You are on page 1of 41

Contents

Executive summery ........................................................................................................ 3


Objective ........................................................................................................................ 3
Prepare a report covering the following topics: ............................................................. 5
1. Examine and produce an analysis of the network design models and how they
contribute to the design of a scalable and reliable network. .......................................... 5
2. A detailed discussion of LAN redundancy concepts, network features, such as
bandwidth and load and their related issues. The explanations should contain the
possible solutions provided at Layer 2 and 3 of the OSI Model. ................................... 5
3. Provide a detailed account of how redundancy protocols support scalable networks.
........................................................................................................................................ 5
4. Design and implement a network prototype using a network simulator (or lab
devices), which incorporates redundancy at Layer 2 and 3 and link aggregation features
with the following requirements: ................................................................................... 5
• Include at least three Layer 2 switches. ...................................................................... 5
• Provide redundant link between all the switches. ....................................................... 5
• Use Rapid PVST+ as spanning tree protocol. ............................................................. 5
• Use link aggregation in the main active link............................................................... 5
• Provide a redundant gateway using a suitable first-hop redundancy protocol. .......... 5
You also need to provide the following written material as a formal report: ................ 5
1. A rationale about the selection of the networking devices for the prototype. ........... 5
2. A comparison between PVST and Rapid PVST and their effectiveness in solving
redundancy issues. ......................................................................................................... 5
3. A detailed explanation of how the first-hop redundancy protocols will work for IPv4
and IPv6. ........................................................................................................................ 5
4. An evaluation of Ether Channel technology solving bandwidth and load issues. ..... 5
Executive summery ........................................................................................................ 7
Scope .............................................................................................................................. 7
Introduction .................................................................................................................... 8
Network design models and features of scalable network ............................................. 8
Design for scalability ..................................................................................................... 8
1. Plane of redundancy ............................................................................................ 8
2. Reduce failure domain size ................................................................................. 9
3. Increase bandwidth ........................................................................................... 10
4. Expand the access layer .................................................................................... 10
5. Tune routing protocols ...................................................................................... 11
Discuss LAN redundancy, bandwidth and load related issues and possible solutions
with reference to layer2 and layer 3 of the OSI Model................................................ 11
MAC database instability ......................................................................................... 12
Broadcast stream ...................................................................................................... 12
Multiple frame transmission .................................................................................... 12
Issue with the layer 1 redundancy (MAC database instability) ............................... 12
Issue with 1 redundancy: broadcast storms ............................................................. 12
Issues on bandwidth and load balancing .................................................................. 13
Preventing the issue from occurring in a redundant network in layer2 and layer3 . 13
Preventing load balancing and bandwidth issues on layer 2.................................... 13
Using RPVST protocol in layer 2 ............................................................................ 13
Using link aggregation on layer 2 ............................................................................ 14
Preventing load balancing and bandwidth issues on layer 3.................................... 14
Local area network (LAN) ....................................................................................... 14
Devices used in LAN ............................................................................................... 14
Router....................................................................................................................... 14
Multilayer switch ..................................................................................................... 14
Computer.................................................................................................................. 15
Analyses the switch and router redundancy protocols and their effectiveness in
supporting scalable networks ....................................................................................... 15
In Router .................................................................................................................. 15
In Switches ............................................................................................................... 15
Analyses switch and router redundancy and effective to solve the redundancy issue: 16
Switch redundancy ....................................................................................................... 16
Router redundancy ................................................................................................... 16
HSRP (hot standby redundancy protocol) ............................................................... 17
VRRP (virtual router redundancy protocol) ............................................................ 17
GLBP (global load balancing protocol) ................................................................... 17
Scalable network .......................................................................................................... 17
GLBP (Global load balancing protocol) .................................................................. 18
Fig: Router ............................................................................................................... 19
Executive summery
As per the given scenario I am hired as a Network Administrator to redesign all the
LAN and WAN to fulfill the requirement of Nepal Staffing Company (NSC). Since, it
has multiple branches providing man power to different organization and companies in
Nepal. The Central office is located in Kathmandu and has its additional branches in
different part of the country named as Pokhara, Birgunj, Nepalgunj and as well as
Chitwan. Additionally, now there is no network between the branches. Therefore,
management has decided to interconnect all the branches with VPN over the internet.
Furthermore, redesigning of the LAN network of head office has to be done with 3 PCs
in each Admin, Management and Finance department and one server that holds details
of each staff. Finally, with requirement given by the management, I have to design layer
2 and layer 3 network based on the LAN design principle including IPV4 and IPV6 IP
addressing planning and simulate sample network design in simulation with
configuration.

