Transport Network Design Report: Enterprise Network Design Analysis
VerifiedAdded on 2020/10/22
|24
|5810
|493
Report
AI Summary
This report provides a detailed analysis of transport network design, focusing on the needs of The Sage Group Plc. It begins by exploring various network design models, including the Cisco three-layer model and two-tier designs, along with the features of scalable networks. The report then delves into bandwidth, load, and redundancy issues within LANs, offering solutions at different OSI model layers. It examines router and switch redundancy protocols, such as VRRP and virtual switch redundancy, and their effectiveness. The selection of LAN devices based on requirements and features, alongside the application of configuration commands for network connectivity, is also covered. Furthermore, the report scrutinizes WAN technologies and configures them within an enterprise network solution. Finally, it discusses the deployment of network monitoring tools and troubleshooting methods for establishing network baselines, addressing both LAN and WAN connectivity issues across different networking layers.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Transport Network
Design
Design
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION...........................................................................................................................1
P1 Analyse network design models as well as features of scalable networks with respect to
business needs........................................................................................................................1
P2 Discuss bandwidth, load and redundancy issues within LAN and solution with reference to
layer........................................................................................................................................4
P3 Selection of LAN devices on the basis of requirements and features by application of
configuration commands for network connectivity................................................................4
P4 Implementation of LAN design within Layer 2 and Layer 3 redundancy by making use of
router and switch redundancy protocols.................................................................................6
P5 Scrutiny of WAN technologies and selection of suitable one for a set of enterprise
requirements...........................................................................................................................7
P6 Configure WAN protocols within enterprise network solution........................................9
P7 Deploy network monitoring tools and troubleshooting methods for establishment of
network baselines.................................................................................................................11
P8 Troubleshoot various WAN and LAN connectivity issues within various networking
layers.....................................................................................................................................11
CONCLUSION..............................................................................................................................11
Online...............................................................................................................................................1
Source: Redundancy: Choosing the Right Option for Net Designs. 2019. [Online]. Available
through: <https://www.eetimes.com/document.asp?doc_id=1276954>.........................................1
INTRODUCTION...........................................................................................................................1
P1 Analyse network design models as well as features of scalable networks with respect to
business needs........................................................................................................................1
P2 Discuss bandwidth, load and redundancy issues within LAN and solution with reference to
layer........................................................................................................................................4
P3 Selection of LAN devices on the basis of requirements and features by application of
configuration commands for network connectivity................................................................4
P4 Implementation of LAN design within Layer 2 and Layer 3 redundancy by making use of
router and switch redundancy protocols.................................................................................6
P5 Scrutiny of WAN technologies and selection of suitable one for a set of enterprise
requirements...........................................................................................................................7
P6 Configure WAN protocols within enterprise network solution........................................9
P7 Deploy network monitoring tools and troubleshooting methods for establishment of
network baselines.................................................................................................................11
P8 Troubleshoot various WAN and LAN connectivity issues within various networking
layers.....................................................................................................................................11
CONCLUSION..............................................................................................................................11
Online...............................................................................................................................................1
Source: Redundancy: Choosing the Right Option for Net Designs. 2019. [Online]. Available
through: <https://www.eetimes.com/document.asp?doc_id=1276954>.........................................1


INTRODUCTION
Network refers to a system of unified devices which can interact by using similar
standards which are known as protocol. These devices are responsible for carrying out
communication by exchanging resources such as printers, files, applications and many others.
The network in which end-to-end communication occurs is known as transport network
(Alshamsi and Diabat, 2015). It furnish logical communication among application processes
which runs on hosts in a layered architecture. This report is based on The Sage Group Plc, which
is a limited company and a British multinational enterprise software organisation. It is
headquartered in Newcastle upon Tyne, England. It is one of the largest supplier to small
businesses. This report deals with network design models along with features of scalable
networks. Furthermore, bandwidth, LAN redundancy and load issues within layer 2 and layer 3
of OSI model are evaluated. Along with this features and requirements of LAN devices are
selected and implementation of LAN design has carried out. Apart from this, WAN technologies
are examined and they are configured as enterprise network solution. At last, network monitoring
tools are deployed and connectivity issues at different layers are handled.
P1 Analyse network design models as well as features of scalable networks with respect to
business needs.
Planning of building up a computer network infrastructure is referred to network design.
The designing process is carried out by network engineers, designers, IT administrators and other
staff. It is carried out before the process of execution is carried out (Botton and et. al., 2013). For
this, there are different models, some of them are illustrated below:
Cisco three layer or three-tier hierarchical network model: It divides critical flat
network multiple and manageable networks. Each level within hierarchy focus on particular set
of roles. This model renders The Sage Group Plc. with high degree of flexibility to attain
optimisation and make appropriate selection of feature, software and hardware. This comprises
of access layer, distribution layer and core layer. These layers are specified below:
Core layer: It renders optimum transport between high-performance and sites during
routing. This layer act as a backbone in high speed switch (Bovy and Stern, 2012). This creates
relevant impact on performance as each frame must be recreated as they passes via a each router.
1
Network refers to a system of unified devices which can interact by using similar
standards which are known as protocol. These devices are responsible for carrying out
communication by exchanging resources such as printers, files, applications and many others.
The network in which end-to-end communication occurs is known as transport network
(Alshamsi and Diabat, 2015). It furnish logical communication among application processes
which runs on hosts in a layered architecture. This report is based on The Sage Group Plc, which
is a limited company and a British multinational enterprise software organisation. It is
headquartered in Newcastle upon Tyne, England. It is one of the largest supplier to small
businesses. This report deals with network design models along with features of scalable
networks. Furthermore, bandwidth, LAN redundancy and load issues within layer 2 and layer 3
of OSI model are evaluated. Along with this features and requirements of LAN devices are
selected and implementation of LAN design has carried out. Apart from this, WAN technologies
are examined and they are configured as enterprise network solution. At last, network monitoring
tools are deployed and connectivity issues at different layers are handled.
P1 Analyse network design models as well as features of scalable networks with respect to
business needs.
Planning of building up a computer network infrastructure is referred to network design.
The designing process is carried out by network engineers, designers, IT administrators and other
staff. It is carried out before the process of execution is carried out (Botton and et. al., 2013). For
this, there are different models, some of them are illustrated below:
Cisco three layer or three-tier hierarchical network model: It divides critical flat
network multiple and manageable networks. Each level within hierarchy focus on particular set
of roles. This model renders The Sage Group Plc. with high degree of flexibility to attain
optimisation and make appropriate selection of feature, software and hardware. This comprises
of access layer, distribution layer and core layer. These layers are specified below:
Core layer: It renders optimum transport between high-performance and sites during
routing. This layer act as a backbone in high speed switch (Bovy and Stern, 2012). This creates
relevant impact on performance as each frame must be recreated as they passes via a each router.
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

