100% found this document useful (1 vote)
2K views47 pages

Unit 15 Transport Network Design

The document provides an assignment brief for a networking student. The student is asked to design a network for a new branch office of a software company opening in Kandy, Sri Lanka. The company expects 150 employees split across customer care, sales, finance, legal, HR, development, and network administration teams on three floors. The student must [1] design a LAN for the new office based on given requirements, [2] implement the network using appropriate principles, [3] propose a WAN solution to connect the new office to the existing office, and [4] recommend troubleshooting techniques. The student must submit a written report of 4,000-4,500 words detailing their network design solutions and recommendations.

Uploaded by

ronica
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views47 pages

Unit 15 Transport Network Design

The document provides an assignment brief for a networking student. The student is asked to design a network for a new branch office of a software company opening in Kandy, Sri Lanka. The company expects 150 employees split across customer care, sales, finance, legal, HR, development, and network administration teams on three floors. The student must [1] design a LAN for the new office based on given requirements, [2] implement the network using appropriate principles, [3] propose a WAN solution to connect the new office to the existing office, and [4] recommend troubleshooting techniques. The student must submit a written report of 4,000-4,500 words detailing their network design solutions and recommendations.

Uploaded by

ronica
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title Higher National Diploma in Computing

Ms Maheesha
Assessor Internal Verifier
Unit 15: Transport Network Design
Unit(s)

Assignment title
Dilan Sarujan Murasolimaran
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST


Do the assessment criteria awarded match those
shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed accurately?
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for improved Y/N
performance? Y/N
• Agreeing actions?
Y/N
Does the assessment decision need amending?
Y/N

Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if required)


Date
Confirm action completed

Remedial action taken


Give details:

Assessor signature Date


Internal Verifier
signature Date
Programme Leader
signature (if required) Date
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Dilan Sarujan Murasolimaran COL/E-007430
Unit Title Unit 15: Transport Network Design

Assignment Number 1 Assessor

30/08/2020 Date Received 1st


Submission Date submission
Date Received 2nd
Re-submission Date submission
Assessor Feedback:
LO1 Explore LAN design principles and their application in the network design process

Pass, Merit & Distinction P1 P2 M1


Descripts

LO2 Implement a network using LAN design principles based on a predefined set of requirements

Pass, Merit & Distinction P3 P4 M2 M3 D1


Descripts

LO3 Produce an appropriate WAN solution to a set of organisational requirements


Pass, Merit & Distinction P5 P6 M3 M5
Descripts
LO4 Solve a range of network related problems using appropriate troubleshooting techniques and
methods

Pass, Merit & Distinction P7 P8 M6 D3


Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

Pearson Higher Nationals in


Computing
Unit 15: Transport Network Design

General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Excuses of any nature will not be accepted for failure to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
6. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
7. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a
reference list.
9. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.

5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: [email protected] Date: 30/08/2020


(Provide E-mail ID) (Provide Submission Date)

Higher National Diploma in Business


Assignment Brief
Student Name /ID Number Dilan Sarujan Murasolimaran COL/E-007430

Unit Number and Title Unit 15: Transport Network Design

Academic Year 2018/19

Unit Tutor

Assignment Title

Issue Date

Submission Date 30/08/2020


IV Name & Date

Submission format

The submission should be in the form of an individual written report. This should be written in a
concise, formal business style using single spacing and font size 12. You are required to make use
of headings, paragraphs and subsections as appropriate, and all work must be supported with
research. You must provide in-text citations and the reference list using Harvard referencing
system. The recommended word count is 4,000–4,500 words excluding annexures.

Unit Learning Outcomes:


Learning Outcomes

By the end of this unit students will be able to:

LO1: Explore LAN design principles and their application in the network design process. LO2:
Implement a network using LAN design principles based on a predefined set of
requirements.
LO3: Produce an appropriate WAN solution to a set of organisational requirements.
LO4: Solve a range of network related problems using appropriate troubleshooting techniques
and methods.
Assignment Brief and Guidance:

EMC Solutions is a privately owned, well-known Software company located in Colombo.


The Management of EMC Solutions has decided to extend their services to Kandy and as
a result a 3 stories building was purchased in the heart of Kandy. They are planning to
make it one of the state-of-the-art companies in Kandy with the latest facilities.
It is expected to have nearly 150 employees in Kandy branch.

Department Number of Users Floor


Customer Care 10 1st Floor
Sales and Marketing 20 1st Floor
Finance 25 2nd Floor
Legal 5 2nd Floor
HR 10 2nd Floor
Developers 55 3rd Floor
Network Team 5 3rd Floor
Server Room 8 Servers + SAN 3rd Floor

Following requirements are given by the Management;


• All the departments must be separated with unique subnet and should not
communicate with each other unless there is a special requirement.
• 10.254.1.0/24 is given and should use for all the departments except the server
room. IPs should assign using DHCP.
• Server room and SAN should be in 192.168.1.32/27 subnet. (Uses static IPs)
• High level of redundancy is expected in network design to eliminate single point
of failures and traffic bottle necks.
• Multiple ISP connections need to be configured for gateway
redundancy.
• Link aggregation need to be configured to improve the Network performance
where necessary.
• Data transmission between Head office and Kandy need to be secured with a
proper WAN design.
• Sales and Marketing Team need to access resources at Kandy office and the
head office securely during the field visits.
• Proper methods for networking monitoring and troubleshooting need to be
established.
• Customer Care and Sales team should not be allowed to access the Finance
Web server in Kandy server Room.
• All possible network security mechanisms should be implemented.