Objective
1. To examine and produce an analysis of network design model & Contribution
design of scalable and reliable design
2. The detail discussion of LAN redundancy concepts, network features, such as
bandwidth and load with possible solution provided at layer 2 & 3 of the osi
model.
3. To Provide a detailed account of how redundancy protocols support scalable
networks.
4. To design and implement a network prototype using a network simulator (or lab
devices), which incorporates redundancy at Layer 2 and 3 and link aggregation
features with following requirement:
• Include at least three Layer 2 switches.
• Provide redundant link between all the switches.
• Use Rapid PVST+ as spanning tree protocol.
• Use link aggregation in the main active link.
• Provide a redundant gateway using a suitable first-hop redundancy
protocol.
5. To Produce presentation slides which show an appropriate WAN solution to a
set of organizational requirements:
• Examine WAN technologies and select the appropriate one for a set of
enterprise requirements and analyze the benefits and drawbacks of
private and public WAN technologies.
• Configure WAN protocols as part of an enterprise network solution.
• Write a summary of the presentations including the key ideas/ findings/
information presented on the slides.
6. To revaluating features and benefits of different VPN types based on
organizational needs.
7. To Deploy network monitoring tools and troubleshooting methods to establish
network baselines and produce network documentation. Also, step by step
process of troubleshooting methods.
8. To troubleshoot LAN and WAN connectivity issues at different networking
layers.
9. To evaluate troubleshooting methods and their effectiveness in solving
enterprise-wide networking issues.
Prepare a report covering the following topics:
1. Examine and produce an analysis of the network design models and
how they contribute to the design of a scalable and reliable network.
2. A detailed discussion of LAN redundancy concepts, network
features, such as bandwidth and load and their related issues. The
explanations should contain the possible solutions provided at Layer 2
and 3 of the OSI Model.

3. Provide a detailed account of how redundancy protocols support


scalable networks.

4. Design and implement a network prototype using a network


simulator (or lab devices), which incorporates redundancy at Layer 2
and 3 and link aggregation features with the following requirements:

• Include at least three Layer 2 switches.

• Provide redundant link between all the switches.

• Use Rapid PVST+ as spanning tree protocol.

• Use link aggregation in the main active link.

• Provide a redundant gateway using a suitable first-hop


redundancy protocol.
You also need to provide the following written material as a formal
report:

1. A rationale about the selection of the networking devices for the


prototype.
2. A comparison between PVST and Rapid PVST and their
effectiveness in solving redundancy issues.

3. A detailed explanation of how the first-hop redundancy protocols


will work for IPv4 and IPv6.

4. An evaluation of Ether Channel technology solving bandwidth and


load issues.
LAN NETWORK DESIGN
PRINCIPES

SUBMITTED BY: SIMAN RANA


Submitted to: ROHAN KUMAR SIR
Executive summery
As the Nepal stuffing company is leading the stuffing company with different branches
providing man power to different company and manpower of Nepal. Now Management
decided to interconnect all the branches with Private lease line (VPN). Also need to
redesign LAN network of Head office where there is 3 PCs in each Admin,
Management and Finance department and one server that holds details of each staff.
Being hired as a Network Administrator for NSC management, I have to redesign all
the LAN and WAN network to fulfill the requirement of Nepal stuffing company.
Objective
----------------------------------------------------------------------------------------------------

Scope
The scope of this report is to explore LAN design principles and their application in the
network design process and then implement a network using LAN design principles
based on a predefined set of requirements.
Introduction
Being hired as a Network Administrator for NSC management, I have to redesign all
the LAN and WAN network to fulfill the requirement of NSC management. For this, I
am going to describe about network design models and how they contribute to the
design of a scalable and reliable network and also LAN redundancy concepts, network
features, such as bandwidth and load and their related issues. I am going to provide a
detailed account of how redundancy protocols support scalable networks and design
and implement a network prototype and about the selection of the networking devices
for the prototype and compare between PVST and Rapid PVST and their effectiveness
in solving redundancy issues. In addition, I am going to explain how the first-hop
redundancy protocols will work for IPv4 and IPv6 and evaluate Ether Channel
technology solving bandwidth and load issues.

Network design models and features of scalable network


Network design is generally performed by network designers, engineers, IT
administrators and other related staff. It is done before the implementation of a network
infrastructure. Network design involves evaluating, understanding and scoping the
network to be implemented. The whole network design is usually represented as a
network diagram that serves as the blueprint for implementing the network physically.
Scalability is a characteristic of an organization, system, model, or function that
describes its capability to cope and perform well under an increased or expanding
workload or scope. A system that scales well will be able to maintain or even increase
its level of performance or efficiency even as it is tested by larger and larger operational
demands. Design for scalability

