Transport Network Design L5: A Comprehensive Report
VerifiedAdded on 2025/05/04
|39
|4172
|131
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Transport Network Design
(L5)
1
(L5)
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
INTRODUCTION.....................................................................................................................................4
LO1.............................................................................................................................................................5
P1............................................................................................................................................................5
P2............................................................................................................................................................6
M1...........................................................................................................................................................8
LO2.............................................................................................................................................................9
P4..........................................................................................................................................................11
M2.........................................................................................................................................................12
M3.........................................................................................................................................................13
LO1 & 2....................................................................................................................................................16
D1..........................................................................................................................................................16
LO3...........................................................................................................................................................17
P5..........................................................................................................................................................17
P6..........................................................................................................................................................19
M4.........................................................................................................................................................20
M5.........................................................................................................................................................21
LO4...........................................................................................................................................................22
P7..........................................................................................................................................................22
P8..........................................................................................................................................................24
M6.........................................................................................................................................................25
D2..........................................................................................................................................................26
CONCLUSION........................................................................................................................................35
REFRENCES...........................................................................................................................................36
2
INTRODUCTION.....................................................................................................................................4
LO1.............................................................................................................................................................5
P1............................................................................................................................................................5
P2............................................................................................................................................................6
M1...........................................................................................................................................................8
LO2.............................................................................................................................................................9
P4..........................................................................................................................................................11
M2.........................................................................................................................................................12
M3.........................................................................................................................................................13
LO1 & 2....................................................................................................................................................16
D1..........................................................................................................................................................16
LO3...........................................................................................................................................................17
P5..........................................................................................................................................................17
P6..........................................................................................................................................................19
M4.........................................................................................................................................................20
M5.........................................................................................................................................................21
LO4...........................................................................................................................................................22
P7..........................................................................................................................................................22
P8..........................................................................................................................................................24
M6.........................................................................................................................................................25
D2..........................................................................................................................................................26
CONCLUSION........................................................................................................................................35
REFRENCES...........................................................................................................................................36
2

Table of Figures
Figure 1 WAN connection with redundancy...................................................................................6
Figure 2 Redundancy in Layer 3.....................................................................................................8
Figure 3 Design..............................................................................................................................11
Figure 4 VSRP...............................................................................................................................12
Figure 5 HSRP...............................................................................................................................13
Figure 6 VRRP Configuration.......................................................................................................14
Figure 7 GLBP Configuration.......................................................................................................15
Figure 8 EtherChannel used for load balancing............................................................................16
Figure 9 WAN...............................................................................................................................18
Figure 10 Bottom Up Approach....................................................................................................22
Figure 11 Divide & Conquer Approach........................................................................................22
Figure 12 Top Down Approach.....................................................................................................23
Figure 13 Follow the path Approach.............................................................................................23
Figure 14 Move the problem Approach.........................................................................................23
Figure 15 Finance Pc6 pinging to Email server.............................................................................27
Figure 16 Finance Pc5 pinging to DNS server..............................................................................27
Figure 17 Finance Pc6 pinging to File server................................................................................28
Figure 18 Finance Pc5 pinging to Webserver................................................................................28
Figure 19 IT PC8 pinging to Sales PC2.........................................................................................29
Figure 20 Sales PC1 pinging to Finance Pc5.................................................................................29
Figure 21 Design PC4 pinging to IT Pc8.......................................................................................30
Figure 22 IT PC8 pinging to IT PC7.............................................................................................31
Figure 23 Finance PC6 pinging to Finance PC5...........................................................................31
Figure 24 Design pc4 pinging to design PC3................................................................................32
Figure 25 sales PC1 pinging to sales PC2.....................................................................................33
Figure 26 Pc6 from finance pinging to PC5 Of same department.................................................33
Figure 27 PC0 from branch pings to PC5 of finance at main branch............................................34
Figure 28 IT PC8 telnet to router1.................................................................................................34
3
Figure 1 WAN connection with redundancy...................................................................................6
Figure 2 Redundancy in Layer 3.....................................................................................................8
Figure 3 Design..............................................................................................................................11
Figure 4 VSRP...............................................................................................................................12
Figure 5 HSRP...............................................................................................................................13
Figure 6 VRRP Configuration.......................................................................................................14
Figure 7 GLBP Configuration.......................................................................................................15
Figure 8 EtherChannel used for load balancing............................................................................16
Figure 9 WAN...............................................................................................................................18
Figure 10 Bottom Up Approach....................................................................................................22
Figure 11 Divide & Conquer Approach........................................................................................22
Figure 12 Top Down Approach.....................................................................................................23
Figure 13 Follow the path Approach.............................................................................................23
Figure 14 Move the problem Approach.........................................................................................23
Figure 15 Finance Pc6 pinging to Email server.............................................................................27
Figure 16 Finance Pc5 pinging to DNS server..............................................................................27
Figure 17 Finance Pc6 pinging to File server................................................................................28
Figure 18 Finance Pc5 pinging to Webserver................................................................................28
Figure 19 IT PC8 pinging to Sales PC2.........................................................................................29
Figure 20 Sales PC1 pinging to Finance Pc5.................................................................................29
Figure 21 Design PC4 pinging to IT Pc8.......................................................................................30
Figure 22 IT PC8 pinging to IT PC7.............................................................................................31
Figure 23 Finance PC6 pinging to Finance PC5...........................................................................31
Figure 24 Design pc4 pinging to design PC3................................................................................32
Figure 25 sales PC1 pinging to sales PC2.....................................................................................33
Figure 26 Pc6 from finance pinging to PC5 Of same department.................................................33
Figure 27 PC0 from branch pings to PC5 of finance at main branch............................................34
Figure 28 IT PC8 telnet to router1.................................................................................................34
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