Assume you have been appointed as the new network consultant of EMC Solutions.
Prepare a network architectural design and implementation with your suggestions
and recommendations to meet the company requirements.

(Note: Clearly state your assumptions. You are allowed to design the network
according to your assumptions, but main requirements should not be violated)
Task 1
Explore LAN design principles and their application in the network design
process. 1.1. What do you mean by Network Design Model ? Explain the
importance of having Network Design Models for a proper network design.
1.2. Suggest a network design model for the above scenario and justify your
suggestion.
1.3. Explain the importance of Layer 2 redundancy and describe Layer 2
redundancy protocols use in the industry . Recommend a protocol/protocols
for the above scenario and justify your selection.
1.4. Explain the importance of Link Aggregation and describe Link
Aggregation protocols use in the industry . Recommend a
protocol/protocols for the above scenario and justify your selection.
1.5. Explain the importance of Layer 3 redundancy and describe Layer 3
redundancy protocols use in the industry. Recommend a protocol/protocols for
the above scenario and justify your selection.
Task 2
Implement a network using LAN design principles based on a predefined set of
requirements
2.1. Provide a list of Network Devices and justify your selections for the above
Network Design.
2.2. Provide IP Subnet Design for the Kandy Branch.
2.3. Provide a Complete Network Diagram Including WAN for the above scenario
according to your design.
2.4. Configure All the network devices with basic configurations*.
2.5. Implement and configure All required Layer 2 and Layer 3 solutions (including
redundancy) * to Kandy Branch LAN according to the requirements given in the
scenario.
*Note: - Screen shots of Configuration scripts should be presented.
Task 3
Produce an appropriate WAN solution to a set of organizational requirements.
3.1. Describe various WAN technologies with their characteristics that are used in the
industry and protocols associated with them. Select a WAN Technology for the
given scenario and justify your selection.
3.2. Implement and Configure * the selected WAN technology to the above Network.
*Note: - Screen shots of Configuration scripts should be presented.

Task 4
Solve a range of network related problems using appropriate troubleshooting
techniques and methods.
4.1. Explain the importance of Network monitoring related to LAN and WAN.
4.2. Describe few Network Monitoring Tools and Protocols, which are used in the
industry with their characteristics.
4.3. Implement and Configure* selected Network Monitoring Tool/Tools to the
above Network.
4.4. Develop test cases and Test the above LAN and WAN* designs to verify whether
the design objectives are met.
4.5. Explain and document the troubleshooting steps for the following scenarios;
a. Kandy branch users cannot access the resources in the server located at
Colombo Head office.
b. Customer Care users can access File Servers at Kandy branch but Sales
and Marketing users cannot access the same Servers but can access the
Internet.

*Note: - Screen shots of Configuration scripts should be presented.


Grading Rubric

Grading Criteria Achieve Feedback


d
LO1 Explore LAN design principles and their
application in the network design process

P1 Examine the network design models and


features of scalable networks based on a
given set of business needs.
P2 Discuss LAN redundancy, bandwidth and
load related issues and possible solutions
with reference to Layer 2 and Layer 3 of the
OSI Model.
M1 Analyse the switch and router
redundancy protocols and their
effectiveness in supporting scalable
networks..
LO2 Implement a network using LAN design
principles based on a predefined set of
requirements
P3 Select LAN devices based on features
and requirements, and apply basic
configuration commands for network
connectivity.
P4 Implement a LAN design with Layer 2 and
Layer 3 redundancy using switch and router
redundancy protocols.

M2 Analyse different switch redundancy


protocols and their effectiveness in solving
redundancy issues

M3 Analyse Layer 3 redundancy


implementations for IPv4 and IPv6
D1 Evaluate different implementations of
link aggregation using EtherChannel to
solve bandwidth and load issues
LO3 Produce an appropriate WAN solution
to a set of organisational requirements

P5 Examine WAN technologies and select


the appropriate one for a set of enterprise
requirements.
P6 Configure WAN protocols as part of an
enterprise network solution.
M4 Analyse the benefits and drawbacks of
private and public WAN technologies
M5 Evaluate features and benefits of
different VPN types based on
organisational needs..
LO4 Solve a range of network related
problems using appropriate
troubleshooting techniques and methods
P7 Deploy network monitoring tools and
troubleshooting methods to establish
network baselines and produce network
documentation.

P8 Troubleshoot LAN and WAN


connectivity issues at different networking
layers.

M6 Develop Effective documentation of


troubleshooting methods and steps based
on a given scenario.

D2 Evaluate troubleshooting methods and


their effectiveness in solving
enterprisewide networking issues.

Acknowledgements
Table of Contents
Task 01..........................................................................................................................................17

1.1 What do you mean by Network Design Model ? Explain the importance of having
Network Design Models for a proper network design..................................................................17

1.2 Suggest a network design model for the above scenario and justify your suggestion............20

1.3 Explain the importance of Layer 2 redundancy and describe Layer 2 redundancy
protocols use in the industry . Recommend a protocol/protocols for the above scenario and
justify your selection.....................................................................................................................21

1.4 Explain the importance of Link Aggregation and describe Link Aggregation protocols
use in the industry . Recommend protocol/protocols for the above scenario and justify your
selection........................................................................................................................................23

1.5 Explain the importance of Layer 3 redundancy and describe Layer 3 redundancy
protocols use in the industry. Recommend a protocol/protocols for the above scenario and
justify your selection.....................................................................................................................25

2.1 Provide a list of Network Devices and justify your selections for the above Network
Design...........................................................................................................................................27

2.2 Provide IP Subnet Design for the Kandy Branch....................................................................28

2.3 Provide a Complete Network Diagram Including WAN for the above scenario
according to your design...............................................................................................................28

