Professional Documents
Culture Documents
Contents
Part 1 ...................................................................................................................................................... 4
Introduction ........................................................................................................................................... 4
Network Design Model ......................................................................................................................... 4
The Flat Network Model ...................................................................................................................... 4
The Star Network Model ...................................................................................................................... 4
The Ring Network Model ..................................................................................................................... 5
The Mesh Network Model .................................................................................................................... 6
The Three-Tier Network Model........................................................................................................... 6
Core layer .............................................................................................................................................. 8
Distribution layer .................................................................................................................................. 8
Access Layer .......................................................................................................................................... 8
Characteristics of scalable network ..................................................................................................... 8
Lan Redundancy Concept with possible layer 2 and layer 3 of the OSI model solution ................ 9
Fault Tolerance ................................................................................................................................... 10
High Availability ................................................................................................................................. 10
Switch and Router Redundancy Protocols and their effectiveness in supporting scalable
networks: ............................................................................................................................................. 10
Network Design for the NEC.............................................................................................................. 11
Router Configuration ......................................................................................................................... 12
Assigning IP address in Router.......................................................................................................... 13
Configuration of Layer-2 Switch in Cisco Packet Tracer Tools ..................................................... 14
Some basic security applied in layer 2 switch ................................................................................... 15
Configuring Remote Access ............................................................................................................... 15
Securing Privileged Exec Mode ......................................................................................................... 16
Selecting Network Devices .................................................................................................................. 16
Analyzing PVST+ and Rapid PVST+ protocols. .............................................................................. 17
Differences between PVST and Rapid PVST ................................................................................... 17
First-hop redundancy protocols in IPv4 and IPv6 ........................................................................... 18
HSRP .................................................................................................................................................... 19
Evaluation of Ether channel technology with solving bandwidth and load issues. ....................... 19
Ether channel ...................................................................................................................................... 19
Conclusion ........................................................................................................................................... 20
Part 2:................................................................................................................................................... 20
Introduction ......................................................................................................................................... 20
Network Layer................................................................................................................................. 31
Transport Layer .............................................................................................................................. 31
Session Layer ................................................................................................................................... 32
Presentation Layer .......................................................................................................................... 32
Application Layer ........................................................................................................................... 32
Evaluating troubleshooting methods with effectiveness in solving enterprise based network ..... 32
Troubleshooting Methodologies .................................................................................................... 32
Troubleshooting Principles ............................................................................................................ 33
Gathering information................................................................................................................ 34
Analyzing information ................................................................................................................ 34
Eliminating possible causes:....................................................................................................... 34
Formulating a hypothesis: .......................................................................................................... 34
Testing the hypothesis: ............................................................................................................... 34
Structured Troubleshooting Approaches ..................................................................................... 35
Mainly troubleshooting approaches include the following: ............................................................ 35
Top down: ..................................................................................................................................... 35
Bottom-up...................................................................................................................................... 35
Divide and conquer ....................................................................................................................... 36
Follow the path.............................................................................................................................. 36
Spot the differences....................................................................................................................... 36
Move the problem ......................................................................................................................... 36
Top-Down Troubleshooting Method ............................................................................................. 36
Bottom-Up Troubleshooting Method ............................................................................................ 36
Divide-and-Conquer Troubleshooting Method ............................................................................ 37
Follow-the-Path Troubleshooting Method.................................................................................... 37
Spot-the-Differences Troubleshooting Method ............................................................................ 37
Move-the-Problem Troubleshooting Method ............................................................................... 37
Conclusion ........................................................................................................................................... 38
Bibliography ........................................................................................................................................ 39
Part 1
Introduction:
In this task, we are hired as network administrator for designing a suitable network design for
NEC (Nepal Education Center) college which is located in Kathmandu valley. So, we have to
design which technology is the best and suitable for this big project and why? Also take care
of which kind of Network design and Network security is best for this project.
goals. These benefits, which are typically incorporated in hierarchical designs, are either not
found inherently in the other models or not as easily included in them. Following is a closer
look at the benefits just mentioned. Scalability as shown in the previous models, scalability is
frequently limited in network designs that do not use the three-tier model. While there may still
be limitations in the hierarchical model, the separation of functions within the network provides
natural expansion points without significantly impacting other portions of the network.