This layer is fastest, biggest and most expensive router which is used to integrate geographically
separated network.
Distribution layer: This layer is present in between core and access layer. The purpose
behind this layer is to furnish boundary definition by execution of accessing lists as well as other
filters. This layer defines the policies for the transmissions within network which comprises of
high end layer 3 switches (De Rosa and et. al, 2013).
Access layer: This contains access which which are connected with end devices which
can be printers, servers or computers. This layer makes sure that packets are effectively
transferred to end devices (Demuth and et. al, 2014).
Two-tier design model: It is appropriate for small to medium sized campus networks in
which distribution as well as core functions are combined into a single layer. This is referred to
as collapsed core-distribution architecture. This model shares various characteristics with partial
mesh model, but there are certain additional benefits. This model is used within metropolitan
settings in which cost is reduced but still some redundancy exists (Farahani and et. al, 2013).
2
separated network.
Distribution layer: This layer is present in between core and access layer. The purpose
behind this layer is to furnish boundary definition by execution of accessing lists as well as other
filters. This layer defines the policies for the transmissions within network which comprises of
high end layer 3 switches (De Rosa and et. al, 2013).
Access layer: This contains access which which are connected with end devices which
can be printers, servers or computers. This layer makes sure that packets are effectively
transferred to end devices (Demuth and et. al, 2014).
Two-tier design model: It is appropriate for small to medium sized campus networks in
which distribution as well as core functions are combined into a single layer. This is referred to
as collapsed core-distribution architecture. This model shares various characteristics with partial
mesh model, but there are certain additional benefits. This model is used within metropolitan
settings in which cost is reduced but still some redundancy exists (Farahani and et. al, 2013).
2

Features of scalable network: Internetwork provides unique features, every scalable
network possess essential attributes in common (Govindan, Fattahi and Keyvanshokooh, 2017).
They are illustrated below:
Reliable and available: This network can be grown up without creating an impact on
existing users. They are suitable for modular devices as they are reliable due to which
these networks allow expansion.
Responsive: A responsive network renders high quality services for different protocols
as well as applications without creating worst response for systems. The internetwork
needs to be capable for responding for issues related with latency which are very
common in system network architecture (SNA) traffic but still scalable network routes
the packets without creating any kind of impact on QoS.
Efficient: Large internetwork needs to use the nominal resources, basically this includes
bandwidth. It is affirm able to enhance data without buying WAN services or any kind of
hardware. For this, it is necessary to optimise the redundant broadcasts, routing updates
and service location requests (Keyvanshokooh, Ryan and Kabir, 2016).
Adaptable: They include various protocols, hardware technologies and applications
which makes it easy for the user.
3
network possess essential attributes in common (Govindan, Fattahi and Keyvanshokooh, 2017).
They are illustrated below:
Reliable and available: This network can be grown up without creating an impact on
existing users. They are suitable for modular devices as they are reliable due to which
these networks allow expansion.
Responsive: A responsive network renders high quality services for different protocols
as well as applications without creating worst response for systems. The internetwork
needs to be capable for responding for issues related with latency which are very
common in system network architecture (SNA) traffic but still scalable network routes
the packets without creating any kind of impact on QoS.
Efficient: Large internetwork needs to use the nominal resources, basically this includes
bandwidth. It is affirm able to enhance data without buying WAN services or any kind of
hardware. For this, it is necessary to optimise the redundant broadcasts, routing updates
and service location requests (Keyvanshokooh, Ryan and Kabir, 2016).
Adaptable: They include various protocols, hardware technologies and applications
which makes it easy for the user.
3

Accessible but secure: This network enables multiple connections by making use of
switched services, dial up and dedicated services while maintaining the integrity of
network (Kim, 2014).
Rich set of features are provided by The CISCO IOS which renders network scalability.
Above the major features of scalable network are provided which helps people to make
optimum use of bandwidth without influencing quality of services.
P2 Discuss bandwidth, load and redundancy issues within LAN and solution with reference to
layer.
Network redundancy refers to process by which alternate or additional instances of
equipments, communication mediums and instances of network devices are installed within
network infrastructure. It ensures the availability of network devices if path fails and is
unavailable. Basically, it provides a backup if any networking devices fails.
LAN redundancy: It allows two physical network connections among client and server to
be used within networking and aids in rendering network path for the identical process data. If
connection over single network path is lost then network automatically fails in other paths
(Larsen and Urry, 2016).
Data link layer establish node to node delivery of the packets. In this case, it is ensured
that data transfer is error free. The most common scheme for network-level redundancy within
Ethernet switches is making use of multiple links among switches. When primary switch fails,
then the switches operating in parallel can take over. But this can lead to loops. For this one
switch can be disabled when normal operations are being carried out and it takes over when other
fails. IEEE 802.1D standard specifies STP (Spanning tree protocol) for implementation of
avoidance of loops as well as redundancy. This protocol provides faster recovery from failures.
Network layer works for transmitting data from one host to the other within various networks.
This layer ensures that packets are being transferred from shortest path and number of routes are
available (Mahaboob Sheriff, Gunasekaran and Nachiappan, 2012). Resiliency and redundancy
are built up in this layer via usage of routing protocols. RIP (Routing information protocol) or
OSPF (Open shortest path first) protocols recover a network from failure through recalculations
of routes to destinations which were reached by failed link. Traffic can be forwarded after
4
switched services, dial up and dedicated services while maintaining the integrity of
network (Kim, 2014).
Rich set of features are provided by The CISCO IOS which renders network scalability.
Above the major features of scalable network are provided which helps people to make
optimum use of bandwidth without influencing quality of services.
P2 Discuss bandwidth, load and redundancy issues within LAN and solution with reference to
layer.
Network redundancy refers to process by which alternate or additional instances of
equipments, communication mediums and instances of network devices are installed within
network infrastructure. It ensures the availability of network devices if path fails and is
unavailable. Basically, it provides a backup if any networking devices fails.
LAN redundancy: It allows two physical network connections among client and server to
be used within networking and aids in rendering network path for the identical process data. If
connection over single network path is lost then network automatically fails in other paths
(Larsen and Urry, 2016).
Data link layer establish node to node delivery of the packets. In this case, it is ensured
that data transfer is error free. The most common scheme for network-level redundancy within
Ethernet switches is making use of multiple links among switches. When primary switch fails,
then the switches operating in parallel can take over. But this can lead to loops. For this one
switch can be disabled when normal operations are being carried out and it takes over when other
fails. IEEE 802.1D standard specifies STP (Spanning tree protocol) for implementation of
avoidance of loops as well as redundancy. This protocol provides faster recovery from failures.
Network layer works for transmitting data from one host to the other within various networks.
This layer ensures that packets are being transferred from shortest path and number of routes are
available (Mahaboob Sheriff, Gunasekaran and Nachiappan, 2012). Resiliency and redundancy
are built up in this layer via usage of routing protocols. RIP (Routing information protocol) or
OSPF (Open shortest path first) protocols recover a network from failure through recalculations
of routes to destinations which were reached by failed link. Traffic can be forwarded after
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

