Qualification - Higher National Diploma in Computing

Unit Name - Transport Network Design

Unit Level - Level 5

Unit Number - Unit 15

Assignment Title - Transport Network Design

Learning Outcome 1: Explore LAN design principles and their application in the network design process

Learning Outcome 2: a network using LAN design principles based on a predefined set of requirements

Learning Outcome 3: Produce an appropriate WAN solution to a set of organisational requirements

Learning Outcome 4: Solve a range of network related problems using appropriate troubleshooting techniques and methods

Buy Unit 15 Transport Network Design - Higher National Diploma in Computing Assignment help Online From Miracleskills.Com - The Most Trusted Platform

Assignment Brief: EMC Solutions is a private owned well-known Software company located at Colombo. The Management of EMCSolutions decided extend their services Kandy and as a result building with 3 stories has purchased in the heart of Kandy town. They are planning make it to become one of the state-of-the-art companies in Kandy with new facilities.Acknowledgement
I would like to thank our professor for their excellent guidance for complementing the assignment successfully. I also extend my gratitude to the university for providing facilities for completing the assignment.

Executive summary
The report will present plan for new network design for the company EMC solutions. The suitable network architecture for the company based on the given requirements is 3 layer network models. The model makes the network is easy to manage and fix the issues fast manner. The report presents layer 2 and layer 3 redundancy protocols, WAN technologies and suggests adequate redundancy protocols as well as technologies for EMC solutions. The work also suggests troubleshooting methods for the company EMC solutions.

Task 1 Explore LAN design principles and their application in the network design process.

1.1. What do you mean by Network Design Model and explain the importance of having Network Design Models for proper network design? (three layer models details)


1.1 Network Design model and its importance -three layer models

Network Design Model

Network design model illustrates the architecture of the network. It includes various technologies and techniques to connect multiple devices on the network to make communication. The management of network is ease and flexible for network engineer through network design models. It depicts the logical arrangement of devices in the network.
Types of Network Design Models
• Two -tier model
• Three -tier model
Two -tier model
The model is applicable for medium size networks. It has two layers such as Access layer and the combination of distribution as well as core layer. It is architecture of collapsed core /distribution, in which maximum 3 functional blocks are can be connected.

Three -tier Model
Cisco developed 3-layer H-Hierarchical M-Model (3-layer HM) for designing, implementing and maintaining scalable, cost effective and reliable network model. The model HM has 3 layers in which each layer performs its own functions. The 3 layers architecture reduces complexity for network design. Cisco 3-layer HM model is depicted in the following figure:-

The model has the following layers such as Access layer, distribution layer and core layer.

A-Access L-layer(AL)
The bottom most layer in the hierarchical model is the A-Access L-Layer (AL) and it has switches. The switches are connecting with the end terminals such as servers, computer and printers etc. The packets are transmitted to end terminals through switches. Access control polices, security features for port, collisions domains are implemented at access layer.

D-Distribution L-Layer (DL)
D-Distribution L-Layer (DL) resides in between core and Access layer. The main functions of this layer are filtering, routing, accessing WAN and determining packets to access the core. Policies are defined in this layer. The layer DL has switches of high end layer - 3 and routers. The DL is responsible for routing packets between VLAN and subnet in an organization environment.

C-Core L-Layer (CL)
The backbone of the network is the CL. The CL connects different networks those are spread geographically. The layer has high speed routers and switches. The layer transmits traffic at very high speed.

Advantages of Network Design model
The Cisco 3-layer model provides benefits in the following factors such as:-
• Performance
The model offers high performance
• Management as well as troubleshoot
It isolates sources of network issues as well as offer better management of netwrok
• Filter or policies
Policies can be set to filters services/access in the network
• Scalability
The model is highly scalable
• Redundancy
The devices are connected with multiple links through which it offers redundancy feature

1.2. Suggest a network design model for above scenario and justify your suggestion. ( Why are you choosing three layer model )


1.2 Network Design model for given scenario and suggestion

EMC solutions
EMC solution requires connecting two geographically dispersed networks such as Colombo and kandy. The kandy branch has the following department customer care, sales & marketing, legal, HR, finance, Network team, developers and server room.