Basically Three-tier Hierarchical Network Model consists of three layers:
The above picture can further explain based on the below picture:
Core layer:
In this layer, it consists of biggest, fastest, and very expensive routers with the high model
numbers and core layer is considered as the backbone of networks. The core layer of routers is
used to merge geographically separated networks. The Core Layer routers move information
on the network as fast as possible. The switches operating at core layer switches packets as fast
as possible. Core layer is the hub for the inter connects networks. There are some attributes of
this layer which is given below:
1. High speed
2. Reliability and Availability
3. Redundancy
4. Load balancing
5. Quality of service
6. No filters, packet handling or other overhead
Distribution layer:
The Distribution Layer is located between the access and core layers. The purpose of this layer
is to provide boundary definition by implementing access lists and other filters. Therefore, the
Distribution Layer defines policy for the network. Distribution Layer include high-end layer 3
switches. Distribution Layer ensures that packets are properly routed between subnets and
VLANs in your enterprise. Some of the attributes of this layer is given below:
1. Policy routing
2. Access control to core devices
3. Filtering
4. Separate multicast and broadcast domains. (using layer 2 and 3 technologies)
5. Media translation and boundaries (e.g. Fast Ethernet to Gigabit Ethernet)
6. Security
7. Routing between VLANS
Access Layer:
Access layer includes access switches which are connected to the end devices (Computers,
Printers, Servers etc.). Access layer switches ensures that packets are delivered to the end
devices. The key attributes of the access layer are given below:
1. Security
2. Authentication
3. Rate limiting
4. STP
5. High availability
Lan Redundancy Concept with possible layer 2 and layer 3 of the OSI model solution:
Network redundancy is the process of adding additional instances of network devices and lines
of communication to help ensure network availability and decrease the risk of failure along the
critical data path. The underlying premise that explains the importance of network redundancy
is simple. Without any backup systems in place, all it takes is one point of failure in a network
to disrupt or bring down an entire system. Redundancy in networks helps to eliminate single
points of failure to ensure better network stability and uptime in the face of events that would
otherwise take the network offline.
Multiple devices can be connected together on a network using a switch. These switches, as
opposed to hubs, separate the collision domain and as such, they improve connectivity. These
switches operate at the data link layer (Layer 2) of the OSI model and they switch frames from
one port to the other based on their destination MAC addresses. The MAC addresses and port
information are learned dynamically from the source MAC address of frames and stored in a
MAC table on the switch. Finally, switches can be further segmented into different broadcast
domains using VLANs. When we have more devices/users than a switch can handle, we usually
introduce another switch and in large networks, these switches can easily become hundreds, or
even thousands across the switched domain. Cisco, and other large network vendors,
recommends a hierarchical design (tiered design) where lower capacity switches are used to
provide access to users and switches with a higher capacity and throughput are deployed at the
distribution and core layers. In order to prevent Layer 2 loops on a switched network, Switches
use the Spanning Tree Protocol to determine which ports can forward frames at a particular
time. The Spanning Tree Protocol is an algorithm which was developed by Radia Perlman (and
standardized as the IEEE 802.1D protocol). Basically, switches select a root bridge and based
on their closeness to the root bridge, they determine root ports, designated ports and blocking
ports. Any port that is determined to be a blocking port would not forward traffic to prevent
loops from occurring on the network. When there is a change on the network, the algorithm is
run again and ports are assigned new roles.
Hot Standby Router Protocol (HSRP) is a Cisco proprietary protocol that allows several routers
or multilayer switches to appear as a single gateway IP address. It provides redundancy for the
layer 3 functions in our networks. Other protocols that provide the same redundancy include
Virtual Router Redundancy Protocol (VRRP) and Gateway Load Balancing Protocol (GLBP).
VRRP is a standard protocol, but is very similar to HSRP in operation. GLBP becomes
advantageous when you start load balancing, which I will discuss later. But why do we need
these?
The figure below is a given network; the user’s machines are assigned a default gateway. They
use ARP to acquire the layer 2 address of the default gateway. As far as the user’s machine is
concerned, this is all they know. They have no backup or alternate default gateway. When the
router that is the default gateway goes down, or the physical path to the router, your machine
no longer has a default gateway. Even if there is another router present on that network
segment, its information does not match what the user’s machine is assigned. This is where
layer 3 redundancy comes in.
In fact, there are two forms of redundancy that data centers use to ensure system will stay up
and running:
Fault Tolerance
A fault-tolerant redundant system provides full hardware redundancy, mirroring applications
across two or more identical systems that run-in tandem. Should anything go wrong with the
primary system, the mirrored backup system will take over with no loss of service. Ideal for
any operations in which any amount of downtime is unacceptable (such
as industrial or healthcare applications), fault-tolerance redundant systems are complex and
often expensive to implement.
High Availability
A software-based redundant system, high availability uses clusters of servers that monitor one
another and have failover protocols in place. If something goes wrong with one server, the
backup servers take over and restart applications that were running on the failed server. This
approach to network redundancy is less infrastructure intensive, but it does tolerate a certain
amount of downtime in that there is a brief loss of service while the backup servers boot up
applications.
Switch and Router Redundancy Protocols and their effectiveness in supporting scalable
networks:
The purpose of switch and router redundancy protocols is to support networks. These protocols
are all a form of first hop redundancy protocol whereby a number of physical routers are
configured to appear as if they were one logical router. By using these protocols, it makes client
configuration and communication simpler due to the configuration of a single default gateway
and the host machine will use standard protocols to communicate. These protocols present a
virtual router to the clients with the network with its own IP and MAC address and this IP
address is the default gateway of the clients. The MAC address is the address that will be sent
when an ARP request is sent by one of the clients. The responsibility is given to the redundancy
protocol to choose what physical router will forward the traffic and what one will be in standby
in case the active router fails. If this does happen, the clients will be unaware as the network
will not be affected due to the standby router holding the same IP address as the previous active
router. These redundancy protocols support scalable networks as by implementing these
protocols, it means there are alternative paths available if the dedicated path were to fail or
become unavailable. HSRP and the previously mentioned protocols provide load balancing
within the infrastructure and redundancy. It solves the problem that STP or RSTP+ does not
provide in terms of backup and network availability through different routes.