2.4 Configure all the network devices with basic configurations*...............................................28

Task 03..........................................................................................................................................32

3.1 Describe various WAN technologies with their characteristics that are used in the
industry and protocols associated with them. Select a WAN Technology for the given
scenario and justify your selection................................................................................................32

3.2 Implement and Configure * the selected WAN technology to the above Network................36

Task 04..........................................................................................................................................37

4.1 Explain the importance of Network monitoring related to LAN and WAN...........................37

4.2 Describe few Network Monitoring Tools and Protocols, which are used in the industry
with their characteristics...............................................................................................................38
4.4 Develop test cases and Test the above LAN and WAN* designs to verify whether the
design objectives are met..............................................................................................................40

4.5 Explain and document the troubleshooting steps for the following scenarios;.......................41

Task 01

1.1 What do you mean by Network Design Model ? Explain the


importance of having Network Design Models for a proper network
design.

Network Design Model

Network design is a system design category which deals with the mechanisms of data
transport. As with the design disciplines of other systems , network design follows a process
of analysis where requirements are created and precedes implementation, where the system
(or related system component) is designed. The goal of network design is to satisfy the
requirements of data transmission while reducing expenses. Requirement scope can vary
widely from one network design project to another based on geographic features and the
nature of the transportation-requiring data.

Network Design Models:

Flat Network Model

A flat network topology is ideal for small networks and is implemented using the Layer 2
switching. There is not a hierarchy for a flat network design, and since each network device
performs the same job within the topology, a flat network design can be simple to
implement and maintain. The flat network topology is not divided into layers or modules,
which can make it a little more difficult to troubleshoot which separate network faults than
in a hierarchical network. That may not actually be a concern in a small network, as long as
the network remains small and manageable.
(Flat Network Topology :: Chapter 10. LAN Switched Network Design :: Lan switching first-step ::
Networking :: eTutorials.org, 2020)
The star network model

In star network model, every device is linked to a central device called hub in the network.
Unlike network model, star network model does not allow direct inter-device
communication, a system must communicate via hub. If one computer chooses to send data
to another device, it must first send the data to hub and then the hub sends the data to the
device designated.
The Ring network model

In ring network model, any device on either side of it is connected to the two devices. There
are two dedicated point-to - point connections that a computer has on either side with the
phone. This structure forms a ring, and is also known as ring topology. If a device wishes to
send data to another device then it sends the data in one direction, each device in ring
topology has a repeater, if the data received is intended for another device then repeat this
data until it is received by the intended device.

The Mesh Network Model

In mesh network model, each device is connected through a dedicated point-to - point
connection to every other device on the network. When we say dedicated it means the
connection carries data only for the two connected devices. Let us assume we have n
devices in the network then each device has to be linked to (n-1) network devices. The
number of ties of n devices in a mesh topology will be n (n-1)/2.
(Computer Network Topology - Mesh, Star, Bus, Ring and Hybrid, 2020)

The two-tier network model

The hierarchical three-tier architecture maximizes performance, network efficiency and the
ability to scale up network design.

However, over time, even small business networks do not grow exponentially larger. A
twotier hierarchical design, in which the central and distribution layers collapse into one
layer, is therefore often more realistic. A "collapsed heart" is when a single computer
implements both the distribution layer and core layer functions. The primary reason for the
collapsed core architecture is to minimize network costs, while retaining much of the
advantages of the hierarchical three-tier model.

The example in the below figure has collapsed the distribution layer and core layer
functionality into multilayer switch devices.

The three-tier network model

Cisco proposes a three-tier hierarchical network model, consisting of three layers: the
central tier, the layer of delivery, and the layer of access. The Cisco Three-Layer Network
Model is the chosen network architecture approach:
• Core layer- Core Layer consists of the largest, fastest, and most expensive routers
with the highest number of models and Core Layer is considered network backbone.
Core Layer routers are used to connect different networks geographically. The Core
Layer routers transfer information as quickly as possible across the network. The
switches running at the core layer transfers packets as easily as possible.
• Distribution layer- The Distribution Layer is between the entry layers and the
center layers. This layer has the function of providing boundary specification by
implementing access lists and other filters. Hence the Control Layer determines
network policy. Distribution layer comprises 3 switches at the high-end layer.
Distribution Layer ensures that the enterprise routes packets properly between
subnets and VLANs.
• Access layer- Access layer requires end device-connected service switches
(Computers , Printers, Servers, etc.). Switches to the access layer ensure packets are
transmitted to the end devices.
(Cisco Three Layer / Three-tier Hierarchical Network Model, 2020)

1.2 Suggest a network design model for the above scenario and justify
your suggestion.

The most suitable design model for EMC solutions is the three-tier model. The reasons are
given below:
Cisco Three Layer Network Model facilitates the construction of high-performance
networks. The 3-tier model allows for improved network control and the separation of the
causes of network problems. The Cisco Three Layer Network Model makes better
application for filter / policy development. The Cisco Three Layer Network Model lets us
handle future growth efficiently. Cisco Three Layer Network Model allows redundancy
easier. Multiple connections provide greater connectivity across multiple devices. If there is
one turn down, then we have another alternative route to reach the destination.
The 3-tier model helps the organization to hide unnecessary methods from business layer in
the presentation layer. Even the object-oriented concept is easy to apply in the 3-teir model
and data provider queries can be easily updated.
The organization could be able to add new rules or new validation rules that can be defined
any time and changes could be made to the middle layer which will not affect the
presentation layer.
1.3 Explain the importance of Layer 2 redundancy and describe Layer 2
redundancy protocols use in the industry . Recommend a
protocol/protocols for the above scenario and justify your selection.