Design for scalability


Scalability is a team network that grow without losing and reliability. If we understand
that the network will be changed, its number of users can be increased by the variety of
device that the network will be change, its numbers of users can be increased by the
variety of device that can be found anywhere. Therefore, in other to support a large,
medium and small network designer much develop a specific strategy for the network
to achieve what is available and measure its effectively and easily. Other basic design
techniques can be the use of expanded tools, modules and integrated devices that can
be easily upgraded to increase its capacity, similarly, we can design a hierarchical
network to incorporate modules that can be added, upgraded and modified as needed
without compromising its structure and function. In addition, we can consistent IPv6
address strategy. Selecting multi-layer switch or switches to limit streaming and
filtering some unwanted traffic from the network will also work to increase scaling.
1. Plane of redundancy
Redundancy is an important part of network design for preventing disruption of
network services by minimizing the possibility of a single point of failure. One method
of implementing redundancy is by installing duplicate equipment and providing
failover services for critical devices. Redundant paths offer alternate physical paths for data
to traverse the network. Redundant paths in a switched network support high availability.
2. Reduce failure domain size
A well-designed network not only controls traffic but also limits the size of failure
domains. A failure domain is the area of a network that is impacted when a critical
device or network service experiences problems.The function of the device that initially
fails determines the impact of a failure domain. For example, a malfunctioning switch
on a network segment normally affects only the hosts on that segment. However, if the
router that connects this segment to others fails, the impact is much greater.
The use of redundant links and reliable enterprise-class equipment minimizes the
chance of disruption in a network. Smaller failure domains reduce the impact of a
failure on company productivity. They also simplify the troubleshooting process,
thereby shortening the downtime for all users
3. Increase bandwidth
Bandwidth demand continues to grow as users increasingly access video content and
migrate to IP phones. EtherChannel can quickly add more bandwidth. In hierarchical
network design, some links between access and distribution switches might need to
process a greater amount of traffic than other links. As traffic from multiple links
converges onto a single, outgoing link, it is possible for that link to become a
bottleneck. Link aggregation allows an administrator to increase the amount of
bandwidth between devices by creating one logical link made up of several physical
links. EtherChannel is a form of link aggregation used in switched networks

4. Expand the access layer


The network must be designed to be able to expand network access to individuals and
devices, as needed. An increasingly important aspect of extending access layer
connectivity is through wireless connectivity. Providing wireless connectivity offers
many advantages, such as increased flexibility, reduced costs, and the ability to grow
and adapt to changing network and business requirements.
To communicate wirelessly, end devices require a wireless NIC that incorporates a
radio transmitter/receiver and the required software driver to make it operational.
Additionally, a wireless router or a wireless access point (AP) is required for users to
connect

5. Tune routing protocols


Routing protocol configuration is usually rather straightforward. However, to take full
advantage of a protocol’s feature set, it is often necessary to modify the configuration.
Enterprise networks and ISPs often use more advanced protocols, such as link-state
protocols, because of their hierarchical design and ability to scale for large networks.

Discuss LAN redundancy, bandwidth and load related issues and


possible solutions with reference to layer2 and layer 3 of the OSI
Model
Network redundancy is a key to maintaining network reliability. Multiple physical links
between devices provide redundant paths. The network can then continue to operate
when a single link or port has failed. Redundant links can also share the traffic load and
increase capacity. Multiple paths need to be managed so that Layer 2 loops are not
created. The best paths are chosen, and an alternate path is immediately available should
a primary path fail. The Spanning Tree Protocols are used to manage Layer 2
redundancy.
Redundant devices, such as multilayer switches or routers, provide the capability for a
client to use an alternate default gateway should the primary default gateway fail. A
client can now have multiple paths to more than one possible default gateway. First
Hop Redundancy Protocols are used to manage how a client is assigned a default
gateway, and to be able to use an alternate default gateway should the primary default
gateway fail.
MAC database instability
Instability in the content of the MAC address table results from copies of the same
frame being received on different ports of the switch. Data forwarding can be impaired
when the switch consumes the resources that are coping with instability in the MAC
address table.
Broadcast stream
Without some loop-avoidance process, each switch may flood broadcasts endlessly.
This situation is commonly called a broadcast storm.
Multiple frame transmission
Multiple copies of unicast frames may be delivered to destination stations. Many
protocols expect to receive only a single copy of each transmission. Multiple copies of
the same frame can cause unrecoverable errors.

Issue with the layer 1 redundancy (MAC database instability)


Ethernet frames do not have a time to live (TTL) attribute. As a result, if there is no
mechanism enabled to block continued propagation of these frames on a switched
network, they continue to propagate between switches endlessly, or until a link is
disrupted and breaks the loop. This continued propagation between switches can result
in MAC database instability. This can occur due to broadcast frames forwarding.
Broadcast frames are forwarded out all switch ports except the original ingress port.
This ensures that all devices in a broadcast domain are able to receive the frame. If there
is more than one path through which the frame can be forwarded, an endless loop can
result. When a loop occurs, it is possible for the MAC address table on a switch to
constantly change with the updates from the broadcast frames, which results in MAC
database instability.