The HSRP works by through one router acting as active, and all the other routers as standby.
Although these standby routers are only ever used if the active router fails, it does mean that if
this failure does occur, the network is available and reliable. The active and standby routers
communicate by using multicast Hello messages, these are normally sent every three seconds.
If the standby router stops receiving the packets from the active router it will automatically
take over the active router role. VRRP works in the same way as HSRP, however is the open
standard whereas HSRP is a Cisco proprietary protocol. When configuring HSRP standby
groups, situations can be eliminated by which a single point of failure can cause traffic
interruptions. These protocols reduce the failover time that the network takes to re-converge;
HSRP supports IPv6 which is another example of how these protocols support scalable
networks. If the network engineer decided to add another service or device to the network, with
these protocols configured, the network would not be affected due to the short time it takes the
network to see the issue and re-converge and choose a new path. All of these factors are support
protocols for scalable networks as if they were not configured, the network would more than
likely see a delay, and load and bandwidth would be affected.
Router Configuration:
S. How to do Screenshot
N work?
1: At first bring
in the USER
EXEC
MODE by
pressing
Enter
2: Then type
enable and
press enter to
inter into
privileged
mode
3 Then type
configure
terminal and
press enter
and insert
into global
configuratio
n mode
where you
can give the
router name
using the
hostname.
4 Then type
host keyword
and provide
the router
name as you
want and
press the
enter/
As you can
see the router
name was
changes
successfully
1 Bring into
global
configuration
mode and
then select
interface to
assigning the
IP address by
typing fast
Gigabit
Ethernet 0/1
Furthermore,
after the
entering to
the interface
type IP
address and
subnet mask
like as this
192.168.2.10
0
255.255.255.
0
And at last,
after finishing
these steps
type no
shutdown
command and
hit enter then
only you ip
will assigned
in that port.
As the network administrator of the NEC I have the responsibility to prepare network topology
and deploy it as required by the organization. Designing and deploying the network will be
possible but implementing the designed topology in the SMART way not only make
organization secured also reduces the time as well as the economy to. Well analyzing all the
requirement of the NEC is possible but if the mention the budget then it will be more effective
to choose security as well as other devices respectively. But as the network administrator I have
choose the low cost required devices with more features to create the secured environment for
the organization. As considering in the requirement part there are 20 classes where 40 students
will obtain the IP addresses in their devices.
features that are available. Within the Hierarchical Design and its distribution layer, routing is
required to enable devices outside the local network to communicate.
3 For example, you can have different For example, you can instead have one
root bridge on different VLANs (so that instance with VLAN 1-500 and another
spanning tree does not have to run as a instance with VLANs 501-1000
whole on the layer 2 domain, but can
run a different instance per-VLAN)
4 Support in older switches inside the Did not support old switches.
enterprise network.
5 CPU and memory requirements are high The CPU and memory requirements are
due to maintaining separate STP less than for Rapid PVST but more than
instances per VLAN for 802.1D.
So, as we know that IPv6 uses ND and has a mechanism for detecting default routers and
failover, why do we need FHRPs? I would think that FHRPs are there for the same reason we
have so many protocols that sort of overlap we are always looking for a better mouse trap.
And in limited testing, relying on ND for default router and failover does not scale to provide
the predictable and reliable configurations that the FHRPs do. For example, I found no
preempt capabilities for the default router election. I will also make a nod to IPv6 security and
mention that NUD has no authentication mechanism. Authentication can be accomplished
using Secure Neighbor Discovery (SeND).
Now back to FHRPs, let’s do what we do and mock up a very basic FHRP network on a LAN
segment, and take a look at a few configuration parameters. We’ll start with HSRP, then GLBP,
as well as some packet captures with Wireshark and discuss some of the differences between
the IPv4 and IPv6 versions of each. The very basic FHRP network will use HOST1, R1, and
R2 on the LAN for the FHRP and a WAN router with serial interfaces for tracking and failover
scenarios.
HSRP
Hot Standby Router Protocol (HSRP) is Cisco proprietary and was the first FHRP to be
developed. HSRP is configured on a given interface and that interface will be part of a standby
group. As mentioned above, HSRP has multiple routers configured into a standby group, which
will share a virtual IP address and MAC address, whilst providing a default gateway. The
reason behind having a physical IP as well as a virtual is to provide the redundancy; these IP
addresses can either be IPv4 or IPv6 depending on what the network uses. Within HSRP, there
is a priority number; one of the routers will have a higher priority number which means it is
the preferred router, thus the active one. The other standby routers will be configured with the
same virtual IP as the hosts hold this as their default gateway and are not affected if a standby
router takes over.