Requirements of the company EMC
• Each departments has unique subnet
• No inter-communication between department without special requirement
• For eliminating failure and traffic due to one point, the EMC network model will require redundancy at high level
• More than one connections of ISP
• High network performance
• Secured traffic
• Methods for monitoring and troubleshooting networks
• Restriction of resource access
The suggested network model for EMC Software Company is the Cisco's 3-tier Hierarchical model. The features of such model are coordinated with the requirements of the EMC Company.

1.3. Explain the importance of Layer 2 redundancy and describe Layer 2 redundancy protocols use in industry and recommend a protocol/protocols for above scenario and justify your selection. ( Switch redundancy, What is STP, What should do STP) , l2 redundancy and l3 redundancy


Importance of Layer 2 redundancy

Redundancy is the factor for network to achieve reliability. The devices are having multiple links as well as path when one point of failure occurs, the devices will take alternate path. Redundancy shares traffic as well as increasing the capacity of the network.
The below diagram depicts the network design without layer 2 redundancy:-

The access switches are connected with the aggregation switch. The access switches are operated at the DLL (layer 2) of OSI model. The switches transmit frames from source to destination according to their MAC address. When the aggregation switch gets failure, the access switches connected with aggregation switch get down.

To overcome such issues redundant switches are added to increase reliability. The redundant network design will be:-

Layer 2 redundancy protocols

S-Spanning T-Tree P-Protocol (STP)
The protocol is used to construct network without any loop. The protocol monitors the entire links of the network to release the low redundant loop.
Variations of STP are
M-Multiple S-Spanning T-Tree P-Protocol (MSTP)
It is the extension of the protocol S-Spanning T-Tree P-Protocol (STP). It creates more than one spanning tree for every VLAN on single network. It allows root bridge configuration as well as topology for VLAN. It reduces P-Protocol D-Data U-Units (BPDUs) and C-Central P-Processing U-Units (CPUs)
R-Rapid S-Spanning T-Tree P-Protocol (RSTP)
It achieves no loops in the network. It adopts the changes in the network topology rapidly. It is the best solution for the automations of Energy, Factory and Aerospace.

Recommendation of Layer 2 redundancy protocols for given scenario and justification

The recommended Layer 2 redundancy protocol is STP. The protocol switching loops of layer 2 via removing the redundant links among switches. Redundant links has both advantages and disadvantages. Even though, the links offers reliability, it affects the working behaviour of switches. The STP is algorithm to monitor redundant links and removes such links.

1.4. Explain the importance of Link Aggregation and describe Link Aggregation protocols use in industry and recommend a protocol/protocols for above scenario and justify your selection. ( Ether Channeling / PAGP and LCAP meaning )


1.4 Importance of link Aggregation
Link aggregation is used for load balancing. It is the task of logically combining more than one Ethernet links into one link. The network management is simple due to the logical aggregation of physical links. It increases network reliability as well as availability when one physical links goes down the traffic is assigned to other physical link. The physical resources are handled efficiently through proper load balancing mechanism. The aggregated link increases band width than individual link. It created cost effective network.

Link Aggregation protocols

Etherchannel is the technology for aggregating port links. The technology developed by Cisco. The technology offers link between switches, servers as well as routers at high speed. it combine either Ethernet's such as Gigabit or Fast. The following protocols are used for configuring etherchannel in switches such as
• P-Port A-Aggregation P-Protocol -PagP
It is the protocol of cisco. The protocol performs Ehthernet switch port's logical aggregation on Etherchannel.it operates on three modes such as auto, desirable and on.
• L-Link A-Aggregation C-Control P-Protocol -LACP
It is IEEE standard protocol. It form logical channel by bundling of different physical ports. It offers many of bundles in port channel. It offers configuration dynamically. Automatic failure over principles.
Recommendation of Link Aggregation protocols for given scenario and justification
The recommended link aggregation is the P-Port A-Aggregation P-Protocol -PagPwhich is IEEE standard protocol. Both protocols are same in their working mechanism.