Issue with 1 redundancy: broadcast storms


A broadcast storm occurs when there are so many broadcast frames caught in a Layer
2 loop that all available bandwidth is consumed. Consequently, no bandwidth is
available for legitimate traffic, and the network becomes unavailable for data
communication. This is an effective denial of service (DoS).
Broadcast storms are inevitable on a looped network. As more devices send broadcasts
over the network, more traffic is caught in the loop, consuming resources. This
eventually creates a broadcast storm that causes the network to fail.
There are other consequences of broadcast storms. Because broadcast traffic is
forwarded out every port on a switch, all connected devices have to process all the
broadcast traffic that is being flooded endlessly around the looped network. This can
cause the end device to malfunction because of the processing requirements needed to
sustain such a high traffic load on the NIC.
Issues on bandwidth and load balancing
Although various multiple links which are to networking devices for effective
functioning, only one link is active for functioning. In this there is always problem on
effective bandwidth, user or clients don’t able to receive absolute bandwidth which they
are offering and there is always one questions for preventing these issues. The following
are the preventing various issues which occur in the redundant network at layer 2 and
layer 3.
Preventing the issue from occurring in a redundant network in layer2 and layer3
To get rid from these issues on the redundant network, spanning tree was developed
and in most network design these protocols are being used. Some types of spanning tree
must be enabled on the switches. Generally, STP uses the concepts of a root bridge,
port roles, and path cost to calculate which links to use in redundant network design.
STP ensures that there is only one logical path between all the destinations on the
network by intentionally blocking redundant paths that could cause a loop. A port is
considered as a blocked when user data is prevented from the entering and leaving that
port. This does not include the bridge protocol data unit ((BPDU) frames that are used
to prevent the loops from occurring. Blocking the redundant path is critical to
preventing the loops on the network. However, physical paths is always open to give
redundancy. But these paths are disabled to prevent loops on the network. If the path is
ever needed to compensate for a network cable or switch failure, STP recalculates the
paths and unblocks the necessary ports to allow the redundant path to become active.
Preventing load balancing and bandwidth issues on layer 2
Generally, in layer 2 using Rapid Per Vlan Spanning Tree Protocol and Link
Aggregation or creating ether channel can solve these load balancing and bandwidth
issues.
Using RPVST protocol in layer 2
RPVST is the Rapid Per VLAN Spanning Tree which is improvement of STP in terms
of being newer and faster. The RPVST is able to responds the change in six seconds.
RSTP stands for Rapid Spanning Tree Protocol while PVST does the same for Per Vlan
Spanning Tree. It creates the spanning-tree for each VLANs just like PVST. It uses the
bridge Protection data unit (BPDU) version 2 which is backward compatible with the
802.1D STP, uses BPDU version 0. In the section of port roles, it has root port,
designated port, alternate port and backup port. The root port is best port form non
bridge root to root bridge, designated port is intended port for every LAN segment,
alternate port is an alternate path to root bridge which does not use root port. The backup
port is redundant path to a segment where another port already connects.
Rapid PVST has four main port states, which are discarding, learning, forwarding and
listening. In the discarding states, where a port discards the information received on the
interfaces and listens for BPDUs. In the forwarding states, a port receives and forwards
the frames receives on the interfaces whereas in learning states, switch creates the
switching table that will map Mac Address to the port number and listens the port
number. In the listening states, the switch processes the BPDU is that allow to
determine the network topology. For bypassing the forwarding and listening states we
can use port fast in the single workstation, switch, server, to allow those devices to
connect the network immediately instead of waiting for the port to transition from the
listening states to forwarding states.
Using link aggregation on layer 2
Ether channel is used to bundle the ports together in an Ethernet switch to achieve the
higher bandwidth as the traffic from the multiple links converges onto the single
outgoing link, it is possible for that link to become a bottleneck. Link Aggregation
allows the network administrator to increase amount of bandwidth between the devices
by creating one logical link made up of several physical links. In a more traditional
network functions, spanning tree protocols blocks the one redundant links to avoid layer
2 loops, what ether channel does is to use load balancing on traffic between the
redundant links, this helps to improve the efficient use of bandwidth. In the scenario of
load balancing, as the multiple links is combined to the logical links then we can add
more devices and add more network, as after link aggregation and adding the ether
channel we can scale up network as link aggregation main advantages is load balancing.
Preventing load balancing and bandwidth issues on layer 3
For preventing load balancing and bandwidth in layer 3, I have used First Hop
Redundancy Protocols. It is designed to allow the transparent fail-over at the first hop
IP Router. FHRP enables two or more devices to work together in a group, sharing a
single Virtual IP Address and Virtual MAC Address. The virtual IP Address is
configured in each and user as a default gateway address. There are three first hop
redundancy protocols such as HSRP, GLBP and VRRP, these protocols has main aims
load balancing for fail over of primary router.
Local area network (LAN)
A local area network (LAN) is a collection of devices connected together in one
physical location, such as a building, office, or home. A LAN can be small or large,
ranging from a home network with one user to an enterprise network with thousands of
users and devices in an office or school.
Devices used in LAN
Router
A router is a device that connects two or more packet-switched network or subnetwork.
It serves two primary functions: managing traffic between these networks by
forwarding data packets to their intended IP addresses, and allowing multiple devices
to use the same Internet connection. There are several types of routers, but most routers
pass data between LANs (local area networks) and WANs (wide area networks). A
LAN is a group of connected devices restricted to a specific geographic area. A LAN
usually requires a single router.
Multilayer switch
The multilayer switch is a network device which enables operation at multiple layers
of the OSI model. It has seven layers, including the physical layer (layer 1), date link
layer (layer 2), network layer (layer 3) and so on. The multilayer switch performs
functions up to almost application Layer (layer 7). For instance, it can do the context-
based access control, which is a feature of layer 7. Unlike the traditional switches,
multilayer switches also can bear the functions of routers at incredibly fast speeds. In
addition, the Layer 3 switch is one type of multilayer switches and is very commonly
used.
Computer
A computer is a machine or device that performs processes, calculations and operations
based on instructions provided by a software or hardware program. It has the ability to
accept data (input), process it, and then produce outputs. Computers can also store data
for later uses in appropriate storage devices, and retrieve whenever it is necessary.
Modern computers are electronic devices used for a variety of purposes ranging from
browsing the web, writing documents, editing videos, creating applications, playing
video games, etc. They are designed to execute applications and provide a variety of
solutions by combining integrated hardware and software components.