Importance of Layer 2 redundancy

A secret to ensuring network stability is network redundancy. Multiple physical conditional


inks between apparatuses provide redundant paths. Then the Network will continue
operate when a single connection or port fails. Redundant interconnections may also share
the traffic load and increase flexibility.
There is a need to manage several paths so that no Layer 2 loops are generated. The best of
them paths are selected, and an alternative path is available immediately if the primary path
is failing the road. The Spanning Tree Protocols are used to handle redundancy at Layer 2.
Redundant devices, such as multi-layer switches or routers, allow for if the primary default
gateway fails a client to use an alternative default gateway. Now a client may have many
paths to more than one possible default gateway. First Hop Redundancy Protocols are used
to monitor how a customer is assigned a default gateway, and an alternative default gateway
to use should the current primary gateway crash.

Layer 2 protocols:

• STP:- STP is a network management protocol used to avoid loops within a


redundant topology of the network. STP makes use of the Spanning Tree Algorithm
(STA) to determine the best network switch route. The Spanning Tree Protocol then
shares the information with other network switches. Frames known as BPDUs
(Bridge Protocol Data Units) are used to exchange STA calculations among
switches. The Spanning Tree Protocol "prunes" redundant paths, using the
information given by the BPDUs.
• VTP- (VLAN Trunking Protocol) is a Cisco proprietary protocol used for the
sharing of VLAN information by Cisco switches. With VTP, VLAN details (such as
VLAN ID, or VLAN name) can be synchronized with switches within the same VTP
domain. A VTP domain is a series of trunked switches with the corresponding VTP
settings (domain name, password, and VTP). All switches within the same VTP
domain share each other's VLAN information.

• MST- Multiple Spanning Tree (MST) is an IEEE standard inspired by the


implementation of the Cisco proprietary Multiple Instances Spanning Tree Protocol
(MISTP). This document assumes that the reader is familiar with Rapid STP (RSTP)
(802.1w), because MST relies heavily on this additional IEEE standard.

The recommended protocol for the given scenario is Spanning Tree Protocol and the reasons
are given below:

Spanning Tree protocol help prevent broadcast storms

Spanning-tree protocols intelligently prevent network loops by constructing a tree topology


(spanning tree) of the entire bridged network with only one available route between the tree
root and a node. All other routes get put into a state of standby. The tree root is a switch to
use within the network chosen by the STA (spanning-tree algorithm) when determining the
best route between bridges across the network and the root bridge. Frames fly to their
destination through the network – a leaf like an end-user PC – along branches. A branch of a
tree is a section of the network, or connection, between bridges. Switches through forward
frames are called designated bridges through a STP spanning tree.

Preventing of Loops

Enterprising Networking Planet notes that it also prevents the possibility for loops, in
addition to the STP algorithm that enables information to flow safely between devices.
When multiple network paths are accessible to a computer, loops can occur, and data can
potentially be sent multiple times to a single source (or even at the wrong place). Loops can
clog up a network or crash it. The STP algorithm produces a diagram that restricts the
number of open paths and arranges them in a way that transfers and then switches
information from one computer to another.

Preventing connection problems

STP provides multiple backups that become involved while experiencing technological
hiccups in the main connection. These backups are possible since there are many paths to
choose from the STP. According to Orbit Machine Solutions, there is only one open route
for each system to reach the various switches in a network at any given moment. If one path
performs badly or does not work at all, the STP closes it and opens a new path.

1.4 Explain the importance of Link Aggregation and describe Link


Aggregation protocols use in the industry . Recommend protocol/protocols
for the above scenario and justify your selection.

1.4.1 What is Link Aggregation?

Link aggregation is a way of bundling together a bunch of individual (Ethernet) links so that
they act as a single logical link.
If you have a switch with a whole lot of Gigabit Ethernet ports, you can connect them all to
another device, which also has a bunch of ports, and balance the traffic between these links
to improve performance.
Another important reason to use link aggregation is to provide fast and clear recovery in
case of failure of one of the individual links.
(Networks, 2020)

Benefits of Link Aggregation

Link Aggregation (LAG) is a technique used on Ethernet switches to allow fast and
inexpensive bulk data transmission. Link aggregation improves or enhances network
capacity thus maintaining a high transmission speed and not investing in new hardware or
communication channels, thus reducing costs.
Link aggregation (LAG) is used to define different methods of using multiple parallel
network connections to increase throughput beyond the maximum that can be reached by
one link (one connection). Physical ports have to live on a single switch for link
aggregation. Combining can occur either in such a way that multiple interfaces share either
one logical address (i.e. IP) or one physical address (i.e. MAC address), or each interface
has its own address. The Link Aggregation Control Protocol (LACP) provides a mechanism
within the IEEE specification for regulating the bundling of many physical ports together in
order to form a single logical channel. LACP enables a network system to negotiate
automatic link bundling by sending LACP packets (directly connected system that also
implements LACP) to the peer.
Some say the most important feature of connection aggregation is the failover of links. With
link failover, traffic from a failed connection in the aggregation can be transferred to
working links. Data is transmitted over the usual link for security purposes and the other
connection in the aggregation sits idle or can transmit data from another physical link. Using
link aggregation is a reliable, cost-effective way of obtaining better bandwidth when
required and having a failover always.
(Media, 2020)

Benefits of Ether channel

• Most configuration tasks can be done on the EtherChannel interface instead of on each
individual port, ensuring configuration consistency throughout the links.