INTRODUCTION
In this report we will discuss about the fundamental ideas of systems administration. This report
will brief about we will see how a system functions, various sorts of system, their usage, their
downsides and their answers. Given situation requests the development of a network
infrastructure which is robust and scalable for a given endeavor. The basic subtleties are given
for the situation think about which will help in structure the engineering. The infrastructure
should cover all the systems administration essentials after which we will actualize the
perplexing protocols. This report will cover the structuring of the design and the implementation
of the network.
4
In this report we will discuss about the fundamental ideas of systems administration. This report
will brief about we will see how a system functions, various sorts of system, their usage, their
downsides and their answers. Given situation requests the development of a network
infrastructure which is robust and scalable for a given endeavor. The basic subtleties are given
for the situation think about which will help in structure the engineering. The infrastructure
should cover all the systems administration essentials after which we will actualize the
perplexing protocols. This report will cover the structuring of the design and the implementation
of the network.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO1
P1
The requirements of an enterprise who seeks a network design for a smooth flow of
communication is fulfilled by the network topology (SCTE, 2019). The growth of any enterprise
depends upon the network. A good network is the basic necessity of any enterprise as it helps in
performing the daily activities like providing support and services application, connect with the
people. There are many requirements of any enterprise but the common ones are mentioned
below:
• The network should be online and active 24x7 even if there is any overloading or failure.
• The network should be reliable.
• The security should be top class.
• The network should have adaptability capabilities.
Scalability is the main feature of a network. A network must be scalable. It provides the
capability to the network by which it can adapt to the growth in the enterprise. Features are
mentioned below:
1. Reliability: The network must be able to deliver the information correctly to the
destination host keeping in mind the Quality of Service (QoS).
2. Efficiency: It refers to the cost optimization and optimization of the speed of the network.
3. Security: The transfer of data should be secure. Third party forces should never interfere
in the transmission of data.
4. Adaptability: The network must adapt to the changing environment of the enterprise.
5
P1
The requirements of an enterprise who seeks a network design for a smooth flow of
communication is fulfilled by the network topology (SCTE, 2019). The growth of any enterprise
depends upon the network. A good network is the basic necessity of any enterprise as it helps in
performing the daily activities like providing support and services application, connect with the
people. There are many requirements of any enterprise but the common ones are mentioned
below:
• The network should be online and active 24x7 even if there is any overloading or failure.
• The network should be reliable.
• The security should be top class.
• The network should have adaptability capabilities.
Scalability is the main feature of a network. A network must be scalable. It provides the
capability to the network by which it can adapt to the growth in the enterprise. Features are
mentioned below:
1. Reliability: The network must be able to deliver the information correctly to the
destination host keeping in mind the Quality of Service (QoS).
2. Efficiency: It refers to the cost optimization and optimization of the speed of the network.
3. Security: The transfer of data should be secure. Third party forces should never interfere
in the transmission of data.
4. Adaptability: The network must adapt to the changing environment of the enterprise.
5