Analyses the switch and router redundancy protocols and their


effectiveness in supporting scalable networks
In Router
Network redundancy is the process through which the additional and alternatives
instances of network devices, equipment’s and communication medium are installed in
the network infrastructure. It is also process of ensuring network availability in case of
network failure and unavailability. Various redundancy protocols such as First Hop
Redundancy Protocols that includes Virtual Router Redundancy Protocols which
protects against the single point of failure for the default gateway and also provide the
load balancing if multiple links are available at first hop routers. Virtual Router
Redundancy Protocol also enable the group of routers on a LAN Segment to form a
single virtual router. Hence, VRRP protocols also supports the networks to be scalable.
In HSRP which is the Hot Stand Router Protocol, one router in the group assumes the
role of the active router and handles all request from the clients. The other router or
routers becomes standby and take over if active router fails. Therefore, activeness and
available if active routers fails to perform shows it can be implemented to the larger
networks or HSRP protocol will be the best example of the scalable network. The last
one is GLBP (Gateway Load Balancing Protocol), the main advantage of the GLBP
protocol is that it provides the load balancing in addition to redundancy without
requiring the configuration of different default gateways on the different clients. Hence,
it clearly shows that GLBP can be implemented and it also supports in scalable
networks. Uses of expandable, modular equipment’s and Redundancy Protocol or
clustered devices that can be easily upgraded to increase capabilities. Designing a
hierarchical network to includes the modules that can be added, upgraded, and modified
as necessary, without the design of other functional area of the network.
In Switches
Mainly in switches, redundancy protocols, which supports the scalable networks, are
Link Aggregation or creating ether channel and using Spanning Tree Protocols. Talking
about the Spanning Tree Protocols. Generally, STP is a layer 2 Protocols that runs on
the switches and in the bridges that are 802.1D compliant. There are different flavors
of STP but 802.1D is the best of all. STP is responsible for the identifying the links in
the networks and shutting down the redundant ones, preventing possible network loops.
In order do so, all switches in the network exchange BPDU messages between them to
agree upon the root bridge. Once they elect the root bridge, every switch has to
determine which of its ports will communicate with the root port. If more than one link
connects to the root bridge, then one is elected as the forwarding port (Designated Port)
and the others are blocked. The entire spanning tree protocols which RSTP, Rapid per
Vlan Spanning Protocols, Per Vlan Spanning Tree Protocols, Multiple Spanning Tree
Protocols have mutual aims of providing scalable networks. Protocols, which are from
the STP balance the load, controls the bandwidth, and helps to upgrade and update the
redundant links for any fail over switches. All the protocols of STP which is used for
per VLAN or for all the fast Ethernet ports or giga Ethernet ports have main aims to
scale up the networks by enhancing internal functionalities. In the scenario of Ether
channel, which multiple links and physical links is converted to the logical links. With
the multiple links to logical links it can provides higher or consistent bandwidth and
with logical links it can holds more networks, which ultimately enhance the load
balancing. Hence, by improving in bandwidth and load balancing we scale up our
network definitely and supports the scalable networks.

