore, there is a need for the
network coaction between the persons. This is for the area such as geographical which have
the widest range. There is the use of service provider which is called as the wide area network
to the enterprises. The role of the service provider is to make the smooth network for the
WAN so that it would be good for the users to use or for the organization (Comparitech.
2019).
There are technologies which are used in the WAN:
Technologies Description
ISDN This stands for the Integrated Services
Digital network this helps to make the
communication between the networks which
is used to transmit the voice or data or
anything which can be provided by the
network services. ISDN is at the common
end which provides internet services and
business organization which helps to aces
through the internet. DSL ad Cables services
are now replacing the ISDN because it is
faster and have a low cost. It cossets of the
interfaces:
1. Basic Rate Interface: which have the speed
of 64 kbps for the bear channels and 128
kbps for transferring of data.
2. Primary Rate Interface: which have two
chevron_up_icon
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]