Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Transport Network Designs, Study Guides, Projects, Research of Computer Communication Systems

these are the complete assignments of Transport network design

Typology: Study Guides, Projects, Research

2021/2022

Uploaded on 05/06/2023

abdul-rehman-kdf
abdul-rehman-kdf 🇮🇳

5

(1)

2 documents

1 / 99

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title Higher National Diploma in Computing
Assessor
Mr. Geethika sampath
Internal
Verifier
Unit(s)
Unit 15: Transport Network Design
Assignment title
Design and Implement a network for EMC
Student’s name
Sandun Poulier
List which assessment criteria
the Assessor has awarded.
Pass Merit Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Y/N
Has the work been assessed
accurately?
Y/N
Is the feedback to the student:
Give details:
Constructive?
Linked to relevant assessment criteria?
Identifying opportunities for improved
performance?
Agreeing actions?
Y/N
Y/N
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Assessor signature
Dat
e
Internal Verifier signature
Dat
1
011362 Transport network design
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63

Partial preview of the text

Download Transport Network Designs and more Study Guides, Projects, Research Computer Communication Systems in PDF only on Docsity!

INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title Higher National Diploma in Computing Assessor Mr. Geethika sampath Internal Verifier Unit(s) Unit 15: Transport Network Design Assignment title Design and Implement a network for EMC Student’s name Sandun Poulier List which assessment criteria the Assessor has awarded. Pass Merit (^) Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? (^) Y/N Is the feedback to the student: Give details:

  • Constructive?
  • Linked to relevant assessment criteria?
  • Identifying opportunities for improved performance?
  • Agreeing actions? Y/N Y/N Y/N Y/N Does the assessment decision need amending? (^) Y/N Assessor signature Dat e Internal Verifier signature Dat 1 Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date

e Programme Leader signature (if required) (^) Dat e 2

Assignment Feedback

Formative Feedback: Assessor to Student Add more illustration for the document Relate to the scenario Implement configuration (Vlan, Syslog, VPN etc.) Action Plan Document structure Summative feedback Feedback: Student to Assessor The tutor teached well in a simple manner that everyone could understand very well and his examples were very useful and simply understandable. The lesson was very useful now and in future. Thank you so much sr. Geethesoft@gmail.com (^) 05/02/ 4

Assessor signature Date Student signature Date

Pearson Higher Nationals in

Computing

Unit 15: Transport Network Design

5

  1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work.
  2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted.
  3. Ensure that you give yourself enough time to complete the assignment by the due date.
  4. Excuses of any nature will not be accepted for failure to hand in the work on time.
  5. You must take responsibility for managing your own time effectively.
  6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension.
  7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
  8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment.
  9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
  10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work.
  11. I know that plagiarism is a punishable offence because it constitutes theft.
  12. I understand the plagiarism and copying policy of Edexcel UK.
  13. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program.
  14. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way.
  15. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 7
  1. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: Date: ( Provide E-mail ID ) ( Provide Submission Date )

Higher National Diploma in Business Computing

Assignment Brief

Student Name /ID Number Sandun Poulier - KAN/A - 011362 Unit Number and Title Unit^ 15:^ Transport Network^ Design Academic Year 2020/ Unit Tutor (^) Mr. Geethika sampath Assignment Title Issue Date Submission Date 05.02. IV Name & Date 8

The submission should be in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with evidence. You must provide in-text citations and the reference list using Harvard referencing system. Unit Learning Outcomes: Learning Outcomes By the end of this unit students will be able to: LO1: Explore LAN design principles and their application in the network design process. LO2: Implement a network using LAN design principles based on a predefined set of requirements. LO3: Produce an appropriate WAN solution to a set of organisational requirements. LO4: Solve a range of network related problems using appropriate troubleshooting techniques and methods. 10

Assignment Brief and Guidance: 11

  • Sales and Marketing Team should be able to access resources at Kandy office and the head office securely during the field visits.
  • Proper methods for networking monitoring and troubleshooting need to be established.
  • Customer Care and Sales team should not be allowed to access the Finance Web server in Kandy server Room.
  • All possible network security mechanisms should be implemented. Assume you are a trainee network engineer at EMC Solutions. Prepare a network architectural design and implementation with your suggestions and recommendations to meet the company requirements. (Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but main requirements should not be violated) Task 1 1.1. What do you mean by Network Design Model? Examine the Network Design 13