P2
LAN redundancy is the most crucial part of a network. Suppose you are working on a wireless
connection. If it shuts all your work will be gone which is a major drawback in a network. To
overcome this limitation network redundancy is implemented (Aussie Broadband, 2019). It is the
backbone of a network. It becomes active when the main connections shut down. It keeps your
resources intact and the work is not lost. Switches and Spanning Tree Protocol were used to fix
the issues.
Figure 1 WAN connection with redundancy
Bandwidth provides the transmission speed in the network. The data is transferred to the speed
given by the bandwidth of the network. There are 2 types of approaches which are used provide
bandwidth,
1. Baseband
It uses the frequencies available for the transmission of the data. Ethernet is an example
of this approach.
2. Broadband
Using broadband deals with the division of the bandwidth. The medium used can be fiber
optic or copper cables. The transmission is done over various channels.
There reasons due to which the load happens are mentioned below:
• When there is no count of the packets which are getting transferred.
6
LAN redundancy is the most crucial part of a network. Suppose you are working on a wireless
connection. If it shuts all your work will be gone which is a major drawback in a network. To
overcome this limitation network redundancy is implemented (Aussie Broadband, 2019). It is the
backbone of a network. It becomes active when the main connections shut down. It keeps your
resources intact and the work is not lost. Switches and Spanning Tree Protocol were used to fix
the issues.
Figure 1 WAN connection with redundancy
Bandwidth provides the transmission speed in the network. The data is transferred to the speed
given by the bandwidth of the network. There are 2 types of approaches which are used provide
bandwidth,
1. Baseband
It uses the frequencies available for the transmission of the data. Ethernet is an example
of this approach.
2. Broadband
Using broadband deals with the division of the bandwidth. The medium used can be fiber
optic or copper cables. The transmission is done over various channels.
There reasons due to which the load happens are mentioned below:
• When there is no count of the packets which are getting transferred.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

• When heterogeneous networks try to intervene.
• Congestion
• Delay in the network
7
• Congestion
• Delay in the network
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

M1
VRRP stands for Virtual Router Redundancy protocol. This protocol provides redundancy to the
network. VRRP comes in the network layer. In this protocol, a virtual logical router is created by
grouping many routers (CISCO, 2019). For every host, the virtual logical router is the default
gateway. In case of any failure in any router, another router from the group takes its place and
doesn’t let the traffic to stop. If the authentication schemes are questionable then the virtual
router rejects the packets. There are 3 types of authentication,
1. No Authentication
2. Plain Text Authentication
3. MD5 Authentication
Figure 2 Redundancy in Layer 3
VSRP stands for Virtual Switch Redundancy Protocol. This protocol is based on Ruckus
proprietary protocol. More than one backups are made for a single device. When the main device
fails then the backup takes its place and keeps the data traffic on. You can use it both on layer 2
& layer 3 or you can use it separately. In layer 2, backup is only created for the link and not IP
addresses but in layer 3, both get backed up.
8
VRRP stands for Virtual Router Redundancy protocol. This protocol provides redundancy to the
network. VRRP comes in the network layer. In this protocol, a virtual logical router is created by
grouping many routers (CISCO, 2019). For every host, the virtual logical router is the default
gateway. In case of any failure in any router, another router from the group takes its place and
doesn’t let the traffic to stop. If the authentication schemes are questionable then the virtual
router rejects the packets. There are 3 types of authentication,
1. No Authentication
2. Plain Text Authentication
3. MD5 Authentication
Figure 2 Redundancy in Layer 3
VSRP stands for Virtual Switch Redundancy Protocol. This protocol is based on Ruckus
proprietary protocol. More than one backups are made for a single device. When the main device
fails then the backup takes its place and keeps the data traffic on. You can use it both on layer 2
& layer 3 or you can use it separately. In layer 2, backup is only created for the link and not IP
addresses but in layer 3, both get backed up.
8