Analyses switch and router redundancy and effective to solve the


redundancy issue:

Switch redundancy
Fundamentally, a redundancy switch has a 2x1 (1x2) arrangement. Critical
applications require a secondary set of equipment (redundant). Automated redundancy
switching is specifically designed to connect to both the primary and secondary
equipment, and if there is a failure in the "primary" equipment, the backup is switched
in. Some of the higher-level redundancy switch units listed below automatically switch
with an alarm input (10942B through 10948B), while others get remote control
commands for the backup switchover. Shown in the table below are various types of
switching, but what they all have in common is that offer a 2x1 (1x2) configuration.
It should be noted that the 10942B and 10943B units (IF and L-Band respectively) also
contain a unique feature to drastically reduce redundancy costs. They were designed to
provide a 1:4 redundancy function as well as 1:1. What this means is that there is ONE
shared piece of redundant equipment that can be switched in as backup for every FOUR
primaries. Further information about this is shown in the 10942B and 10943B sections.
There are two types of switch redundancy protocols and they are listed below:
1. STP (spanning tree protocol)
STP is a link management protocol designed to support redundant links that stops
switching loops in the STP network. It is a Layer 2 protocol that runs on bridges and
switches, which should be enabled on the switch interfaces. IEEE standardized STP
protocols as IEE 802.1D. The full form of STP is Spanning Tree Protocol.
2. Ether channel
Ether channel makes two physical links into one logical link and STP (Spanning tree
protocol to run on the logical link, not on the physical link) will run on the logical link.
Ether channel is a technology that allows you to aggregate multiple physical links of
the same capabilities into a single logical one. In this way, you can increase the
bandwidth.
Normally when you have multiple links connecting between switches STP blocks
redundant port, with Ether channel the links are aggregated and not blocked by STP.

Router redundancy
Routers are networking devices operating at layer 3 or a network layer of the OSI
model. They are responsible for receiving, analysing, and forwarding data packets
among the connected computer networks. When a data packet arrives, the router
inspects the destination address, consults its routing tables to decide the optimal route
and then transfers the packet along this route.
There are three protocols used in router redundancy:
HSRP (hot standby redundancy protocol)
A Cisco-proprietary FHRP designed to allow for transparent failover of a first hop IPv4
device. HSRP provides high network availability by providing first-hop routing
redundancy for IPv4 hosts on networks configured with an IPv4 default gateway
address. HSRP is used in a group of routers for selecting an active device and a standby
device. In a group of device interfaces, the active device is the device that is used for
routing packets; the standby device is the device that takes over when the active device
fails, or when preset conditions are met. The function of the HSRP standby router is to
monitor the operational status of the HSRP group and to quickly assume packet-
forwarding responsibility if the active router fails.
VRRP (virtual router redundancy protocol)
A nonproprietary election protocol that dynamically assigns responsibility for one or
more virtual routers to the VRRP routers on an IPv4 LAN. This allows several routers
on a multiaccess link to use the same virtual IPv4 address. A VRRP router is configured
to run the VRRP protocol in conjunction with one or more other routers attached to a
LAN. In a VRRP configuration, one router is elected as the virtual router master, with
the other routers acting as backups, in case the virtual router master fails.
GLBP (global load balancing protocol)
A Cisco-proprietary FHRP that protects data traffic from a failed router or circuit, like
HSRP and VRRP, while also allowing load balancing (also called load sharing)
between a group of redundant routers.

Scalable network
Scalability is an attribute that describes the ability of a process, network, software or
organization to grow and manage increased demand. A system, business or software
that is described as scalable has an advantage because it is more adaptable to the
changing needs or demands of its users or clients.
Scalability is often a sign of stability and competitiveness, as it means the network,
system, software or organization is ready to handle the influx of demand, increased
productivity, trends, changing needs and even presence or introduction of new
competitors.
A scalable network has the following five key characteristics:
• Reliable and available - A flexible network should provide QoS for different
applications.
• Responsive - The internetwork must be capable of responding to latency issues
common for Systems Network Architecture (SNA) traffic.
• Efficient - Large internetworks should maximize resource utilization, especially
bandwidth.
• Adaptable - An adaptable network can accommodate various protocols, apps, and
hardware technologies.
• Accessible but secure - An open network enables connections via dedicated,
dialup, and switched networks while preserving the integrity of the network.
GLBP (Global load balancing protocol)
Gateway load balancing protocol (GLBP) is one of the first hop redundancy protocol
(FHRP) which provide redundancy like other first hop redundancy protocol, also
provides load balancing. It is a cisco proprietary protocol which can perform both
functions. It provides load balancing over multiple routers using single virtual IP
address and multiple virtual mac address.
LAN devices based on features and requirements, and apply basic configuration
commands for network connectivity
As per the given scenario I have listed the different devices that I have used
in Nepal Staffing Company. Here are the Requirement tables of the LAN
devices for the Nepal Staffing Company are given below:
S. N Device name No of Device Vendor Cost
1 Router 2 Cisco ISR 900 425000
Series
2 Switch 2 WS-C2960+24PC-S 320000
Catalyst 2960 Plus
Switch
3 AP 1 C9130AXI-EWC-A 340000
4 Wi Fi router 3 Mi Router 4A Giga 11000
Version (Dual band
Global Version)
5 PCs 9 DELL VOSTRO 170000
3470
6 Wire Cisco 29000

As I have already listed the requirement of devices that are needed to build
whole network of the NSC company. Now, I am going to do basic
configuration commands for network connectivity in each device are given
below:
1. Router: A router is a device that connects two or more packet-switched networks or
subnetworks. It serves two primary functions: managing traffic between these networks
by forwarding data packets to their intended IP addresses, and allowing multiple
devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area
networks) and WANs (wide area networks). A LAN is a group of connected devices
restricted to a specific geographic area. A LAN usually requires a single router.
A WAN, by contrast, is a large network spread out over a vast geographic area. Large
organizations and companies that operate in multiple locations across the country, for
instance, will need separate LANs for each location, which then connect to the other
LANs to form a WAN. Because a WAN is distributed over a large area, it often
necessitates multiple routers and switches. router (Router: Definition, a. (2022). Router:
Definition, advantages & functions | NFON Knowledgebase).