Parameters LACP PAGP

Origin IEEE passed 802.3ad (LACP) in year 2000 Invented in the early 1990s

Vendors
Supported Open Standard Cisco Proprietary

Standard Etherchannel and IEEE 802.3ad Etherchannel

Passive: This mode places a port in a passive negotiating


state. In this type of mode, the port responds to the LACP
packets that it receives but does not initiate LACP packet Auto: This mode places an interface in a pas
negotiation. (The default mode for LACP) Active: This mode state in which the interface responds to the P
places a port in an active negotiation state in which the port it receives but does not initiate PAGP negotia
mode for PAGP) Desirable: This mode place
initiates negotiations with other ports by sending LACP
an active negotiating state in which the in
Mode packets. negotiations with other interfaces by sending
• EtherChannel relies on existing switch ports. There is no need to upgrade the link to a
faster and more expensive connection to have more bandwidth.  Load balancing
takes place between links that are part of the same EtherChannel. Depending on the
hardware platform, one or more load-balancing methods can be implemented. These
methods include source MAC to destination MAC load balancing, or source IP to
destination IP load balancing, across the physical links.

Differences between LACP vs PAGP

1.5 Explain the importance of Layer 3 redundancy and describe Layer 3


redundancy protocols use in the industry. Recommend a
protocol/protocols for the above scenario and justify your selection.

Layer 3 provides the network’s routing and switching technologies that create logical paths
known as virtual circuits (VC), which are used for the transmission of data between network
nodes. The main functions of Layer 3 include routing and forwarding, as well as
internetworking, addressing, packet sequencing, congestion control and further error
handling.

The protocols used in Layer 3 include:

• Internet Protocols IPv4/v6


• Internet Control Message Protocol (ICMP)
• Distance Vector Multicast Routing Protocol (DVMRP)
• Internet Group Management Protocol (IGMP)
• Address Resolution Protocol (ARP)
• Internet Protocol Security (IPsec)
• Routing Information Protocol (RIP)

Recommended protocol for the given scenario is HSRP

Hot Standby Router Protocol (HSRP) is a CISCO proprietary protocol, which provides
redundancy for a local subnet. In HSRP, two or more routers gives an illusion of a virtual
router.
HSRP allows you to configure two or more routers as standby routers and only a single router
as active router at a time. All the routers in a single HSRP group shares a single MAC address
and IP address, which acts a default gateway to the local network. The Active router is
responsible for forwarding the traffic. If it fails, the Standby router takes up all the
responsibilities of the active router and forwards the traffic.
Task 02

2.1 Provide a list of Network Devices and justify your selections for the
above Network Design.

Router

A router is hardware device designed to receive, analyze and move incoming packets to
another network. It may also be used to convert the packets to another network interface,
drop them, and perform other actions relating to a network. The picture shows the Linksys
BEFSR11 wireless router and is what many home routers resemble.

Multi Layer Switch

A multilayer switch is a network device that has the ability to operate at higher layers of the
OSI reference model, unlike the Data Link Layer (DLL) traditionally used by switches. A
multilayer switch can perform the functions of a switch as well as that of a router at
incredibly fast speeds. A switch traditionally inspects frames, while a multilayer switch
inspects deeper into the protocol description unit (at packet or even at segment level).
Multilayer switches use ASIC hardware circuits to perform routing functions. This differs
from typical routers, which reside on a microprocessor and use applications running on it to
perform their routing operations.

Switch

Switches are key building blocks for any network. They connect multiple devices, such as
computers, wireless access points, printers, and servers; on the same network within a
building or campus. A switch enables connected devices to share information and talk to each
other.

2.2 Provide IP Subnet Design for the Kandy Branch.


Department Starting IP End IP VLAN ID Subnet Mask Default
Gateway
Developers 10.254.1.0 10.254.1.63 10 255.255.255.192 10.254.1.1

Finance 10.254.1.64 10.254.1.95 20 255.255.255.224 10.254.1.65


Sales 10.254.1.96 10.254.1.127 30 255.255.255.224 10.254.1.97
Customer 10.254.1.128 10.254.1.143 40 255.255.255.240 10.254.1.129
Care
HR 10.254.1.144 10.254.1.159 50 255.255.255.240 10.254.1.145
Legal 10.254.1.160 10.254.1.167 60 255.255.255.248 10.254.1.161
Network 10.254.1.168 10.254.1.175 70 255.255.255.248 10.254.1.169
Team
Server Room 192.168.1.32 192.168.1.47 80 255.255.255.240 192.168.1.33

2.3 Provide a Complete Network Diagram Including WAN for the above
scenario according to your design.

2.4 Configure all the network devices with basic configurations*.


VLAN Config

Trunk port Config


Ether channeling config

Password in layer 2

Banner
Task 03

3.1 Describe various WAN technologies with their characteristics that are
used in the industry and protocols associated with them. Select a WAN
Technology for the given scenario and justify your selection.

A Wide Area Network (WAN) is a computer network that spans many distance areas, and can
extend around the world. Many smaller networks, such as local area networks ( LANs) or
metro area networks (MANs), are also connected by WANs. WAN is the Internet the most
popular in the world. Those Internet segments are also WANs in themselves. Scalability is the
main difference between the WAN and LAN technologies. C WAN needs to be able to grow
to cover multiple cities, even countries and continents as needed.

WAN Technologies

IPsec VPN

IPsec VPN safely links all the websites to the same private network using Internet access as
the network of data communication. This form of VPN is installed at each location between a
security apparatus or firewall ensuring a secure IPsec tunnel between sites. The LAN is
behind these security devices and software on laptops, desktops or servers is not necessary to
allow VPN communication between locations. VPN network topologies are available in a hub
and the configuration for spoken or meshed.