1.5. Explain the importance of Layer 3 redundancy and describe Layer 3 redundancy protocols use in industry and recommend protocol/protocols for above scenario and justify your selection. Click Here HSRP/VRRP/GLBP


1.5 Importance of Layer 3 redundancy

Layer 3 redundancy is important to route traffic between subnet or among network. EMC company various subnets (one subnet for each department) and two networks such as Colombo as well as Kandy. Routers are forwarding traffic between networks and subnets. Redundancy is required to manage one point of failure and consider alternate link.
Layer 3 redundancy protocols
• O-Open S-Shortest P-Path F-First- OSPF
• E-Enhanced I-Interior G-Gateway R-Routing P-Protocol -EIGRP
• R-Routing I-Information P-Protocol -RIP
• H-Hot S-Standby R-Router P-Protocol-HSRP
The protocol offers flexibility for host to use multiple routers. The routers are acting as one virtual router. The management of failure management in network is flexible due to multiple routers.

• V-Virtual R-Router R-Redundancy P-Protocol -VRRP
It is used to discard failure at single point at the static environment. The router VRRP controls the IP addresses related with master or virtual router.

• G-Gateway L-Load B-Balancing P-Protocol -GLBP
It prevents network traffic failure at single router by having more number of redundant routers in the network.

H-Hot S-Standby R-Router P-Protocol

HSRP protocol combines more than oneswitches of multilayer as well as routers into one logical router. The routers tied with the virtual or logical router uses the common logical IP address and logical MAC address.
Recommendation of Layer 3 redundancy protocols for given scenario and justification

Layer 3 protocol HSPR recommended for the given scenario. The protocol is industry standard. The protocols connect more than routers or switches in single logical device. The protocol offers uninterrupted communication for the underlying network. In this given scenario, EMC requires highly available network. The HSPR protocol is the optimum solution.

Task 2

Implement a network using LAN design principles based on a predefined set of requirements

2.1. Provide list of Network Devices and justify your selections for above Network Design. (Switches/Router/Firewall and examples)


Implementation of network using LAN design principles based on predefined set of requirements

2.1 List of Network Devices and justification for Network Design

The physical layer has the device repeater. The device repeats the signal during signal transmission when the signal becomes corrupted or weak.

It is repeater of multiport. The device connects various wires. The network device used to connect multiple Ethernet switches for forming single same network.it has many input as well as output ports.

The device is used to form network of devices. The company has different departments. Each department has set of set of devices. The switch is used to logically form group of devices. The switch resides in the data link layer. It performs error checking during data transmission.

Routers are the network devices to forward data packets based on IP address. It is the device for Network layer. The device connects LANs and WANs. It uses routing table to forward data packets. Routers are used to connect network.

The device is used to connect networks with different models.

Database server
The database server has D-Data B-base M-Management S-System (DBMS). The server provides database access to their clients. The architecture of database server is the client /server architecture.

Web server
The server works in three tier architecture. Web server resides in between applications server and client. The client sends request to the application through web server.

Application server
The Applications are hosted in the application server. The web server connects the application server as well as client. The server process the request of client and sends response through web server.

FTP server
It is the application of software enabled. The server enables file transfer among computers. The pictorial representation of FTP server is depicted below:-

Access Instant Computer Science Assignment Help and Assessment Help Service across the Globe!!

2.2. Provide IP Subnet Design for the Kandy Branch


IP Subsetdesign


No of users

Block size

Network ID

Broadcast ID

Usable range

Default gateway

Subnet mask

Customer care



Sales and Marketing















Network Team



Server Room

8 Server + SAN


2.5. Implement and configure All required Layer 2 and Layer 3 solutions (including redundancy) * to Kandy Branch LAN according to the requirements given in the scenario.