Models and their features. Justify your suggestion for the above scenario. 1.2. Discuss and analyze LAN redundancy, bandwidth and load related issues with reference to Layer 2/ Layer 3 redundancy protocols , and discuss possible solutions that could be provided for the above scenario. 1.3. Evaluate different Link Aggregation protocols used in the industry. Recommend a protocol/protocols for the above scenario and justify your selection. Task 2 2.1. Select LAN devices based on features and requirements. 2.2. Provide IP allocation plan and design the network for EMC Solutions (including WAN) applying basic configuration commands for the network connectivity in the LAN. 2.3. Implement Layer 2 and Layer 3 redundancy using switch and router redundancy protocols in your network. Analyse the redundancy implementations for IPv4 and IPv6. *Note: - Screenshots of Configuration scripts should be presented. Task 3 3.1. Examine various WAN technologies for the given scenario and analyse the benefits and drawbacks of them. Select the appropriate WAN technology for EMC solutions. 3.2. Configure appropriate WAN protocols for the above scenario. 3.3. Evaluate features and benefits of different VPN types that could be used for the above scenario. *Note: - Screenshots of Configuration scripts should be presented. Task 4 4.1. Explain the importance of Network monitoring and troubleshooting to establish network baselines and produce network documentation. Deploy the same. 14