routing tables were recalculated. BY this packets will resume flow between destination and
source after recovery (Mulder and Dekker, 2014). The layer 3 switch can make use of alternative
forwarding path. OSPF provide equal-cost multipath routing like forwarding packet over various
paths to same destination as long as cost associated with this same. During the normal
operations, routing protocols do not allow alternate routes.
5
source after recovery (Mulder and Dekker, 2014). The layer 3 switch can make use of alternative
forwarding path. OSPF provide equal-cost multipath routing like forwarding packet over various
paths to same destination as long as cost associated with this same. During the normal
operations, routing protocols do not allow alternate routes.
5

M1 Analysis of router and switch redundancy protocols along with their effectiveness in scalable
network.
Router redundancy protocols renders automated allocation of accessible IP (Internet
Protocol) routers to active hosts. They enhances reliability as well as availability of routing paths
through default gateway selection within IP subnetwork. VRRP (Virtual router redundancy
protocol) can be utilised for creating virtual routers in which multiple routers are represented,
they are backup and master routers which acts as a group. Basically, VRRP is open standard
protocol which is being utilised to furnish redundancy within a network. An example can be
taken to understand this concept, suppose if physical router who is routing packets (in lieu of
virtual router) fails then other physical router will automatically replace them. With respect to
scalability when a device fails then other device will start working this means that work will not
be hampered. Along with this, it will also provide scalability as various devices can be attached
with router.
Virtual switch redundancy protocols is a proprietary tool which furnish redundancy along
with sub-second failover within layer 3 and layer 2 mesh topologies. These devices provides
more backup space for systems. Suppose if any of the working devices becomes unavailable then
the backup can be utilised for furnishing services over active device and keep on forwarding
traffic within a network. Scalability in this aspect is also applicable as there are different
switches which can be used to automatically when anyone of physical devices fails. They
provide backup services and becomes new master along with this all VRID VLAN ports are set
to blocking state.
P3 Selection of LAN devices on the basis of requirements and features by application of
configuration commands for network connectivity.
The requirements of The Sage Group Plc are illustrated below:
Department Devices
IT 5 Computers
Finance 9 Desktop
Design 40 Computers
Sales 65 PC's
network.
Router redundancy protocols renders automated allocation of accessible IP (Internet
Protocol) routers to active hosts. They enhances reliability as well as availability of routing paths
through default gateway selection within IP subnetwork. VRRP (Virtual router redundancy
protocol) can be utilised for creating virtual routers in which multiple routers are represented,
they are backup and master routers which acts as a group. Basically, VRRP is open standard
protocol which is being utilised to furnish redundancy within a network. An example can be
taken to understand this concept, suppose if physical router who is routing packets (in lieu of
virtual router) fails then other physical router will automatically replace them. With respect to
scalability when a device fails then other device will start working this means that work will not
be hampered. Along with this, it will also provide scalability as various devices can be attached
with router.
Virtual switch redundancy protocols is a proprietary tool which furnish redundancy along
with sub-second failover within layer 3 and layer 2 mesh topologies. These devices provides
more backup space for systems. Suppose if any of the working devices becomes unavailable then
the backup can be utilised for furnishing services over active device and keep on forwarding
traffic within a network. Scalability in this aspect is also applicable as there are different
switches which can be used to automatically when anyone of physical devices fails. They
provide backup services and becomes new master along with this all VRID VLAN ports are set
to blocking state.
P3 Selection of LAN devices on the basis of requirements and features by application of
configuration commands for network connectivity.
The requirements of The Sage Group Plc are illustrated below:
Department Devices
IT 5 Computers
Finance 9 Desktop
Design 40 Computers
Sales 65 PC's

Servers (DNS, web, email and file) 4 Servers
Each of these departments have a printer. The private address which will be used by The Sage
Group Plc is 192.168.1.0/24 and for other branches IP address is 192.168.168.0/24. Apart from
this, WAN link IP address is 30.40.50.168/28.
To meet these demands switch and router can be used. Switch is a data link layer device
with a multi port bridge which have a buffer and design which enhance its efficiency and
performance (Özkır and Başlıgıl, 2012). It will also carry out error checking before data is being
sent. Router, routes packets depending upon IP addresses. Router can be used for connecting
WAN and LAN, as well as routing table is updated by which decisions can made with respect to
routing of data packets.
Configuration commands for network connectivity: Computers within The Sage Group Plc are
within network and requests are sent in form of packets from host to destination (Sansò and
Soriano, 2012). For this there are various network configuration commands they are illustrated
below:
I. Packet internet groper (Ping): This make sure that computer can interact with a peculiar
device within a network (Simmons, 2014). This command renders details like number of packets
transmitted, received and time taken by packet to return. Example
a. For ensuring network connection
ping 192.168.1.21
This will ensure that this IP address is connected with network or not.
b. Measure time taken by packets
ping google.com
This will measure the time taken by packets for returning to find out speed of connection.
ii. nslookup: It is a network administration command line tool which is used for querying DNS
to attain IP address mapping. Like
nslookup facebook.com
This command will send query to DNS to fetch domain name from DNS records and IP
address for the same.
iii. traceroute: This command gives the route of packet and is used to identify path in which
packets travel. Example
2
Each of these departments have a printer. The private address which will be used by The Sage
Group Plc is 192.168.1.0/24 and for other branches IP address is 192.168.168.0/24. Apart from
this, WAN link IP address is 30.40.50.168/28.
To meet these demands switch and router can be used. Switch is a data link layer device
with a multi port bridge which have a buffer and design which enhance its efficiency and
performance (Özkır and Başlıgıl, 2012). It will also carry out error checking before data is being
sent. Router, routes packets depending upon IP addresses. Router can be used for connecting
WAN and LAN, as well as routing table is updated by which decisions can made with respect to
routing of data packets.
Configuration commands for network connectivity: Computers within The Sage Group Plc are
within network and requests are sent in form of packets from host to destination (Sansò and
Soriano, 2012). For this there are various network configuration commands they are illustrated
below:
I. Packet internet groper (Ping): This make sure that computer can interact with a peculiar
device within a network (Simmons, 2014). This command renders details like number of packets
transmitted, received and time taken by packet to return. Example
a. For ensuring network connection
ping 192.168.1.21
This will ensure that this IP address is connected with network or not.
b. Measure time taken by packets
ping google.com
This will measure the time taken by packets for returning to find out speed of connection.
ii. nslookup: It is a network administration command line tool which is used for querying DNS
to attain IP address mapping. Like
nslookup facebook.com
This command will send query to DNS to fetch domain name from DNS records and IP
address for the same.
iii. traceroute: This command gives the route of packet and is used to identify path in which
packets travel. Example
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