SD-WAN

An emerging type of WAN technology is the software-defined WAN (SD-WAN). Software-


Defined Networking (SDN) is used to automatically decide the best routes over Internet links
and private data networks to and from locations. SD-WAN builds transportation-agnostic
tunnels, so you can use DSL, cable, wireless, shared fiber or dedicated networking. In
addition to standard Internet access, companies can also retain internal private data network
services (MPLS, EPL, EVPL, VPLS, etc.) This helps to boost performance and reliability of
SD-WAN networks.
Metro Ethernet

Metro Ethernet is an Ethernet point-to - point data networking service which connects
locations within a metropolitan area (MAN). The system Ethernet over Synchronous Optical
Network (SONET) is used to secure point to point WAN connectivity. Circuit velocities
usually range from 10 Mbps to 10 Gbps, with 100Gbps in some metropolitan areas.

Ethernet private Line- EPL

Ethernet Private Line (EPL) service offers dedicated point-to - point communication between
two or more locations. Ethernet over Synchronous Optical Network (SONET) is, as with
Metro Ethernet, the type of WAN technology used. EPL circuits offer a secure data
networking facility for high-bandwidth, low-latency users. A key component of EPL 's
service is network resilience and efficiency through SONET (network reroute) security. Make
this service for data networking with the most mission-critical applications.

(Different Types of WAN Technologies - Data Networking Services | bSimplify, 2020)

Comparison between private and public WAN technologies

Private WAN Public WAN


Characteristics • Service providers provide
• Bandwidth stacking
Internet access using
• Instantaneous sub-second broadband services such as
same-IP failover for carrier DSL, cable, and satellite
access.
redundancy
• Broadband
• Bi-directional Quality of
connections are typically
Service engine used to connect small
offices and
• Secure transport over the telecommuting employees
to a corporate site over the
Internet (encryption, traffic
Internet.
distribution)
• Extensible API (automate
alerts)
Compatibility with any

type of connections into
a single, virtual link

Advantages • Point-to-point  There are no security


communication links issues in public WANs
require minimal expertise  It provides a
to install and maintain.
professionally
• Constant availability is integrated approach to
essential for some an enterprise's
connectivity needs.
applications, such as
ecommerce.

• The technologies required to


configure public networks
are easy to manage and be
implemented

Disadvantages • The cost of leased line  Can be Costly


solutions can become  The
significant when they are administrative
used to connect many
control is higher in
sites over increasing
Public WAN than in
distances. In addition,
 Private WAN.
each endpoint requires an
interface on the router, A higher knowledge is
required to manage the
which increases
public WAN.
equipment costs.
• WAN traffic is often
variable, and leased lines
have a fixed capacity, so
that the bandwidth of the
line seldom matches the
need exactly.
WAN Protocols

VPN

A Virtual Private Network is a way of linking the private and public networks to add
encryption and privacy. Much like the WiFi Hotspots and the Internet, for example. Digital
Private Networks are used by companies to encrypt confidential data. However, the use of a
personal VPN is becoming increasingly common as there are more connections that were
previously face-to - face Internet transfers. Increase privacy with a Virtual Private Network,
as the original IP address of the user is replaced by that of the Virtual Private Network
provider.

Types of VPN

Remote Access VPN

Remote access VPNs essentially connect the user to a protected remote server so that they
can access a private network. The encryption added ensures there is no risk to protection.
This is the base upon which to develop the so-called commercial VPN services. Such
providers allow you to use your own network while browsing the Internet, hiding your sent
data from local networks, and receiving it. As a result, you can browse away in anonymity,
access material that is otherwise limited to your normal link on the Internet, and keep your
data secure from hackers and snoopers.

Site-to-Site VPN

Site-to - site VPNs function differently – their main purpose is to provide multiple users with
the ability to access each other's resources at various fixed locations.
VPNs from site to site are popular in large-scale business environments where safe
communication between departments around the world is crucial. They are not easy to
introduce with that said as they need specialized equipment and serious resources.
Furthermore, this type of VPN technology is constructed with an intent and does not provide
the versatility found in commercial VPN services.
(Different Types of VPNs and When to Use Them (Updated 2020), 2020)

The recommended WAN technology for the given scenario is GRE Tunneling

Generic Routing Encapsulation ( GRE) is one example of a VPN tunneling protocol that is
simple, non-secure, site to site. GRE is a tunneling protocol developed by Cisco capable of
encapsulating a broad variety of types of protocol packets inside IP tunnels. GRE provides a
virtual point-to - point connection at remote points to Cisco routers, via an IP internetwork.

GRE is designed to handle multiprotocol and Network multicast transportation between two
or more sites that may only have Internet connectivity. It can encapsulate multiple types of
packets of protocols within an IP tunnel.

GRE is a Cisco-developed tunneling protocol that can encapsulate a broad range of protocol
packet types within IP tunnels, providing a virtual point-to - point connection to Cisco routers
at remote points over an IP internetwork. IP tunneling using GRE allows network extension
over the backbone framework of a single protocol. It does this by connecting subnetworks of
multiprotocol in a single protocol backbone system.
(Academy, 2020)

3.2 Implement and Configure * the selected WAN technology to the above
Network.

Task 04

4.1 Explain the importance of Network monitoring related to LAN and


WAN.