Fig: Router
As per the scenario. I have used two routers for each branch which
is connecting with ISP. To reduce network traffic of In Nepal
Staffing Company I collision domains as well as broadcast
domains. It also offers sophisticated routing, flow control, and
traffic isolation. Furthermore, they are configurable, allowing
network administrators to create policies based on routing
decisions. For having proper connectivity there are some basic
configurations that need to be done in router are listed below:

1. Configuring global parameters in router


For the global configuration in router, we have to follow these given steps that
are shown in screenshots:

1. Configuring a loopback interface


For configuring the loopback interface on router, we have to follow the following
steps:
2. Configuring gigabit ethernet LAN interface:
For configuring the gigabit ethernet in router, we have to follow the following steps:

3. Configuring command- line access


4. Configuring static routes:
These above are the basic configuration command in routers for connectivity.

2. Switch: Switches are made in many different configurations; they may


have multiple sets of contacts controlled by the same knob or actuator,
and the contacts may operate simultaneously, sequentially, or
alternately. A switch may be operated manually, for example, a light
switch or a keyboard button, or may function as a sensing element to
sense the position of a machine part, liquid level, pressure, or
temperature, such as a thermostat. Many specialized forms exist, such
as the toggle switch, rotary switch, mercury switch, push-
button switch, reversing switch, relay, and circuit breaker. A common
use is control of lighting, where multiple switches may be wired into
one circuit to allow convenient control of light fixtures. Switches in
high-powered circuits must have special construction to prevent
destructive arcing when they are opened. (Definitions, S., & Hope, C.
(2022). What is a Switch?).
In Nepal Staffing Company, Switches can increase the organization's available data
transfer capacity and help to reduce the outstanding burden on individual host PCs.
Similarly, they improve the NSC company's presentation. Switched networks will have
fewer casing impacts. This is due to the way switches create impact zones for each
association. Switches can be directly connected to workstations, increasing the
network's available bandwidth. Additionally, networks that use switches will
experience fewer frame collisions. Finally, the switch is isolated, and data will only be
routed to the destination.
These above pictures show the overall configuration that have to be done in switch for
the connectivity.
3. Some configuration that are done in Pc’s: Since PCs aid in file
sharing, we can easily share data among multiple users or access it
remotely if we keep it on other connected devices. Similarly, it aids in
resource sharing via network-connected peripheral devices such as
printers, scanners, and copiers, as well as software sharing between
multiple users, which saves money (Benefits of computer networks |
nibusinessinfo.co.uk. (2022).
The basic configuration in Pc’s included the following things:
5. Ip assigning: As we know that IP address's purpose is to manage the connection
between devices that send and receive data across a network. Every device on the
internet is uniquely identified by its IP address; without one, it is impossible to
contact them. So, we can configure Ip address in Pc’s.

Fig: Ip assigning in Pc’s

in the above figure that I have configure the Ip address in the PC’s.
Additionally, we can be able to assign the IP address through static or
DHCP. Static means putting the Ip address in the Pc’s through manually
where in DHCP the Pc’s take the Ip address automatically.
6. Pinging: Ping is a network utility that refers to a signal sent across the network
to another computer, which then responds with its own signal. This signal is timed
in milliseconds (ms).
As we seen in the above figure that, I have pinged the 210.0.0.2 Ip address
and the reply coming from the given Ip address that mean we can able to
communicate and share the data with them. So, ping is important because
it allows our inputs to register faster, giving us a faster reaction and input
time.
4. Access Point (AP): An access point is a device that establishes a
wireless local area network, or WLAN, in a business or large building.
An access point is a device that connects to a wired router, switch, or
hub via an Ethernet cable and broadcasts a Wi-Fi signal to a specific
area. If we want to enable Wi-Fi access in our Nepal Staffing Company
(NSC) reception area but don't have a router nearby, we can install an
access point near the front desk and run an Ethernet cable through the
ceiling back to the server room (What is an Access Point and How is it
Different from a Range Extender? (2022).
Above picture shows the overall configuration of the Access Point
where I have set the SSID as abc and choose WPA2-PSK
authentication and put password as 123456789. We can able to
connect to this by putting the password and able to access the
Network.