traceroute www.google.com
This will return number of hops taken to reach at destination, gives list of hosts by which
packets travel to the destination.
iv. netstat: Network statistics display the routing table , status of ports, connection information,
etc. Example
netstat
It will display content of files defined within linux file system.
v. Arp: Address resolution protocol displays and modify cache which includes IP address
mapping to MAC address (Soleimani and Govindan, 2014). Example
arp
This will return the MAC address which is related with an IP address.
P4 Implementation of LAN design within Layer 2 and Layer 3 redundancy by making use of
router and switch redundancy protocols.
Layer 2: Data link layer establish node to node delivery of the packets. In this case, it is
ensured that data transfer is error free. The most common scheme for network-level redundancy
within Ethernet switches is making use of multiple links among switches (Szigeti and et. al,
2013). When primary switch fails, then the switches operating in parallel can take over. But this
can lead to loops. For this one switch can be disabled when normal operations are being carried
out and it takes over when other fails. IEEE 802.1D standard specifies STP (Spanning tree
protocol) for implementation of avoidance of loops as well as redundancy. This protocol
provides faster recovery from failures (Source: Redundancy: Choosing the Right Option for Net
Designs, 2019).
.
3
This will return number of hops taken to reach at destination, gives list of hosts by which
packets travel to the destination.
iv. netstat: Network statistics display the routing table , status of ports, connection information,
etc. Example
netstat
It will display content of files defined within linux file system.
v. Arp: Address resolution protocol displays and modify cache which includes IP address
mapping to MAC address (Soleimani and Govindan, 2014). Example
arp
This will return the MAC address which is related with an IP address.
P4 Implementation of LAN design within Layer 2 and Layer 3 redundancy by making use of
router and switch redundancy protocols.
Layer 2: Data link layer establish node to node delivery of the packets. In this case, it is
ensured that data transfer is error free. The most common scheme for network-level redundancy
within Ethernet switches is making use of multiple links among switches (Szigeti and et. al,
2013). When primary switch fails, then the switches operating in parallel can take over. But this
can lead to loops. For this one switch can be disabled when normal operations are being carried
out and it takes over when other fails. IEEE 802.1D standard specifies STP (Spanning tree
protocol) for implementation of avoidance of loops as well as redundancy. This protocol
provides faster recovery from failures (Source: Redundancy: Choosing the Right Option for Net
Designs, 2019).
.
3

(Source: Redundancy: Choosing the Right Option for Net Designs, 2019)
Layer 3: Network layer works for transmitting data from one host to the other within
various networks. This layer ensures that packets are being transferred from shortest path and
number of routes are available (Talaei and et. al, 2016). Resiliency and redundancy are built up
in this layer via usage of routing protocols. RIP (Routing information protocol) or OSPF (Open
shortest path first) protocols recover a network from failure through recalculations of routes to
destinations which were reached by failed link. Traffic can be forwarded after routing tables
were recalculated. BY this packets will resume flow between destination and source after
recovery (Yan and et. al, 2013).
4
Illustration 1: Link aggregation scheme
Layer 3: Network layer works for transmitting data from one host to the other within
various networks. This layer ensures that packets are being transferred from shortest path and
number of routes are available (Talaei and et. al, 2016). Resiliency and redundancy are built up
in this layer via usage of routing protocols. RIP (Routing information protocol) or OSPF (Open
shortest path first) protocols recover a network from failure through recalculations of routes to
destinations which were reached by failed link. Traffic can be forwarded after routing tables
were recalculated. BY this packets will resume flow between destination and source after
recovery (Yan and et. al, 2013).
4
Illustration 1: Link aggregation scheme

(Source: Redundancy: Choosing the Right Option for Net Designs, 2019)
The layer 3 switch can make use of alternative forwarding path. During the normal
operations, routing protocols do not allow alternate routes. OSPF provides equal-cost multipath
routing like forwarding packet over various paths to same destination as long as cost associated
with this same (Alshamsi and Diabat, 2015). The design of LAN has been provided below:
5
Illustrati
on 2: Network with multiple paths between routes
The layer 3 switch can make use of alternative forwarding path. During the normal
operations, routing protocols do not allow alternate routes. OSPF provides equal-cost multipath
routing like forwarding packet over various paths to same destination as long as cost associated
with this same (Alshamsi and Diabat, 2015). The design of LAN has been provided below:
5
Illustrati
on 2: Network with multiple paths between routes
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

M2 Synthesis of switch redundancy protocols with their effectiveness for handling scalable
networks.
VSRP (Virtual Switch Redundancy Protocol) is a proprietary network resilience protocol
which renders redundancy as well as sub-second failover within Layer 3 and 2 in mesh
topologies. This means that backup is created for both the layers. In this case backup is created
but it is for peculiar IP addresses only. Along with this, CARP (Common Address Redundancy
Protocol) is a protocol through which various hosts on LAN shares set of IP addresses. The
major purpose of this is to render failover redundancy when its is utilised with routers as well as
firewalls. Similarly, there are different protocols which are being used with switch for providing
the feature of scalability even if any of the devices fails. They acts a backup devices which are
automatically assigned while scaling the network means adding more devices in it or if any of
them stops working. They are effective to handle the scalability of networks as by these
protocols and switches network can be extended as per requirement of any organisation. But
there are certain limitations or there are higher chances of failure for this virtual switches are
being used.
6
networks.
VSRP (Virtual Switch Redundancy Protocol) is a proprietary network resilience protocol
which renders redundancy as well as sub-second failover within Layer 3 and 2 in mesh
topologies. This means that backup is created for both the layers. In this case backup is created
but it is for peculiar IP addresses only. Along with this, CARP (Common Address Redundancy
Protocol) is a protocol through which various hosts on LAN shares set of IP addresses. The
major purpose of this is to render failover redundancy when its is utilised with routers as well as
firewalls. Similarly, there are different protocols which are being used with switch for providing
the feature of scalability even if any of the devices fails. They acts a backup devices which are
automatically assigned while scaling the network means adding more devices in it or if any of
them stops working. They are effective to handle the scalability of networks as by these
protocols and switches network can be extended as per requirement of any organisation. But
there are certain limitations or there are higher chances of failure for this virtual switches are
being used.
6