Network Monitoring
Network monitoring refers to monitoring a computer network by means of specialized
software management tools. Network monitoring systems ensure that computers and
network resources are available and perform overall. Network administrators monitor
access, routers, components that are slow or failing, firewalls, core switches, client systems
and server performance — among other network data. Network monitoring systems are
usually used on the IT networks of major corporations and institutions.
A network monitoring detects and reports device or link failures. It measures the use of CPU
hosts, the use of network bandwidth links, and other aspects of the service. It also sends
messages to each host over the network — sometimes called watchdog messages — to
check whether it is responsive to requests.
(Network Monitoring Definition and Tools, 2020)

Importance of network monitoring

One of the most critical components of network monitoring is to keep the information
secure. It will keep track of everything and alert your network administrator to any problems
before they turn into real big issues. A few things a network monitor will tell you are if
anything stops responding, if your severity fails or if your disk space runs low. Network
monitoring is probably the most proactive way of dealing with issues so you can stay ahead
of them, particularly when you are being monitored 24/7.

Another great benefit of monitoring a network is its ability to troubleshoot. You will save
much time trying to determine what is wrong. You can easily say which system it is that
gives you the problem with network monitoring. Your support staff will be able to pick up
and resolve a problem before customers even become aware of it. Since your monitoring is
continuous, this will help you track any patterns in your network results. They can be
difficult to detect when issues arise sporadically or at peak hours, but a network monitor can
help you understand what's going on better.

Monitoring the network would save you both lots of time and money. Without it, more time
will have to be spent researching, resulting in further hours to be carried out. Not only
would this cost more resources but also lower efficiency. You maximize your income when
you can easily find out and address problems with the network. That gives you more time to
run your company when all is running smoother. When you understand how all of your
computers are being used, you can determine what additional disk space requires, so you
can easily and efficiently increase the capacity.
(Blanchard, 2020)

4.2 Describe few Network Monitoring Tools and Protocols, which are used
in the industry with their characteristics.

Network Monitoring Tools

PRTG

PRTG Network Monitor software is widely recognized for its advanced capabilities in
controlling networks. All of your network's computers, systems, traffic and applications can
be easily viewed in a hierarchical view that sums up output and warnings. PRTG uses
technologies such as SNMP, WMI, SSH, Flows / Packet Sniffing, HTTP requests, REST
APIs, Pings, SQL and much more to track IT infrastructure.

Nagios XI

Nagios XI targets a diverse audience, ranging from freelancers, SMBs (Small-to -


MediumBusiness) to large companies. That makes the XI pricing model for Nagios one of
the most versatile. They have free, open-source, one-time license, and subscription versions.
It is one of the few tools that allows for extreme versatility (because of its adaptability to
plug-ins) on what is being tracked and notified at a low cost.

Zabix

Zabbix is an open source surveillance tool. It is known for its fully configurable, easy-to-use
and pleasing Web Interface. Zabbix focuses on the functionality for monitoring and
trending. This software is often used for the monitoring of servers and hardware on the
network. One of Zabbix 's highlights is it's able to predict trends in your traffic. Zabbix can
predict future conduct based on historical data.

Incinga

It is another tool for the monitoring of open source infrastructures and services. In 2009
Icinga was developed by the same developer team that brought you Nagios.
For SMB and enterprise networks, it is a very easy to use and flexible tool. The software
strongly focuses on monitoring the infrastructure and services. The tool also includes great
functionalities for threshold analysis and report / alert.
(10 Best Network Monitoring Tools & Software of 2020 | FREE - UPDATED!, 2020)

Network Monitoring Protocols

SNMP

SNMP is the leading standard protocol to query specific items in a bid to collect data from
devices such as switches, WLAN controllers, servers , printers, routers, modems, etc. that
are linked to a network. Data collected is used to create information that is used to track
network output based on device status, usage of the CPU, use of bandwidth, network
latency, etc.

ICMP

ICMP is a network monitoring protocol primarily designed for reporting errors. Network
devices such as routers use ICMP to send error messages in circumstances where, for
example, a host / client can not be reached, or information requested can not be obtained.
Unlike SNMP, ICMP does not participate in data sharing within or between systems. Its
function is very straight to the point: "Oh, IP operations create a mistake. Report this!

CDP
CDP (Cisco Discovery Protocol) is a Data Link Layer network monitoring protocol
developed specifically by Cisco systems for sharing information between Cisco connected
devices which have a direct connection to each other. It essentially provides round-up
information on Cisco-enabled devices on a network, such as routers , switches, servers etc.
It is allowed on all compatible Cisco devices by default, but can be disabled for certain
device models on a specific platform, or disabled globally via Cisco systems.

(Types of Network Monitoring Protocols | Network Management Solutions, 2020)

4.4 Develop test cases and Test the above LAN and WAN* designs to verify
whether the design objectives are met.

Test Case Actual Output Expected output


Test the password in the layer When the correct password is The user can login to the
2 switch given, the user is able to multilayer switch
login to multilayer switch

4.5 Explain and document the troubleshooting steps for the following
scenarios;

What is troubleshooting?

Troubleshooting is primarily done to keep a system or software in desired condition,


specifically when it encounters or exhibits a problem. It is a systematic approach done
within one or more phases depending on the complexity of a problem. Typically, the first
step involves identifying what the problem is followed by coming up with a solution to
counteract the problem and then implementing that solution. However, there can be more
than one reason for the problem, which will require a more complex solution. An individual
troubleshooting such a problem might test for different solutions to eliminate the problem or
fault.

Troubleshooting Methodology

Identify the Symptom


What’s really happening? Vague symptoms like, “The server is slow” or “The Internet is
broken” aren’t really useful. But they are a common starting place. Narrowing down specific
symptoms like error messages, affected systems and applications, or time of day helps move
to the next step.