LO2
P3
The devices required for establishing network connectivity are as follows:
1. Repeater
It works at the physical layer (GeeksforGeeks, 2019). The fundamental reason for the
repeater is the recovery of the signal before it winds up undermined or feeble over a
similar system.
2. Hub
It is called the home in the network. Various wires which originate from various branches
are connected altogether at the hub.
3. Bridge
It is a kind of repeater which possesses additional function which is used for filtering the
data of MAC address of both the hosts. It works at the data link layer.
4. Switch
It works under the data link layer. It is utilized to check the error before sending the data
which results in the more effective transmission of packets on the exact port.
5. Router
It performs as a switch. The function of the router is to provide routing on the basis of IP
addresses of the data packets.
6. Gateway
It is the medium to connect two networks.
The basic configuration commands used in the network are:
1. host
This configuration command finds the name of the domain of an IP address.
2. ping
This command helps to verify if the connection is stable or not.
3. ipconfig
It is used as a utility command as it performs the task to display the IP address of a
network.
9
P3
The devices required for establishing network connectivity are as follows:
1. Repeater
It works at the physical layer (GeeksforGeeks, 2019). The fundamental reason for the
repeater is the recovery of the signal before it winds up undermined or feeble over a
similar system.
2. Hub
It is called the home in the network. Various wires which originate from various branches
are connected altogether at the hub.
3. Bridge
It is a kind of repeater which possesses additional function which is used for filtering the
data of MAC address of both the hosts. It works at the data link layer.
4. Switch
It works under the data link layer. It is utilized to check the error before sending the data
which results in the more effective transmission of packets on the exact port.
5. Router
It performs as a switch. The function of the router is to provide routing on the basis of IP
addresses of the data packets.
6. Gateway
It is the medium to connect two networks.
The basic configuration commands used in the network are:
1. host
This configuration command finds the name of the domain of an IP address.
2. ping
This command helps to verify if the connection is stable or not.
3. ipconfig
It is used as a utility command as it performs the task to display the IP address of a
network.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4. netstat
It is used to display the TCP connections which are active, which port is listening and
where the port is, the statistics of Ethernet, the table of routing IP, the statistics of IPv4 &
IPv6.
5. tracert
This command is used to see where the network packet is going and how many hops is it
taking to reach the destination.
6. nslookup
It is used to display the information which can used when diagnosing the DNS (Domain
Name System) infrastructure.
7. nbtstat
It is an utility of MS0-DOS which is used to display the statistics of the protocol and the
active TCP/IP connections that are using the NBT.
8. netsh
It is the command to reset the TCP/IP.
10
It is used to display the TCP connections which are active, which port is listening and
where the port is, the statistics of Ethernet, the table of routing IP, the statistics of IPv4 &
IPv6.
5. tracert
This command is used to see where the network packet is going and how many hops is it
taking to reach the destination.
6. nslookup
It is used to display the information which can used when diagnosing the DNS (Domain
Name System) infrastructure.
7. nbtstat
It is an utility of MS0-DOS which is used to display the statistics of the protocol and the
active TCP/IP connections that are using the NBT.
8. netsh
It is the command to reset the TCP/IP.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P4
The implementation of the design is mentioned below:
Figure 3 Design
11
The implementation of the design is mentioned below:
Figure 3 Design
11

M2
VSRP (Virtual Switch Redundancy Protocol) is amongst the Ruckus protocols. This protocol
provides redundancy to any failure happening throughout the seven layers. The protocol is built
on Ruckus Virtual Router Redundancy Protocol Extended (VRRP-E). It is used to create backups
which played a major role in the network. These backups replace the main system if it fails
abruptly (RUCKUS, 2019). It ensures that there is smooth and nonstop forwarding of traffic
without losing any data. The connection starts when the node starts to connect with the peer. The
session is established and the messages about the states are exchanged and their respective
services are registered. Sessions are used for redundancy.
Figure 4 VSRP
12
VSRP (Virtual Switch Redundancy Protocol) is amongst the Ruckus protocols. This protocol
provides redundancy to any failure happening throughout the seven layers. The protocol is built
on Ruckus Virtual Router Redundancy Protocol Extended (VRRP-E). It is used to create backups
which played a major role in the network. These backups replace the main system if it fails
abruptly (RUCKUS, 2019). It ensures that there is smooth and nonstop forwarding of traffic
without losing any data. The connection starts when the node starts to connect with the peer. The
session is established and the messages about the states are exchanged and their respective
services are registered. Sessions are used for redundancy.
Figure 4 VSRP
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 39
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.