M3 Analysis of Layer 3 redundancy implementation within IPv6 and Ipv4.
Hot Standby Router Protocol (HSRP) is a protocol which is within Layer 3 which allows
multilayer switches or routers to look as a identical gateway IP address. There are protocols
which can be used for providing redundancy such as gateway load balancing protocol and virtual
router redundancy protocol. Virtual router redundancy protocol (VRRP) is designed for
eliminating a single point failure within a static default routed environment. An election protocol
is specified by VRRP which dynamically depute responsibilities for a virtual router for a
peculiar VRRP router within a LAN. VRRP router controls the Ipv4 address which is linked with
virtual router which known as master that sends packets to these Ipv4 addresses. The dynamic
failover is provided while sending responsibilities of Master becomes unavailable. The first hop
router within a LAN can make use of any of the virtual router's Ipv4 address.
Ipv6 hosts within a LAN acknowledge routers by receiving router advertisement which is
being sent by making use of Ipv6 ND (Neighbour Discovery) protocol. They multicast router
advertisements periodically at a rate at which hosts will address default routers. ND identifies
failure of neighbouring node that can be either host or a node while forwarding path to
neighbour. The VRRP for Ipv6 renders faster switch-over for an alternative default router which
can be attained by making use of standards and specified procedures.
P5 Scrutiny of WAN technologies and selection of suitable one for a set of enterprise
requirements.
Wide area network (WAN) is a communication network which covers a wide geographic
area like across countries, states or cities. They can be either private to link parts of business or
public to tie in networks together. There are different WAN technologies which provides
different benefits and depending upon the requirement of The Sage Group Plc or any other
organisation any specific technology can be used. They are illustrated below:
1. Asynchronous transfer mode (ATM): It is a technology which is capable of
transmitting video, voice and data via public and private networks (Botton and et. al.,
2013). It makes use of asynchronous time division multiplexing for encoding data into
fixed sized and small cells which makes use of 53 byte cells (5 bytes for header and 48
bytes for data). Data transfer speeds can be over around 600 Mbps.
ii. Frame relay (FR): It is a high speed packet switched data communication service which
is widely used for connecting LAN-to-LAN interconnect services and is widely suitable
7
Hot Standby Router Protocol (HSRP) is a protocol which is within Layer 3 which allows
multilayer switches or routers to look as a identical gateway IP address. There are protocols
which can be used for providing redundancy such as gateway load balancing protocol and virtual
router redundancy protocol. Virtual router redundancy protocol (VRRP) is designed for
eliminating a single point failure within a static default routed environment. An election protocol
is specified by VRRP which dynamically depute responsibilities for a virtual router for a
peculiar VRRP router within a LAN. VRRP router controls the Ipv4 address which is linked with
virtual router which known as master that sends packets to these Ipv4 addresses. The dynamic
failover is provided while sending responsibilities of Master becomes unavailable. The first hop
router within a LAN can make use of any of the virtual router's Ipv4 address.
Ipv6 hosts within a LAN acknowledge routers by receiving router advertisement which is
being sent by making use of Ipv6 ND (Neighbour Discovery) protocol. They multicast router
advertisements periodically at a rate at which hosts will address default routers. ND identifies
failure of neighbouring node that can be either host or a node while forwarding path to
neighbour. The VRRP for Ipv6 renders faster switch-over for an alternative default router which
can be attained by making use of standards and specified procedures.
P5 Scrutiny of WAN technologies and selection of suitable one for a set of enterprise
requirements.
Wide area network (WAN) is a communication network which covers a wide geographic
area like across countries, states or cities. They can be either private to link parts of business or
public to tie in networks together. There are different WAN technologies which provides
different benefits and depending upon the requirement of The Sage Group Plc or any other
organisation any specific technology can be used. They are illustrated below:
1. Asynchronous transfer mode (ATM): It is a technology which is capable of
transmitting video, voice and data via public and private networks (Botton and et. al.,
2013). It makes use of asynchronous time division multiplexing for encoding data into
fixed sized and small cells which makes use of 53 byte cells (5 bytes for header and 48
bytes for data). Data transfer speeds can be over around 600 Mbps.
ii. Frame relay (FR): It is a high speed packet switched data communication service which
is widely used for connecting LAN-to-LAN interconnect services and is widely suitable
7

for LAN environments. The data is transmitted across WAN's with a high speed which
ranges from 1.544 Mbps to 44.376 Mbps. Frame relay can detects errors within data link
layer but error or flow is not controlled.
iii. Synchronous Optical Network (SDH/SONET): It is an international standard which is
used for high speed communication over fiber-optic networks by making use of light
emitting diodes or lasers. They provide high bandwidth for carrying data and voice traffic
with base rate of 51 Mbps (Wide Area Network Technologies-Design and Implement
High-Quality WAN Networks, 2019).
iv. X.25: This protocol allows systems on various public networks to interact via an
intermediary computer at network layer. It renders a shared variable capacity along with
low bit rate which may either be permanent or switched. It is comprises of packet
switching exchange nodes as networking hardware, ISDN connections or plain old
telephone service connection and leased lines. It controls retransmission of bad packets
and error control.
v. Multi-protocol label switching (MPLS): It is routing technique within
telecommunication network which sends data from one node to other via a short path
labels rather than making use of long network addresses. This will assist organisation to
obviate speeding traffic flows as well as critical lookups into routing table. This provides
with network scalability as well as efficiency.
vi. Point-to-point link (PPP): It provides a pre-established and single WAN communication
path from premises of customer via a carrier network like from telephone company to
remote network. They are normally leased from a carrier and are known as leased lines.
In this, carrier is responsible for allocation of pairs of wires and the facilities are provided
for specific line only. It will provide both employees as well as customers with enhanced
up-time by providing the frames or packets an alternative path (Bovy and Stern, 2012). It
furnish improvised bandwidth utilisation by allowing various traffic types to traverse
within the network. By utilisation of optimum paths for traffic, congestion (blockage or
delay in services) can be avoided. It will also provide enhanced experience to end users.
The Sage Group Plc can make use of multi-protocol label switching as there is very low
packet loss as compared to other technologies. Internal BGP internet routing may provide
8
ranges from 1.544 Mbps to 44.376 Mbps. Frame relay can detects errors within data link
layer but error or flow is not controlled.
iii. Synchronous Optical Network (SDH/SONET): It is an international standard which is
used for high speed communication over fiber-optic networks by making use of light
emitting diodes or lasers. They provide high bandwidth for carrying data and voice traffic
with base rate of 51 Mbps (Wide Area Network Technologies-Design and Implement
High-Quality WAN Networks, 2019).
iv. X.25: This protocol allows systems on various public networks to interact via an
intermediary computer at network layer. It renders a shared variable capacity along with
low bit rate which may either be permanent or switched. It is comprises of packet
switching exchange nodes as networking hardware, ISDN connections or plain old
telephone service connection and leased lines. It controls retransmission of bad packets
and error control.
v. Multi-protocol label switching (MPLS): It is routing technique within
telecommunication network which sends data from one node to other via a short path
labels rather than making use of long network addresses. This will assist organisation to
obviate speeding traffic flows as well as critical lookups into routing table. This provides
with network scalability as well as efficiency.
vi. Point-to-point link (PPP): It provides a pre-established and single WAN communication
path from premises of customer via a carrier network like from telephone company to
remote network. They are normally leased from a carrier and are known as leased lines.
In this, carrier is responsible for allocation of pairs of wires and the facilities are provided
for specific line only. It will provide both employees as well as customers with enhanced
up-time by providing the frames or packets an alternative path (Bovy and Stern, 2012). It
furnish improvised bandwidth utilisation by allowing various traffic types to traverse
within the network. By utilisation of optimum paths for traffic, congestion (blockage or
delay in services) can be avoided. It will also provide enhanced experience to end users.
The Sage Group Plc can make use of multi-protocol label switching as there is very low
packet loss as compared to other technologies. Internal BGP internet routing may provide
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