Table of Contents

  • Acknowledgement.................................................................................................................................................................
  • Table of figures......................................................................................................................................................................
  • Table of table.........................................................................................................................................................................
  • Task 1....................................................................................................................................................................................
    • 1.1 network design model..................................................................................................................................................
      • 1.1.1 Type of Network Design Model..............................................................................................................
      • 1.1.2 Hierarchical Network Design Overview.................................................................................................
      • 1.1.3 Suggest a network design model for the above scenario and justify your suggestion............................
    • 1.2 LAN redundancy..........................................................................................................................................................
      • 1.2.1 Importance of Layer 2 redundancy.........................................................................................................
      • 1.2.2 Importance of Layer 3 redundancy.........................................................................................................
    • 1.3 link aggregation protocol.............................................................................................................................................
      • 1.3.1 Port Aggregation Protocol.......................................................................................................................
      • 1.3.2 Importance of Link Aggregation in the industry.....................................................................................
      • 1.3.3 Importance of Link Aggregation protocol...............................................................................................
      • 1.3.4 Recommend a protocol/protocols for the above scenario........................................................................
  • Task 2....................................................................................................................................................................................
    • 2.1 Provide a list of Network Devices and justify your selections for the above Network Design.....................................
    • 2.2 Provide IP Subnet Design for the Kandy Branch.........................................................................................................
      • 2.2.1 IP Address and Subnet mask...................................................................................................................
      • 2.2.2 Complete Network Diagram Including WAN for the above scenario according to your design............
      • 2.2.3 Configure all the network devices with basic configurations.................................................................
    • requirements given in the scenario..................................................................................................................................... 2.5 Implement and configure all required Layer 2 and Layer 3 solutions to Kandy Branch LAN according to the
      • 2.5.1 Layer Two Switches Implement Configurations.....................................................................................
      • Layer Three Switches Implement Configurations...........................................................................................
  • Task 3....................................................................................................................................................................................
    • 3.1 Wan technologies.........................................................................................................................................................
      • 3.1.1 WAN Protocols........................................................................................................................................
      • 3.1.2 Types of WAN Technologies...................................................................................................................
      • 3.1.3 Characteristics of WAN...........................................................................................................................
    • 3.2 Implementation and configuration of WAN technology to the above Network............................................................
      • 3.2.1 WAN Technology for the given scenario..................................................................................................
      • 3.2.2 Private and public WAN technologies....................................................................................................
    • 3.3 Virtual Network for WAN - Different VPN types........................................................................................................
  • Task 4- Solve a range of network related problems using appropriate troubleshooting techniques and methods.......
    • 4.1 Network monitoring.....................................................................................................................................................
      • 4.1.1 Network monitoring tools and features...................................................................................................
      • 4.1.2 Network monitoring protocols................................................................................................................
      • 4.1.3 Implementation and Configuration of Network Monitoring Tool/Tools to the above Network.................
      • 4.1.4 test cases and Testing of the above LAN and WAN designs..................................................................
    • 4.2 Explaination and document of troubleshooting steps for the following scenarios;.......................................................
      • 4.5.1 Troubleshoot LAN and WAN at different networking layers...................................................................
      • 4.5.2 Kandy branch users cannot access the resources in the server located at Colombo Head office...............
      • access the same Servers but can access the Internet......................................................................................... 4.5.3 Customer Care users can access File Servers at Kandy branch but Sales and Marketing users cannot
  • References.............................................................................................................................................................................
  • Gantt chart.............................................................................................................................................................................
  • Figure 1: Flat Switched Network............................................................................................................................. Table of figures
  • Figure 2: Hierarchical Network...............................................................................................................................
  • Figure 3: Multi Building Enterprise Network Design.............................................................................................
  • Figure 4: Access Layer.............................................................................................................................................
  • Figure 5: Distribution Layer....................................................................................................................................
  • Figure 6: Core Layer................................................................................................................................................
  • Figure 7: Large Enterprise Network Design............................................................................................................
  • Figure 8: LAN redundancy......................................................................................................................................
  • Figure 9: Example of a Spanning Tree Ethernet network (Cisco)...........................................................................
  • Figure 10: Layer 3 redundancy with HSRP.............................................................................................................
  • Figure 11: VRRP......................................................................................................................................................
  • Figure 12: GLBP......................................................................................................................................................
  • Figure 13: HSRP (Hot Standby Router Protocol)....................................................................................................
  • Figure 14: Link Aggregation Control Protocol........................................................................................................
  • Figure 15: Port Aggregation Protocol......................................................................................................................
  • Figure 16: Router (Cisco 4431 ISR) (Cisco)...........................................................................................................
  • Figure 17: - IOS Router with Firewall (Cisco RV320 VPN....................................................................................
  • Figure 18L: Cisco SFE2000 Switch.........................................................................................................................
  • Figure 19: Cisco Layer 3 Switch..............................................................................................................................
  • Figure 20: Cat-5 cable..............................................................................................................................................
  • Figure 21: Network Diagram for EMC Solution.....................................................................................................
  • Figure 22: Show ip interface brief in Router...........................................................................................................
  • Figure 23: show vtp status check in layer 3 switch..................................................................................................
  • Figure 24: show vlan int brief in layer 3 switch......................................................................................................
  • Figure 25: in check dhcp Ip address a pc.................................................................................................................
  • Figure 26: DHCP pool.............................................................................................................................................
  • Figure 27: configure logging security......................................................................................................................
  • Figure 28: customer care Vlan Port Assign..............................................................................................................
  • Figure 29: Sales and Marketing Vlan Port Assign...................................................................................................
  • Figure 30: enable security........................................................................................................................................
  • Figure 31: Enable Spanning Tree BPDU guard and PVST configuration...............................................................
  • Figure 32: Create Etherchannel................................................................................................................................
  • Figure 33: Static Ip address Assign with IP route....................................................................................................
  • Figure 34: Assign Vlans Ip Address, IP helper Address and standby ip..................................................................
  • Figure 35: WAN technologies..................................................................................................................................
  • Figure 36: EMC Solution WAN Network Design....................................................................................................
  • Figure 37: IP route Configuration............................................................................................................................
  • Figure 38: OSPF Protocol Activation and Static IP Route......................................................................................
  • Figure 39: network monitoring................................................................................................................................
  • Figure 40: network monitoring system....................................................................................................................
  • Figure 41: Syslog monitoring..................................................................................................................................
  • Figure 42: application logs.......................................................................................................................................
  • Figure 43: network security logs..............................................................................................................................
  • Figure 44: system logs.............................................................................................................................................
  • Figure 45: Wireshark network monitoring and Analyze (author developed)...........................................................
  • Figure 46: Wireshark network monitoring and Analyze (AuthorDeveloped)..........................................................
  • Figure 47: Wireshark network monitoring and Analyze (AuthorDeveloped)..........................................................
  • Figure 48: show interface Command.......................................................................................................................
  • Figure 49: Troubleshooting at OSI Layer 3.............................................................................................................
  • Figure 50: Troubleshooting at OSI Layer 3.............................................................................................................
  • Figure 51: Check IPsec status..................................................................................................................................
  • Figure 52: check access control list.........................................................................................................................
  • Figure 53: check vlan status.....................................................................................................................................
  • Table 1: difference between LACP and PAGP......................................................................................................... Table of table
  • Table 2: IP Address and Subnet mask......................................................................................................................
  • Table 3: Test plan For Department to access DHCP Server Test Plan.....................................................................
  • Table 4: Test plan For Department to access DNS (WEB Server) Server Test Plan...............................................
  • Table 5: Security Testing – Test plan.......................................................................................................................
  • Table 6: Test case For Department to access DHCP Server - Test case...................................................................
  • Table 7: Test case For Department to access DNS (WEB Server) Server - Test case.............................................
  • Table 8: Security Testing – Test Case - Test case.....................................................................................................