2.5 Implementation and configuration of layer 2 and layer 3 solutions (including redundancy)

Switches switch data between devices using MAC address of the devices. The switch can lead to collision between devices when trying to transmit data at same time. Layer 2 switch uses VLAN to avoid collision. Layer 3 redundancies are required to connect LAN and VLAN of the network.

*Note: - Screen shots of Configuration scripts should be presented.

Task 3

Produce an appropriate WAN solution to a set of organizational requirements.


3.1. Describe various WAN technologies with their characteristics, which are used in industry and protocols associated with them and select WAN Technology for given scenario and justify your selection. (ATM, MPLS , Frame relay, X. 25,) , What is it? Advantage and disadvantage

Task 3
WAN solution to set of organizational requirements

3.1 WAN technologies and their characteristics
The below diagram depicts WAN switching technologies:-

WAN technology protocols

X.25 is packet switching technologyallows remote systems are communicating with each other through private links. The protocol has the initial 3 layers of OSI model such as physical, data link and Network layer. Two types of logical connection exist in X.25 such as S-Switched V-virtual C-circuits -SVC, P-Permanent V-virtual C-circuits (PVC).

Frame Relay
The protocol is packet switching technology to make connection in LANs and WANs. It shares common physical layer for more than one connection. It supports the feature of multiplexing. It needs the components such as switches, bridges and routers to transmit data into frame relay format. It uses the following types of connections such as P-Permanent V-virtual C-circuits -PVC and S-Switched V-virtual C-circuits -SVC.it performances better than X.25 with low cost.

A-Asynchronous T-Transfer M-Mode (ATM) uses T-time D-division M-multiplexing (TDM) for communication. The protocol is connection oriented to support video, voice and data. It converts data into small fixed size blocks. It offers high bandwidth at dynamic nature. The traffic is simple ad efficient due the same size of data blocks. The small size data efficiently utilize the available bandwidth.

MPLS is one of the new techniques for packet forwarding. In traditional network, packets are transmitted from source to destination through different routers. Each router has the routing table to forward the packets. This task is known as IP forwarding. IP forwarding is done in the network layer or 3rd layer from physical layer.
MPLS Multiprotocol Label switching is different from IP forwarding. In IP forwarding IP addresses are used to forward the packets. Based on the IP addresses next hop is decided by the router using the routing table. MPLS uses labels of the packets for forwarding. So the technique is called as Multiprotocol Label Switching. Apart from, Internet protocol it supports A-Asynchronous T-Transport M-Mode and F-Frame R-Relay protocols.

IN TCP/IP model, MPLS layer presents in the between the two layers such as Data Link Layer and Network Layer. The MPLS layer is called as layer 2.5 or protocol of Shim.

The header of MPLS packets has 32 bits. The header has four fields such as label value, Experimnetal (Exp), B-Bottom O-of S-Stack, T-Time T-To L-Live. Label has 20 bits. Experimental -Exp has has 3 bits. The fields are used for Q-Quality O-Of S-Service. More than one MPLS label exists for network packets. The value ‘1' indicates the label of the packet is Bottom of Stack otherwise the value wil be ‘0'. The TTL field has 8 bits. The value of TTL is decreased at every hop which is used to avoid the network traffic and collision.

WAN technology for given scenario and justification
The WAN technology suggested for the given scenario is MPLS. The technology has the advantages of ATM and frame relay protocols.

Task 4
Solve a range of network related problems using appropriate troubleshooting techniques and methods.