internet connections at different sites and sends internet traffic through MPLS networks to both
connections simultaneously. It will assist to handle load and will reduce chances of downtime
(De Rosa and et. al, 2013). It will also provide a single firewall which will handle entire traffic
within a network from each site. It provides cost advantage as well as scalability and additional
security which makes it appropriate to be used within The Sage Group Plc.
P6 Configure WAN protocols within enterprise network solution.
Enterprise network refers to backbone of communication within enterprise's which assist
in establishing connection between devices as well as computers across workgroup networks,
departments, data accessibility and facilitating insight. The purpose of this is to obviate isolated
users and provide a medium by which information can be provided as well as retrieved.
High-Level Data Link Control (HDLC): It is a synchronous data link layer protocol
which is bit oriented. It is a layer 2 protocol used for connecting point to point serial devices.
This will provide The Sage Group Plc with minimum amount of configuration for connecting
two locations. It provides encapsulation of data without making use of protocols for this and
supports both asynchronous as well as synchronous links (Demuth and et. al, 2014).
Configuration of HDLC:
I. Network requirements:
Router A and router B are connected with HDLC enabled by a means of POS ports.
POS 0/0 within router A borrows IP address of the local loopback interface and is
masked with 32 bit.
Router A is configured with usage of static routes to Router B and can reach
192.168.168.0/24.
ii. Configuration procedure:
a. Configure Router A
<Router A> system-view
[Router A] interface loopback 1
[RouterA-LoopBack1] ip address 192.168.168. 11 21
[RouterA-LoopBack1] quit
[Router A] interface pos 0/0
[RouterA-Pos0/0] link-protocol hdlc
[RouterA-Pos0/0] ip address unnumbered interface loopback 1
9
connections simultaneously. It will assist to handle load and will reduce chances of downtime
(De Rosa and et. al, 2013). It will also provide a single firewall which will handle entire traffic
within a network from each site. It provides cost advantage as well as scalability and additional
security which makes it appropriate to be used within The Sage Group Plc.
P6 Configure WAN protocols within enterprise network solution.
Enterprise network refers to backbone of communication within enterprise's which assist
in establishing connection between devices as well as computers across workgroup networks,
departments, data accessibility and facilitating insight. The purpose of this is to obviate isolated
users and provide a medium by which information can be provided as well as retrieved.
High-Level Data Link Control (HDLC): It is a synchronous data link layer protocol
which is bit oriented. It is a layer 2 protocol used for connecting point to point serial devices.
This will provide The Sage Group Plc with minimum amount of configuration for connecting
two locations. It provides encapsulation of data without making use of protocols for this and
supports both asynchronous as well as synchronous links (Demuth and et. al, 2014).
Configuration of HDLC:
I. Network requirements:
Router A and router B are connected with HDLC enabled by a means of POS ports.
POS 0/0 within router A borrows IP address of the local loopback interface and is
masked with 32 bit.
Router A is configured with usage of static routes to Router B and can reach
192.168.168.0/24.
ii. Configuration procedure:
a. Configure Router A
<Router A> system-view
[Router A] interface loopback 1
[RouterA-LoopBack1] ip address 192.168.168. 11 21
[RouterA-LoopBack1] quit
[Router A] interface pos 0/0
[RouterA-Pos0/0] link-protocol hdlc
[RouterA-Pos0/0] ip address unnumbered interface loopback 1
9

[RouterA-Pos0/0] quit
b. Configure Router B
<Router B> system-view
[Router B] interface pos 0/0
[RouterB-Pos0/0] link-protocol hdlc
[Router B-Pos0/0] ip address 192.168.168. 11 22
c. Configure static routes on Router A
[Router A] ip route-static 192.168.167. 0 24 pos 0/0
[Router A] ip route-static 192.168.168. 0 24 192.168.167.1
Execute display ip routing-table on Router A to view a routing table
[Router A] display ip routing-table
Routing tables: Public
Suppose The Sage Group Plc needs to send message to 5 destinations via 5 routes.
Destination/ Mask Proto Pre Cost NextHop Interface
192.168.168.0/24 Static 60 0 192.168.168.2 Pos 0/0
192.168.168.2/32 Direct 0 0 127.0.0.1 InLoop0
192.168.2.0/24 Static 60 0 192.168.168.1 Pos0/0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0
It is implemented as:
10
b. Configure Router B
<Router B> system-view
[Router B] interface pos 0/0
[RouterB-Pos0/0] link-protocol hdlc
[Router B-Pos0/0] ip address 192.168.168. 11 22
c. Configure static routes on Router A
[Router A] ip route-static 192.168.167. 0 24 pos 0/0
[Router A] ip route-static 192.168.168. 0 24 192.168.167.1
Execute display ip routing-table on Router A to view a routing table
[Router A] display ip routing-table
Routing tables: Public
Suppose The Sage Group Plc needs to send message to 5 destinations via 5 routes.
Destination/ Mask Proto Pre Cost NextHop Interface
192.168.168.0/24 Static 60 0 192.168.168.2 Pos 0/0
192.168.168.2/32 Direct 0 0 127.0.0.1 InLoop0
192.168.2.0/24 Static 60 0 192.168.168.1 Pos0/0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0
It is implemented as:
10