First step to configure HSRP for IPv6 is to enable HSRP version 2 to support IPv6 standby
version 2. After that, the standby commands are pretty much the same as with IPv4 – creating
groups and adding tracking and preemption capabilities. After configuration of HSRP and the
Active -> Standby negotiation is complete, the Active HSRP router will send the RAs, and the
IPv6 hosts will use the new link local address that is auto configured with the command standby
1 ipv6 autoconfig.
Evaluation of Ether channel technology with solving bandwidth and load issues.
Ether channel
Ether channel is also known as port bonding. It is a port channel technology that is used to
group several ports which is two to eight into one logical channel. My report will demonstrate
the Ether Channel technology and how it helps to solve bandwidth and load issues.
As we know that most of the networks will usually have a number of links between switches
to provide redundancy resiliency on the network. Within a network that is configured with STP,
this protocol will put numerous ports into blocking mode to protect the network from loops and
layer 3 routing protocols will view these links as individual ones. Once ether channel has been
implemented, STP and the layer 3 routing protocols will treat the grouped links as an individual
one which will stop STP from 28 blocking the given ports. There are two aggregation protocols
that can be used to implement ether channel; Port Aggregation Protocol (PAgP) and Link
Aggregation Control Protocol (LACP). PAgP is Cisco’s proprietary protocol that can be used
to configure channels and ether channel on ports. The links in the group must have the same
parameters such as speed, duplex, VLAN information otherwise the ports will not be grouped
into a channel. Once this channel is active, it will be added to STP ad a single bridge port and
PAgP will send packets in 30 second intervals to manage the link for consistency e.g. link
additions, changes and failures. PAgP uses “auto” and “desirable”; auto enables PAgP only if
a PAgP device is detected and desirable enables PAgP unconditionally.
LACP is non-proprietary, thus is used between other vendor networks. It has the same purpose
as PAgP, however uses different commands to configure ether channel on the network. LACP
uses the commands “active” and “passive”; active enables LACP unconditionally and passive
enables LACP only if a LACP device is detected. Ether channel can be configured without
PAgP or LACP by using the command “on”, however Cisco advises one of the protocols to be
used to assist with compatibility issues whilst also managing link additions and failures
between the configured switches. Ether channel helps solve bandwidth issues as it helps
achieve greater speeds by grouping links, thus increasing the amount of bandwidth due to the
links being seen as one link instead of multiple. This technology also solves load balancing
issues as it will balance the traffic load across the links, increasing efficiency on the network.
Another benefit of using ether channel is the redundancy it provides; due to there being multiple
links grouped into one logical channel, there are more available links to mitigate against a loss
of links.
Conclusion:
In the end of this part of the report, I had including the network design models with their
contribution to design the scalable and reliable network. After analyzing different network
design models explained the detailed concept about LAN redundancy with possible solution of
layer 2 and layer 3 of OSI model. Also covered how the redundancy protocols support scalable
networks with the complete network design as per the requirement of NEC. Also included the
selection of the networking devices for the prototype of NEC. After that compared between
PVST and RAPID PVST along with their effectiveness in solving redundancy issues. In
addition, I involved detail explanation of how the first-hop redundancy protocols will work for
IPv4 and IPv6. At last I included the evaluation of Ether Channel technology solving bandwidth
and load issues as required of the task.
Part 2:
Introduction:
As required by the task I will examine WAN technologies and select the appropriate one for a
set of enterprise requirements and analyze the benefits and drawbacks of public and private
WAN technologies. While implementing the designed topology WAN connectivity is the main
way to communicate with branch networks. After that finishing these all parts I will show the
configure WAN protocols as part of an enterprise network. I will include by deploying network
monitoring tools and troubleshooting methods to establish network baselines and produce
network documentation. Also, step by step process of troubleshooting methods with
troubleshoot LAN and WAN connectivity issues at different networking layers and evaluated
features and benefits of different VPN types based on organizational needs. At last will
conclude the entire task with troubleshooting methods and their effectiveness in solving
enterprise wide networking issues.
WAN Technologies:
There are various kinds of WAN technologies, however these can be broken down to either be public
or private WAN technologies. There are benefits and drawbacks to these technologies and these will
be analyzed below.
Leased Lines
Leased Lines is a form of private WAN technologies due to these being point-to-point lines
that are leased from a service provider. These lines are permanent dedicated connections which
provide WAN communication paths from a customer’s site to the provider’s network.
Organizations pay a monthly fee to lease these lines from a service provider which enables
them to use the line. The fee of these lines differs due to there being different capabilities, the
bandwidth that is required and the distance between the connected points.