4.1. Explain the importance of Network monitoring related to LAN and WAN.


Solving network related problems using troubleshooting techniques and methods

4.1 Network monitoring related to LAN and WAN
Network monitoring is task of collecting important information about the network. The collected information is useful to control and upgrade the performance of the network. The main objectives of network monitoring are as follows:-
• Monitoring network performance
The monitoring systems keep track of the traffic in the network. the system record the incoming packets, outgoing packets, transmission speed, throughput, bandwidth and so on. These are parameters related with the network performance. The detailed analysis data provides more insight information on the network. the root causes for the performance degradations can be identified efficiently.
• Monitoring fault
The networking monitoring system is also act as fault monitoring system. The failures and issues in the network are identified as well as root caused. The abnormal activities or malicious activities are captured through the system. It restrict the access over the sensitive resources on the network.
• Monitoring account
The objective of the network monitoring system should provide Authentication, Authorisation as well as Accounting. The network monitoring system monitors and allows authorized access of resources through authentication process with accounting principles .Accounting principles deals about the access rights of users over the resources.
• Security
One of the main objectives of network monitoring is to provide security for resources. The monitoring tools perform operations on 24x7 basis. Tracking of network resources and alerting network administrators when the issues raise into the network is the main tasks for the network monitoring tools. It also give alerts when any device get failure or down and network administrator take proper remedies for such issues efficiently.
• Troubleshooting
Another important advantage for network monitoring tool is diagnosis. The tool provides the details about the devices failure, malfunctioning and so on. The root of the network issues can be tracked with the tool.
• Saving sensitive resources
The tool can provide lot of security for the resources. It keeps track of network performance, device usage, working behaviour and so on. It saves time and money due to proper management of resources through network monitoring task.
• Efficient planning for updation
Monitoring tools monitor the status of the devices. The health of the network as well as devices can be reported through the monitoring tool. From the report network administrator can make their plan for replacing or updating devices and technologies of the existing network to increase the performance of the network.

4.2. Describe few Network Monitoring Tools and Protocols, which are used in industry with their characteristics. (3 tools example minimum Whatsup, Nagios/ SCOM )

4.2 Network Monitoring Tools and protocols used in industry
The networking monitoring software WhatsUpGold is user friendly and attractive features. The featureas are as follows:-
• Automatic detection of network
• Monitoring network continuously and alter management
• Dashboards and dashboards
• Map network
• Monitoring cloud
The tools are open source for continuous network monitoring. It detects issues related with servers and applications and its root causes. It is active and fix issues in complicated situations. It has the features such as scalability, secure. It offers web interface and automatic alert system. The following network services can be monitored such asFTP, HTTP,SSH, POPSNMP,SMTP, HTTP

• It does not monitor throughput
• The tool treat all the devices are same
• Configuration files are difficult to understand
It performs network monitoring and it has to be installed on server. It can monitor any applications, server, and databases and so on.
The architecture of SCOM is depicted below:-

Figure 40Data flow
• Customizable
• Monitor servers as well as custom applications
• Monitor resources of azure and server of on-prem
• Produces noise
• No flexible reporting and alert
• Performance is lower than other monitoring tools

4.4. Develop test cases and Test the above LAN and WAN* designs to verify whether the design objectives are met. (Ping , Trace )

4.4 Test cases and Test
Below test, cases were run on the current network and the simulation results are shown on the screen.

S.no Test case Test
1 No communication among department - unless special requirements VLAN configuration
2 is given access to all departments except server Setting access list
3 Sales and Marketing access Kandy Head office through secure channel VPN Configuration
4 Customer care and sales team not allow to use finance web server Setting access list

4.5. Explain and document the troubleshooting steps following scenarios;

a. Kandy branch users cannot access the resources in server located at Colombo Head office.
b. Customer Care users can access File Servers at Kandy branch but Sales andMarketing users cannot access the same Servers but can access the Internet.


Explanation and documentation of troubleshooting steps

Step 1: check with hardware
It deals about physical devices and their connection, power condition, state of the devices switch off/On.

Step 2: IP configuration using ipconfig
While giving ipconfig in the command prompt router ip address and computer IP address will be displayed. To check status of the IP address of the current system the command will be used.

Step 3
Ping &tracert test
To check the connectionstatus with the destination computer for verifying the traffic is performed or not. Ping destination address. It will display response from destination when it is connected otherwise it displays request time out message.

Step 4: DNS check
The command nslookup used to verifying the issues associated with server.it gives the response such as Tome out, refused, server failure, No response or unreachable.

Step 5 :Check protection of virus & malware
Check the antivirus and antimalware software are working properly. If there is problem with the anti-wares will affect the function of the network.