11
Illustration 4: WAN Design
Illustration 4: WAN Design
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

M4 Explicate benefits and drawbacks associated with public as well as private WAN
technologies.
They are illustrated below:
Benefits of Public WAN:
These networks are accessible easily and are available everywhere along with this, they
are inexpensive. The technologies which are used to configure within public networks can be managed
easily as well as they can be implemented quickly.
Drawbacks of Public WAN:
In this aspect, security is compromised as well as disconnection occurs which affects the
rate of transmission. Failures of internet are experienced commonly which affects reliability of network very
quickly.
Benefits of Private WAN:
In context of this, security can never be compromised and it is not an issue. These networks provide entire managed and controlled solution for meeting the
communication requirements of an organisation.
12
Illustration 5: WAN Design
technologies.
They are illustrated below:
Benefits of Public WAN:
These networks are accessible easily and are available everywhere along with this, they
are inexpensive. The technologies which are used to configure within public networks can be managed
easily as well as they can be implemented quickly.
Drawbacks of Public WAN:
In this aspect, security is compromised as well as disconnection occurs which affects the
rate of transmission. Failures of internet are experienced commonly which affects reliability of network very
quickly.
Benefits of Private WAN:
In context of this, security can never be compromised and it is not an issue. These networks provide entire managed and controlled solution for meeting the
communication requirements of an organisation.
12
Illustration 5: WAN Design

Drawbacks Private WAN:
These networks are costly as compared PSTN which are available at very minimal rate
along with this more administrative control within public network is required.
Complexity of network goes on increasing when network expands and specialised
employees are required for managing them.
M5 Assess features along with benefits of various VPN types with respect to organisational
needs.
Benefits of virtual private network types are illustrated below:
Enhanced security is provided when a network is connected via a VPN, in this case data
is encrypted which leads to security.
The major benefit is that data can be accessed remotely which leads to enhanced
productivity of organisation.
By making use of VPN web can be browsed completely within anonymity which leads
individual to have complete access to websites and web applications.
P7 Deploy network monitoring tools and troubleshooting methods for establishment of network
baselines.
There are various network monitoring tools which can be used by The Sage Group Plc.
SolarWinds Network Performance Monitor can be used by them to track network elements by
making use of centralised dashboard and SNMP. This tool runs an auto-discovery feature which
locates devices manually on network and maps them on system. This will obviate the need to
spend time manually and network devices are linked with central console. Furthermore, it
provides wide range of visual features such as maps, pie charts and warnings to enable network
engineer to have glimpse of network performance. Network baseline refers to act of rating and
measuring performance of a network within real time situations (Farahani and et. al, 2013).
M6 Develop effectual documentation of troubleshooting steps and methods depending upon
scenario.
As per the requirements of The Sage Group Plc, they are looking forward to design a
network for 4 different departments. They are 5 systems in IT, 9 systems within Finance, 40
computers in design and 65 computers in sales department along with this a printer is connected
to each department and there are 4 servers. Connectivity is done by making use of 7 switches
13
These networks are costly as compared PSTN which are available at very minimal rate
along with this more administrative control within public network is required.
Complexity of network goes on increasing when network expands and specialised
employees are required for managing them.
M5 Assess features along with benefits of various VPN types with respect to organisational
needs.
Benefits of virtual private network types are illustrated below:
Enhanced security is provided when a network is connected via a VPN, in this case data
is encrypted which leads to security.
The major benefit is that data can be accessed remotely which leads to enhanced
productivity of organisation.
By making use of VPN web can be browsed completely within anonymity which leads
individual to have complete access to websites and web applications.
P7 Deploy network monitoring tools and troubleshooting methods for establishment of network
baselines.
There are various network monitoring tools which can be used by The Sage Group Plc.
SolarWinds Network Performance Monitor can be used by them to track network elements by
making use of centralised dashboard and SNMP. This tool runs an auto-discovery feature which
locates devices manually on network and maps them on system. This will obviate the need to
spend time manually and network devices are linked with central console. Furthermore, it
provides wide range of visual features such as maps, pie charts and warnings to enable network
engineer to have glimpse of network performance. Network baseline refers to act of rating and
measuring performance of a network within real time situations (Farahani and et. al, 2013).
M6 Develop effectual documentation of troubleshooting steps and methods depending upon
scenario.
As per the requirements of The Sage Group Plc, they are looking forward to design a
network for 4 different departments. They are 5 systems in IT, 9 systems within Finance, 40
computers in design and 65 computers in sales department along with this a printer is connected
to each department and there are 4 servers. Connectivity is done by making use of 7 switches
13

each have the capability to acquire almost 20 systems . Furthermore, they are connected with
router so that packet can be sent to desired IP address, this will eliminate the traffic within a
network along with this congestion will not occur. Moreover servers are connected with switches
so that instance reply can be obtained by the system with respect to their needs.
CONCLUSION
From above report, it can be concluded that networks plays a crucial role in carrying out
entire operations of an organisation. It is essential to analyse the network which has been used by
them to make sure that traffic do not occur and still if it occurs then there must be other routes
available through which packets can be transferred to and from destination. There are various
network models which can be used to attain the desired results and have scalability which
ensures that network can be expanded as per the demand of an organisation. Switch and bridges
have been used for setting up connection between systems and allow them to share their data.
Furthermore, there are different commands which can be used to analyse the different systems
which are within the network and for how long they were on any specific website. Apart from
this, there are different WAN technologies which can be used to connect LAN’s and provide a
medium for communication.
14
router so that packet can be sent to desired IP address, this will eliminate the traffic within a
network along with this congestion will not occur. Moreover servers are connected with switches
so that instance reply can be obtained by the system with respect to their needs.
CONCLUSION
From above report, it can be concluded that networks plays a crucial role in carrying out
entire operations of an organisation. It is essential to analyse the network which has been used by
them to make sure that traffic do not occur and still if it occurs then there must be other routes
available through which packets can be transferred to and from destination. There are various
network models which can be used to attain the desired results and have scalability which
ensures that network can be expanded as per the demand of an organisation. Switch and bridges
have been used for setting up connection between systems and allow them to share their data.
Furthermore, there are different commands which can be used to analyse the different systems
which are within the network and for how long they were on any specific website. Apart from
this, there are different WAN technologies which can be used to connect LAN’s and provide a
medium for communication.
14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