There are a number of benefits and drawbacks to using leased lines, the advantages being
simplicity, quality and availability. They require minimal knowledge to install and maintain,
the links normally provide high service quality, and due to the dedicated connection, it removes
latency between the connections. The drawbacks are cost and there is limited flexibility. The
point-to-point links tend to be the more expensive type of WAN access, as well as each
endpoint requiring an interface on the router, which increases the equipment. Leased lines have
a fixed capacity, which means that the bandwidth may not meet the requirements specifically.
Dialup
Dialup is another form of WAN access and can be used when there is no other technology
available. This technology is appropriate when there is a requirement for intermittent, low-
volume data transfers.
There are multiple advantages and disadvantages of this technology, the advantages being
simplicity, availability, and low implementation cost. The disadvantages consist of the low data
rates and a long connection time. Similar to that of leased lines, due to this also being a
dedicated circuit, there is little delay or latency for point-to-point traffic, however due to the
low bit rates, voice and video traffic is not effectively sent over the network.
Ethernet WAN
Ethernet started off as a LAN access technology, due to the maximum cable length being on
kilometer. However, there are newer Ethernet standards that use fiber-optic cables which make
it possible for Ethernet to now be a WAN technology e.g. it can range from 5km to 70km
depending on the IEEE base used.
An Ethernet WAN has multiple benefits consisting of reduced expenses and administration,
easy integration with existing networks and enhanced business productivity. It provides a high-
bandwidth layer 2 network which supports managing of data, voice and video within the same
infrastructure; this increases bandwidth and allows companies to inexpensively connect sites
to other sites and networks.
DSL
As mentioned previously, this technology is an always-on connection that will use existing
telephone lines to transport high-bandwidth data, whilst providing IP services to users. An
Ethernet signal is converted from an end device to a DSL signal using a DSL modem which is
then sent to the central office. A remote user must connect to an ISP before an IP connection
is established through the Internet to the enterprise network.
This technology has multiple benefits and drawbacks such as it is achieving fast data rates, no
additional wiring and security due it normally accessing a separate network the main section
of the network. The drawbacks of this technology are the proximity, the greater the distance,
the less efficient the service will be, slower uploads and if the lines are busy with other
communications occurring, the connection may be slow.
Wireless
Wireless uses the unlicensed radio spectrum to transmit and receive data; due to this spectrum
being unlicensed, it is accessible to anyone who has a wireless device. There are multiple
wireless technologies that have evolved that allow wireless access to travel further than the
local transmission range of 100 feet. One of these technologies is Municipal Wi-Fi which
provides high-speed Internet access for free or for a low cost. To connect to this Wi-Fi, a user
needs a wireless modem; this provides a stronger radio frequency than wireless adapters do.
Basically, Site-to-site VPN create a imaginary bridge between the networks at geographically
distant offices and connect them through the Internet and sustain a secure and private
communication between the networks. In Site-to-site VPN one router acts as a VPN Client
and another router as a VPN Server as it is based on Router-to-Router communication. When
the authentication is validated between the two routers only then the communication starts.
Open VPN:
Open VPN is an open-source VPN that is commonly used for creating Point-to-Point and
Site-to-Site connections. It uses a traditional security protocol based on SSL and TLS
protocol.
Make sure that the price you pay should be would be equivalent to the service you get. You
can do this by comparing the features and prices of different services. The number of
servers/countries: For VPN services, the more servers there are, the better the service. This
allows users to connect from virtually all over the world. It will also enable them to change
their locations at will.
Speed:
It’s common knowledge that using VPN comes with reduction in Internet speed. This is due to
the fact that signals need to travel long distances and the demands of the encryption and
decryption processes. Choose a service that has minimal impact on Internet speed.
Issues in VPN:
Unable to Establish a Tunnel:
A problem that could persist despite the absence of obvious causes, this issue may be caused
by IP packet filtering or the presence of a proxy server between the client and the VPN server.
Tweaking the configurations setting can resolve this issue.
Rejected VPN connection:
Rejection of VPN connection is one of the most common problems associated with the
solution’s use. There are a lot of factors that can cause this problem, among them is the failure
of the Routing and Remote Access service, DNS problems, issues with the authentication
process and lack of dial-in privileges. Unable to Reach Locations Beyond VPN Servers: Also
a common problem, this issue is caused by lack of permission to access the entire VPN network
or a number of routing factors. This can be resolved by tweaking the settings.
Acceptance of Unauthorized Connections:
Although an uncommon problem, this situation does occur and could cause far more serious
security issues. This problem could be caused by bugs in operating systems.” (Nestor Gilbert,
2018).
2 Assigni
ng trunk
in layer-
3
3 Configure
same way
in the ISP
router too.
From the
facing site
of the head
quarter
router to
ISP
routers.
4 As like
Head
quarter
router
configurati
on follow
the same
script and
steps to
configure
branch
router.
5 Give the
connection
between
the Branch
office
network to
the ISP
network by
selecting
the
interface
and
assigning
the ip
address.
5 Allow the
connection
between
the branch
office and
ISP
network by
selecting
the
interface
and
assigning
the IP
address in
the facing
port with
similar
networks.