Determine the Cause


What’s causing the symptom to occur? This step is often overlooked when IT professionals
just jump right from “The server is slow” to “Reboot and defrag it.” I never just randomly
reboot a computer or purge the Internet Explorer cache, because those “fixes” are just random
steps that may temporarily alleviate the symptoms. Finding the root cause of the symptom is
the only way to actually resolve the issue permanently.

Plan, Implement, and Verify the Resolution


Once the actual root cause is found, I can figure out how to fix it. From a minor software
update to a complete system rebuild, I always at least write a quick plan to follow. Then I step
back for a moment and consider whether this plan will address the root cause and therefore
resolve the symptom. If so, I implement the plan and then verify that the symptom is gone.

Conclusion
Take a look at this methodology and how it can be used as a framework for virtually any
troubleshooting effort. This is the best one I’ve used because it is a simple, effective, and
flexible methodology for finding and fixing Windows issues.

Troubleshooting steps

You're systematic approach to troubleshooting should involve five basic steps;


1. Information Gathering
2. Analysis and Planning
3. Implementation of a solution
4. Assessment of the effectiveness of the solution
5. Documentation of the incident

Below we will address these steps individually.

Information Gathering Before we can determine how to address a problem--or even assess
what the problem is--we must gather information. Gathering information can be particularly
challenging when the problem manifests itself at the client side. You might have to formulate
your questions carefully in order to get meaningful information. Log files contain great
information you should consult during the data-gathering stage. Both the Windows logs and
the AIRA logs should be consulted. Also check to see if all Services are running properly.

Analysis Once we have gathered the data (including attempting to reproduce the problem),
it's time to analyze the data. The primary task in this phase is to look for patterns. An
important part of the analysis phase involves prioritizing. This includes prioritizing the
problems, if there are multiple problems. Performance problems are generally less urgent
than access problems.

Solution Implementation Although there could be several possible solutions to a problem,


you should always implement one change at a time. Assess the results of that change before
trying something else. This will save you time in the long run.

Assessment It is vital that you assess the results of your actions and determine whether the
"fix" worked, whether it was a temporary work around, or whether it caused additional
problems.

Documentation After completing your assessment, you should develop a summarization of


the problem, which should include the reported and observed symptoms, the corrective
actions taken, and the results of those actions.
Reference List

Networks, A., 2020. Network Basics: What Is Link Aggregation & How Does It Work? .
[online] Auvik Networks Inc. Available at:
<https://www.auvik.com/franklyit/blog/network-basics-linkaggregation/> [Accessed 31
July 2020].

Edrawsoft.com. 2020. Wide Area Network Technologies - Design And Implement High-
Quality WAN Networks. [online] Available at: <https://www.edrawsoft.com/wide-area-
network.html> [Accessed 31 July 2020].

Lifewire. 2020. Network Monitoring Definition And Tools. [online] Available at:
<https://www.lifewire.com/what-is-network-monitoring-817816> [Accessed 23 August
2020].

Etutorials.org. 2020. Flat Network Topology :: Chapter 10. LAN Switched Network Design ::
Lan Switching First-Step :: Networking :: Etutorials.Org. [online] Available at:
<http://etutorials.org/Networking/Lan+switching+firststep/Chapter+10.+LAN+S
witched+Network+Design/Flat+Network+Topology/> [Accessed 2 September
2020].

Media, O., 2020. Link Aggregation: A Cool Tip For Better Bandwidth & Redundancy On
Ethernet Switches - Military Embedded Systems. [online] Militaryembedded.com.
Available at: <https://militaryembedded.com/comms/communications/link-aggregation-
a-cool-tip-for-betterbandwidth-redundancy-on-ethernet-switches> [Accessed 2
September 2020].

beginnersbook.com. 2020. Computer Network Topology - Mesh, Star, Bus, Ring And
Hybrid. [online] Available at: <https://beginnersbook.com/2019/03/computer-network-
topology-mesh-star-bus-ringand-hybrid/> [Accessed 6 September 2020].

Omnisecu.com. 2020. Cisco Three Layer / Three-Tier Hierarchical Network Model .


[online] Available at: <https://www.omnisecu.com/cisco-certified-network-associate-
ccna/three-tier-hierarchicalnetwork-model.php> [Accessed 6 September 2020].

Blanchard, C., 2020. The Importance Of Network Monitoring. [online] i.t.NOW. Available
at:
<https://itnow.net/the-importance-of-network-monitoring/> [Accessed 7 September
2020].

PC & Network Downloads - PCWDLD.com. 2020. 10 Best Network Monitoring Tools &
Software Of 2020 | FREE - UPDATED!. [online] Available at:
<https://www.pcwdld.com/best-networkmonitoring-tools-and-software> [Accessed 7
September 2020].

LiveAction. 2020. Types Of Network Monitoring Protocols | Network Management


Solutions. [online] Available at: <https://www.liveaction.com/blog/types-of-network-
monitoring-protocols/> [Accessed 7 September 2020].

bSimplify. 2020. Different Types Of WAN Technologies - Data Networking Services |


Bsimplify. [online] Available at: <https://www.bsimplify.com/types-wan-technologies-
data-networking/> [Accessed 7 September 2020].
Vpnmentor.com. 2020. Different Types Of Vpns And When To Use Them (Updated
2020). [online] Available at: <https://www.vpnmentor.com/blog/different-types-of-vpns-
and-when-to-use-them/> [Accessed 7 September 2020].

Academy, C., 2020. GRE (3.4) > Branch Connections | Cisco Press. [online]
Ciscopress.com. Available at: <https://www.ciscopress.com/articles/article.asp?
p=2832406&seqNum=7> [Accessed 7 September 2020].

You might also like