Step 6: Verification of database
Reviewing log of database is important to verify the functions of the database.
a. Kandy branch users cannot access resources in server located at Colombo head office
IP tables has rules for allowing or disallowing input, forward or output traffic. While setting rules at IP tables it restrict access to resources on network.
# iptables -A input -d -j reject
a. Customer care users can access file servers at Kandy branch but sales and marketing users cannot access the same servers but access Internet
# iptables -A input -d -j Accept

• Can able to understand the networking concepts
• Working experience provides depth knowledge on networking devices and working principles
• Can design network for any scenario
• Know latest techniques and applicability
• Can correlate theoretical knowledge with the applications
• No

For the EMC, the suggested and implemented network model is the H-Hierarchical N-Network M-Model (HNM) or 3 layer N-network M-model (3-NM). The models provide various features for managements, security, and flexibility and so on. The management of network devices and operations are efficient due to the three layers such as access layers, distribution layer as well as core layer. Each network components are well arranges in the model. Switches exist in access layer, routers present in distribution layer to connect different networks. Core layer performs aggregation of corporate network with public network. The techniques and technologies adopted in EMC provides high performance communication for the corporate.







Are You Looking for Transport Network Design Assignment Help, Diploma in Computing?

Avail Perfect Unit 15 Transport Network Design - BTEC Higher National Diploma in Computing Assignment Help Suggested By Writers!!

Learning Outcomes and Assessment Criteria

Grading Criteria




LO1 Explore LAN design principles and their application in the network design process


P1 Examine the network design models and features of scalable networks based on agiven set of businessneeds. (dual cable with Setup)




P2 Discuss LAN redundancy, bandwidth and load related issues and possible solutions with reference to Layer 2 and Layer 3 of the OSI Model.




M1Analyse the switchand router redundancyprotocols and theireffectiveness insupporting scalablenetworks.




LO2Implement a network using LAN designprinciples based on a predefined set of requirements


P3 Evaluate your report findings and research.




P4 Implement a LAN design with Layer 2 and Layer 3 redundancy using switch and router redundancy protocols.




M2Analyse differentswitch redundancyprotocols and their effectiveness in solvingredundancy issues.




M3Analyse Layer 3 Redundancyimplementations for IPv4and IPv6.




LO 1&2



D1 Evaluate different implementations of link aggregation using Ether Channel to solveb and width and load issues.




LO3 Produce an appropriate WAN solution to a set oforganisational requirements


P5Examine WAN technologies and select the appropriate one for aset of enterprise requirements.




P6 Configure WANprotocols as part of anenterprise network solution.




M4 Analyse the benefitsand drawbacks of privateand public WANtechnologies.






M5Evaluate features and benefits of different VPN types based onorganisational needs.




LO4Solve a range of network related problems usingappropriate troubleshooting techniques and methods


P7Deploy network monitoring tools and troubleshooting methodsto establish network baselines and producenetwork documentation.





P8Troubleshoot LAN and WAN connectivity issuesat different networkinglayers.




M6Develop effective documentation oftroubleshooting methodsand steps based on agiven scenario.




LO 3&4



D2 Evaluate troubleshooting methods and their effectiveness in solving enterprise-wide networking issues.




Avail HND Assignment Help Services for its related units and courses such as:-

  • Unit 21 Data Mining Assignment Help
  • Unit 9 Software Development Lifecycles Assignment Help
  • Unit 19 Data Structures & Algorithms Assignment Help
  • Unit 11 Maths for Computing Assignment Help
  • Unit 16 Cloud Computing Assignment Help
  • Unit 13 Computing Research Project Assignment Help
  • Unit 17 Network Security Assignment Help
  • Unit 20 Advanced Programming Assignment Help
  • Unit 8 Computer Systems Architecture Assignment Help
  • Unit 18 Discrete Maths Assignment Help
  • Unit 10 Website Design & Development Assignment Help
  • Unit 12 Data Analytics Assignment Help
  • Unit 15 Transport Network Design Assignment Help