Troubleshooting Methods:
There are many different troubleshooting methods that can be used and implemented in a
network to solve enterprise-wide networking issues. This report will evaluate a number of
troubleshooting methods and their effectiveness in a network.
Syslog Server
Syslog is a logging tool which sends log events from all devices that it is configured on to the
server that it is set up on. Syslog messages are sent over UDP and the IP transport mechanism
is defined rather than the syslog content. It is down to the application to develop informative
logs for the receiver. The message that is captured will contain a severity level and a facility;
the facility is the type of message that is being sent e.g. any, authorization, fire etc. and the
severity shows the important of the message e.g. emergency to debug, this level can be defined
by the administrator. Syslog helps to reduce the downtime of the network as it logs the
messages and lets the administrator know what events are occurring on the network, which can
mitigate against a loss of connection. These logs are also a form of alert system due to the
severity level that is sent with the messages, and this alerts the administrator to if the network
needs to be troubleshooted, or whether an unauthorized user is attempting to access the
network.
NTP Server
When logs are being examined, it is essential to the network administrator that the correct date
and time are recorded for each event that is held in the syslog server. Although the time and
date can be set manually across all devices, it is easier to have an NTP source on a server which
synchronizes the time across all devices to be the same. Using NTP also helps to ensure that
the clock speed is the same, and it doesn’t drift. NTP was established for clock synchronization,
which also helps to synchronize the time across the whole of the network.
SMP
Simple Network Management Protocol (SNMP) is used to receive information for the agent on
the network. The administrator can poll the switch which will return with a response on its
health information e.g., memory utilization, link status, firewall filter statistics etc. The switch
is also capable of undergoing a process called trap whereby it sends event information to the
network manager without the manager polling the switch. To communicate this information, a
Management Information Base (MIB) is used; a MIB has a tree structure which defines groups
of objects into related sets. MIBs are identified by Object Identifiers (OID) and these names
the objects. Once configured, SNMP GETs can be received on given interfaces. Vendors
recommend restricting access to specific interfaces and clients e.g., management network.
Symptoms
No traffic of any kind can pass through a newly installed router used to interconnect an Ethernet
based network segment with a private X.25 WAN. Local-area networks (LANs) previously
interconnected with the X.25 WAN continue to communicate without disruption of service.
However, users trying to make connections cannot get through to resources on the new
segment.
OSI Model:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to
describe the functions of a networking system. The OSI model characterizes computing
functions into a universal set of rules and requirements in order to support interoperability
between different products and software. In the OSI reference model, the communications
between a computing system are split into seven different abstraction layers: Physical, Data
Link, Network, Transport, Session, Presentation, and Application.
Created at a time when network computing was in its infancy, the OSI was published in 1984
by the International Organization for Standardization (ISO). Though it does not always map
directly to specific systems, the OSI Model is still used today as a means to describe Network
Architecture.
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw
unstructured data bits across the network from the physical layer of the sending device to the
physical layer of the receiving device. It can include specifications such as voltages, pin layout,
cabling, and radio frequencies. At the physical layer, one might find “physical” resources such
as network hubs, cabling, repeaters, network adapters or modems.
The data link layer encompasses two sub-layers of its own. The first, media access control
(MAC), provides flow control and multiplexing for device transmissions over a network. The
second, the logical link control (LLC), provides flow and error control over the physical
medium as well as identifies line protocols.
Network Layer
The network layer is responsible for receiving frames from the data link layer, and delivering
them to their intended destinations among based on the addresses contained inside the frame.
The network layer finds the destination by using logical addresses, such as IP (internet
protocol). At this layer, routers are a crucial component used to quite literally route information
where it needs to go between networks.
Transport Layer
The transport layer manages the delivery and error checking of data packets. It regulates the
size, sequencing, and ultimately the transfer of data between systems and hosts. One of the
most common examples of the transport layer is TCP or the Transmission Control Protocol.
Session Layer
The session layer controls the conversations between different computers. A session or
connection between machines is set up, managed, and terminal at layer 5. Session layer
services also include authentication and reconnections.
Presentation Layer
The presentation layer formats or translates data for the application layer based on the syntax
or semantics that the application accepts. Because of this, it at times also called the syntax
layer. This layer can also handle the encryption and decryption required by the application
layer.
Application Layer
At this layer, both the end user and the application layer interact directly with the software
application. This layer sees network services provided to end-user applications such as a web
browser or Office 365. The application layer identifies communication partners, resource
availability, and synchronizes communication. Protocols that are used at this layer are HTTP,
Telnet, FTP etc.
To troubleshoot using the OSI model, the recommended approach in the bottom-up approach.
This approach starts from layer 1 and will move up the layers until the issue is found.