REFERENCES
Books & Journals
Alshamsi, A. and Diabat, A., 2015. A reverse logistics network design. Journal of
Manufacturing Systems, 37, pp.589-598.
Botton, Q and et. al., 2013. Benders decomposition for the hop-constrained survivable network
design problem. INFORMS journal on computing, 25(1), pp.13-26.
Bovy, P. H. and Stern, E., 2012. Route Choice: Wayfinding in Transport Networks: Wayfinding
in Transport Networks (Vol. 9). Springer Science & Business Media.
De Rosa, V. and et. al, 2013. Robust sustainable bi-directional logistics network design under
uncertainty. International Journal of Production Economics, 145(1), pp.184-198.
Demuth, H. B. and et. al, 2014. Neural network design. Martin Hagan.
Farahani, R. Z. and et. al, 2013. A review of urban transportation network design
problems. European Journal of Operational Research, 229(2), pp.281-302.
Govindan, K., Fattahi, M. and Keyvanshokooh, E., 2017. Supply chain network design under
uncertainty: A comprehensive review and future research directions. European Journal of
Operational Research, 263(1), pp.108-141.
Keyvanshokooh, E., Ryan, S. M. and Kabir, E., 2016. Hybrid robust and stochastic optimization
for closed-loop supply chain network design using accelerated Benders
decomposition. European Journal of Operational Research, 249(1), pp.76-92.
Kim, S. ed., 2014. Game theory applications in network design. IGI Global.
Larsen, J. and Urry, J., 2016. Mobilities, networks, geographies. Routledge.
Mahaboob Sheriff, K. M., Gunasekaran, A. and Nachiappan, S., 2012. Reverse logistics network
design: a review on strategic perspective. International Journal of Logistics Systems and
Management, 12(2), pp.171-194.
Mulder, J. and Dekker, R., 2014. Methods for strategic liner shipping network design. European
Journal of Operational Research, 235(2), pp.367-377.
Özkır, V. and Başlıgıl, H., 2012. Modelling product-recovery processes in closed-loop supply-
chain network design. International Journal of Production Research, 50(8), pp.2218-
2233.
Sansò, B. and Soriano, P. eds., 2012. Telecommunications network planning. Springer Science &
Business Media.
Books & Journals
Alshamsi, A. and Diabat, A., 2015. A reverse logistics network design. Journal of
Manufacturing Systems, 37, pp.589-598.
Botton, Q and et. al., 2013. Benders decomposition for the hop-constrained survivable network
design problem. INFORMS journal on computing, 25(1), pp.13-26.
Bovy, P. H. and Stern, E., 2012. Route Choice: Wayfinding in Transport Networks: Wayfinding
in Transport Networks (Vol. 9). Springer Science & Business Media.
De Rosa, V. and et. al, 2013. Robust sustainable bi-directional logistics network design under
uncertainty. International Journal of Production Economics, 145(1), pp.184-198.
Demuth, H. B. and et. al, 2014. Neural network design. Martin Hagan.
Farahani, R. Z. and et. al, 2013. A review of urban transportation network design
problems. European Journal of Operational Research, 229(2), pp.281-302.
Govindan, K., Fattahi, M. and Keyvanshokooh, E., 2017. Supply chain network design under
uncertainty: A comprehensive review and future research directions. European Journal of
Operational Research, 263(1), pp.108-141.
Keyvanshokooh, E., Ryan, S. M. and Kabir, E., 2016. Hybrid robust and stochastic optimization
for closed-loop supply chain network design using accelerated Benders
decomposition. European Journal of Operational Research, 249(1), pp.76-92.
Kim, S. ed., 2014. Game theory applications in network design. IGI Global.
Larsen, J. and Urry, J., 2016. Mobilities, networks, geographies. Routledge.
Mahaboob Sheriff, K. M., Gunasekaran, A. and Nachiappan, S., 2012. Reverse logistics network
design: a review on strategic perspective. International Journal of Logistics Systems and
Management, 12(2), pp.171-194.
Mulder, J. and Dekker, R., 2014. Methods for strategic liner shipping network design. European
Journal of Operational Research, 235(2), pp.367-377.
Özkır, V. and Başlıgıl, H., 2012. Modelling product-recovery processes in closed-loop supply-
chain network design. International Journal of Production Research, 50(8), pp.2218-
2233.
Sansò, B. and Soriano, P. eds., 2012. Telecommunications network planning. Springer Science &
Business Media.

Simmons, J. M., 2014. Optical network design and planning. Springer.
Soleimani, H. and Govindan, K., 2014. Reverse logistics network design and planning utilizing
conditional value at risk. European Journal of Operational Research, 237(2), pp.487-
497.
Szigeti, T. and et. al, 2013. End-to-End QoS Network Design: Quality of Service for Rich-Media
& Cloud Networks. Cisco Press.
Talaei, M. and et. al, 2016. A robust fuzzy optimization model for carbon-efficient closed-loop
supply chain network design problem: a numerical illustration in electronics
industry. Journal of Cleaner Production, 113, pp.662-673.
Yan, Y. and et. al, 2013. Robust optimization model of bus transit network design with stochastic
travel time. Journal of Transportation Engineering, 139(6), pp.625-634.
Online
Source: Redundancy: Choosing the Right Option for Net Designs. 2019. [Online]. Available
through: <https://www.eetimes.com/document.asp?doc_id=1276954>.
Wide Area Network Technologies-Design and Implement High-Quality WAN Networks. 2019.
[online]. Available through: <https://www.edrawsoft.com/Wide-Area-Network.php>.
2
Soleimani, H. and Govindan, K., 2014. Reverse logistics network design and planning utilizing
conditional value at risk. European Journal of Operational Research, 237(2), pp.487-
497.
Szigeti, T. and et. al, 2013. End-to-End QoS Network Design: Quality of Service for Rich-Media
& Cloud Networks. Cisco Press.
Talaei, M. and et. al, 2016. A robust fuzzy optimization model for carbon-efficient closed-loop
supply chain network design problem: a numerical illustration in electronics
industry. Journal of Cleaner Production, 113, pp.662-673.
Yan, Y. and et. al, 2013. Robust optimization model of bus transit network design with stochastic
travel time. Journal of Transportation Engineering, 139(6), pp.625-634.
Online
Source: Redundancy: Choosing the Right Option for Net Designs. 2019. [Online]. Available
through: <https://www.eetimes.com/document.asp?doc_id=1276954>.
Wide Area Network Technologies-Design and Implement High-Quality WAN Networks. 2019.
[online]. Available through: <https://www.edrawsoft.com/Wide-Area-Network.php>.
2
1 out of 24
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.