Evaluated above are a number of troubleshooting methods and their effectiveness in solving
enterprise-wide networking issues. Without these methods being implemented a network
administrator will not know what is happening in the background of the network; the logs
created by syslog are beneficial in seeing different events, NTP synchronizes not only time
across the network, but will update the logs in the syslog server with the correct time that the
event took place.
troubleshooting, you make continuous progress, and usually solve the problems faster than it
would take using an ad hoc approach. There are many different structured troubleshooting
approaches. For some problems, one method might work better, whereas for others, another
method might be more suitable. Therefore, it is beneficial for the troubleshooter to be familiar
with a variety of structured approaches and select the best method or combination of methods
to solve a particular problem.
Troubleshooting Principles
Troubleshooting is the process that leads to the diagnosis and, if possible, resolution of a
problem. Troubleshooting is usually triggered when a person reports a problem. Some people
say that a problem does not exist until it is noticed, perceived as a problem, and reported as a
problem. This implies that you need to differentiate between a problem, as experienced by the
user, and the actual cause of that problem. The time a problem is reported is not necessarily the
same time at which the event causing the problem happened. Also, the reporting user generally
equates the problem to the symptoms, whereas the troubleshooter often equates the problem to
the root cause. For example, if the Internet connection fails on Saturday in a small company, it
is usually not a problem, but you can be sure that it will turn into a problem on Monday morning
if it is not fixed before then. Although this distinction between symptoms and cause of a
problem might seem philosophical, you need to be aware of the potential communication issues
that might arise from it.
Generally, reporting of a problem triggers the troubleshooting process. Troubleshooting starts
by defining the problem. The second step is diagnosing the problem during which information
is gathered, the problem definition is refined, and possible causes for the problem are proposed.
Eventually this process should lead to a hypothesis for the root cause of the problem. At this
time, possible solutions need to be proposed and evaluated. Next, the best solution is selected
and implemented. Following figure illustrates the main elements of a structured
troubleshooting approach and the transition possibilities from one step to the next.
troubleshooting. Diagnosis is the process of identifying the nature and cause of a problem. The
main elements of this process are as follows:
Gathering information:
Gathering information happens after the problem has been reported by the user (or anyone).
This might include interviewing all parties (user) involved, plus any other means to gather
relevant information. Usually, the problem report does not contain enough information to
formulate a good hypothesis without first gathering more information. Information and
symptoms can be gathered directly, by observing processes, or indirectly, by executing tests.
Analyzing information:
After the gathered information has been analyzed, the troubleshooter compares the symptoms
against his knowledge of the system, processes, and baselines to separate normal behavior from
abnormal behavior.
Eliminating possible causes:
By comparing the observed behavior against expected behavior, some of the possible problems
causes are eliminated.
Formulating a hypothesis:
After gathering and analyzing information and eliminating the possible causes, one or more
potential problem causes remain. The probability of each of these causes will have to be
assessed and the most likely cause proposed as the hypothetical cause of the problem.
Testing the hypothesis:
The hypothesis must be tested to confirm or deny that it is the actual cause of the problem. The
simplest way to do this is by proposing a solution based on this hypothesis, implementing that
solution, and verifying whether this solved the problem. If this method is impossible or
disruptive, the hypothesis can be strengthened or invalidated by gathering and analyzing more
information.
All troubleshooting methods include the elements of gathering and analyzing information,
eliminating possible causes, and formulating and testing hypotheses. Each of these steps has
its merits and requires some time and effort; how and when one moves from one step to the
next is a key factor in the success level of a troubleshooting exercise. In a scenario where you
are troubleshooting a complex problem, you might go back and forth between different stages
of troubleshooting Gather some information, analyze the information, eliminate some of the
possibilities, gather more information, analyze again, formulate a hypothesis, test it, reject it,
eliminate some more possibilities, gather more information, and so on.
If you do not take a structured approach to troubleshooting and go through its steps back and
forth in an ad hoc fashion, you might eventually find the solution however, the process in
general will be very inefficient. Another drawback of this approach is that handing the job over
to someone else is very hard to do; the progress results are mainly lost. This can happen even
if the troubleshooter wants to resume his own task after he has stopped for a while, perhaps to
take care of another matter. A structured approach to troubleshooting, regardless of the exact
method adopted, yields more predictable results in the long run. It also makes it easier to pick
up where you left off or hand the job over to someone else without losing any effort or results.
A troubleshooting method that is commonly deployed both by inexperienced and experienced
troubleshooters is the shoot-from-the-hip method. Using this method, after a very short period
of gathering information, the troubleshooter quickly makes a change to see if it solves the
problem. Even though it may seem like random troubleshooting on the surface, it is not. The
reason is that the guiding principle for this method is knowledge of common symptoms and
their corresponding causes, or simply extensive relevant experience in a particular environment
or application. This technique might be quite effective for the experienced troubleshooter most
times, but it usually does not yield the same results for the inexperienced troubleshooter.
Following figure shows how the shoot from the hip goes about solving a problem, spending
almost no effort in analyzing the gathered information and eliminating possibilities.
so that you can narrow down the scope of the potential problems. A benefit of this method is
that all of the initial troubleshooting takes place on the network, so access to clients, servers,
or applications is not necessary until a very late stage in the troubleshooting process. Based on
experience, you will find that most network problems are hardware related. If this is applicable
to your environment, the bottom-up approach will be most suitable for you. A disadvantage of
this method is that, in large networks, it can be a time-consuming process, because a lot of
effort will be spent on gathering and analyzing data and you always start from the bottom layer.
The best bottom-up approach is to first reduce the scope of the problem using a different
strategy and then switch to the bottom-up approach for clearly bounded parts of the network
topology.
Divide-and-Conquer Troubleshooting Method
The divide-and-conquer troubleshooting method strikes a balance between the top-down and
bottom-up troubleshooting approaches. If it is not clear which of the top-down or bottom-up
approaches will be more effective for a particular problem, an alternative is to start in the
middle (typically the network layer) and perform some tests such as ping. Ping is an excellent
connectivity testing tool. If the test is successful, you can assume that all lower layers are
functional, and so you can start a bottom-up troubleshooting starting from this layer. However,
if the test fails, you can start a top-down troubleshooting starting from this layer. Whether the
result of the initial test is positive or negative, this method will usually result in a faster
elimination of potential problems than what you would achieve by implementing a full top-
down or bottom-up approach. Therefore, the divide-and-conquer method is considered a highly
effective troubleshooting approach.
Follow-the-Path Troubleshooting Method
The follow-the-path approach is one of the most basic troubleshooting techniques, and it
usually complements one of the other troubleshooting methods such as the top-down or the
bottom-up approach. The follow-the-path approach first discovers the actual traffic path all the
way from source to destination. Next, the scope of troubleshooting is reduced to just the links
and devices that are actually in the forwarding path. The principle of this approach is to
eliminate the links and devices that are irrelevant to the troubleshooting task at hand.
Spot-the-Differences Troubleshooting Method
Another common troubleshooting approach is called spotting the differences. By comparing
configurations, software versions, hardware, or other device properties, links, or processes
between working and nonworking situations and spotting significant differences between them,
this approach attempts to resolve the problem by changing the nonoperational elements to be
consistent with the working ones. The weakness of this method is that it might lead to a working
situation, without clearly revealing the root cause of the problem. In some cases, you are not
sure whether you have implemented a solution or a workaround. Following figure shows two
routing tables one belongs to Branch2, experiencing problems, and the other belongs to
Branch1, with no problems. If you compare the content of these routing tables, as per the
spotting-the-differences approach, a natural deduction is that the branch with problems is
missing a static entry. The static entry can be added to see whether it solves the problem.
Move-the-Problem Troubleshooting Method
Move the problem is a very elementary troubleshooting technique that can be used for problem
isolation: You physically swap components and observe whether the problem stays in place,
moves with the component, or disappears entirely. Following figure shows two PCs and three
laptops connected to a LAN switch, among which laptop B has connectivity problems.
Assuming that hardware failure is suspected, you must discover if the problem is on the switch,
the cable, or the laptop. One approach is to start gathering data by checking the settings on the
laptop with problems, examining the settings on the switch, comparing the settings of all the
laptops, and the switch ports, and so on. However, you might not have the required
administrative passwords for the PCs, laptops, and the switch. The only data that you can gather
is the status of the link LEDs on the switch and the laptops and PCs. What you can do is
obviously limited. A common way to at least isolate the problem (if it is not solved outright) is
cable or port swapping. Swap the cable between a working device and laptop B (the one that
is having problems). Move the laptop from one port to another using a cable that you know for
sure is good. Based on these simple moves, you can isolate whether the problem is cable,
switch, or laptop related.
Conclusion:
While implementing the designed topology WAN connectivity is the main way to
communicate with branch networks. So as required by the task I examined WAN technologies
and select the appropriate one for a set of enterprise requirements and analyzed the benefits
and drawbacks of private and public WAN technologies. After finishing this step, I included
by deploying network monitoring tools and troubleshooting methods to establish network
baselines and produce network documentation. Also, step by step process of troubleshooting
methods with troubleshoot LAN and WAN connectivity issues at different networking layers
and evaluated features and benefits of different VPN types based on organizational needs. At
last concluded the entire task with troubleshooting methods and their effectiveness in solving
enterprise-wide networking issues.
Bibliography
https://financesonline.com/vpn-software-analysis-features-types-benefits-pricing/#features
https://www.forcepoint.com/cyber-edu/osi-model
https://searchnetworking.techtarget.com/definition/virtual-LAN
http://www.omnisecu.com/cisco-certified-network-associate-ccna/per-vlan-spanning-tree-
pvst-and-per-vlan-spanning-tree-plus-pvst+.php
https://www.techopedia.com/definition/30186/network-design
https://www.ciscopress.com/articles/article.asp?p=2202411&seqNum=7
https://www.cisco.com/c/en/us/support/switches/catalyst-2960-24tt-lswitch/model.html
https://www.cisco.com/c/en/us/products/collateral/routers/4000-series-integratedservices-
routers-isr/data_sheet-c78-732542.html#ProductSpecifications