LAN design with layer 2 and layer 3 redundancy using switch and router
redundancy protocols
In Nepal Staffing Company, we have to implement the redundancy protocols in router
and switches. As I have already discussed about the redundancy protocols in above.
Some of the redundancy protocols in router includes HSRP, FFRP, HRRP and GLBP
whereas switch redundancy protocols include STP, RSTP, PSTP and ether-channel.
Initially, I have the configuration of the router redundancy protocols in LAN design
which are given below:
1. HSRP: As I have already discussed about this in above, now I am going
to configuring the HSRP with the design which are given below in table
form:

Fig: HSRP design


S. N What has done Screenshot of configuration
1 In R2, we have Assigned IP
in gig 0/1 and gig 0/0.
Finally, I have configured
eigrp with group 100

2 In R3, we have assigned Ip


address in gig0/0 and gig0/1
and we have given standby1,
IP and priority as 105.
Finally, I have configured
eigrp.
3 In R4, we have assigned Ip in
gig0/1 and gig0/1 and we
have given standby1 IP,
priority as 100 and finally,
we have configured eigrp.

4 In R3 we can see that I have


configured group, priority,
Active, standby IP of r4,
virtual IP and status

5 In R4, we have configured


interface, group and priority,
Active IP of r3, standby,
virtual IP and status.

2. VRRP: configuration of VRRP is given below:


Fig: VRRP
S. N What has done Screenshot of configuration
1 Configuring VRRP in R1
2 Configuring VRRP in R2

3. GLBP: As I have already discussed about this in above. Here I am


going to give the configuration code for the GLBP:
Similarly, I have configured the switch redundancy protocols in LAN design which
are given below:
Spanning-Tree Protocol (STP): As I have already discussed about these protocols
in above but now, I have shown the configuration of the STP which are given
below:

As we can see, after connecting the switches in a loop, one of the ports becomes
blocked.
Because STP is enabled by default, it prevents us from getting into a Switching Loop.

The configuration that has been done on switches are:

4. RSTP: STP (Spanning Tree Protocol) is divided into four states.


Blocking, Listening, Learning, and Forwarding are the STP states. The
Spanning Tree states Blocking and Listening are bypassed by RSTP
(Rapid Spanning Tree Protocol). According to the RSTP, begin with
discarded and progress through learning and forwarding.
The Blocking State in STP (Spanning Tree Protocol) is 20 seconds,
the Listening State is 15 seconds, and the Learning State is 15
seconds. So, for STP, traversing forwarding states takes 50 seconds.
In RSTP, the total time is 15 seconds (Rapid Spanning Tree
Protocol). Because RSTP avoids the blocking and listing states.

Fig: RSTP
Configuration on RSTP:

Since, RSTP is faster and voice and video work better, we use this
in LAN network connection of the Nepal Staffing Company.
Likewise, it supports more ports than MSTP or VSTP. So, RSTP is
important to configured on the switch.
5. EtherChannel: EtherChannel is a port link aggregation technology that
combines multiple physical port links into a single logical link. It is used
to provide high-speed connections as well as redundancy. A total of
eight links can be combined to form a single logical link (EtherChannel
in Computer Network - GeeksforGeeks. (2018).
Configuration of the EtherChannel:

Fig: EtherChannel
In my Nepal Staffing Company, the main benefits of EtherChannel
technology are that it allows traffic load sharing among the links in the
channel, as well as redundancy in the event that one or more links in the
EtherChannel fail. EtherChannel is a Cisco Copyrighted term, and the
industry term is "Link Aggregation." So, it is necessary to be configured in
the channel.

Layer 3 redundancy implementations for IPv4 and IPv6


Deploy network monitoring tools
The comprehensive infrastructure management capabilities and ability of PRTG
Network Monitor Tools are well-known. Using IT infrastructure such as SNMP, WMI,
SSH, Flows/Packet Sniffing, HTTP Requests, Rest APIs, Pings, and SQL, all devices,
systems, traffic, and applications in our network are displayed in a hierarchical view
that includes alarms, logs, performance, and speed.
In below I have shown the installation process of the PRTG and configuring process of
PRTG:

1. PRTG Network Monitor can be downloaded from the PAESSLER website.

2. Acceptance of the terms and conditions as well as the License Agreement.


3. On the computer, PRTG network monitor is installed.

4. The PRTG Network Monitor Setup Wizard is now complete.

5. After installing PRTG, launch the software in a browser and log in using your
username and password.
6. After logging in, the PRTG Software dashboard appears.

7. Adding a network monitoring device.


8. Continuing adding a Device

9. Configuring device detail which we want to monitor

10. Checking added device in the device list

11. Monitoring the Added Device, which has IP Address 192.168.1.2


12. Adding Netflow Sensor for Monitoring its traffic, HTTP, and performance of the
device.
Clicking button Add sensor.

13. Adding Device to use Netflow Sensor and clicking the device which is 192.168.1.2
14. Searching Netflow on the search box and adding Netflow version 9.

15. Configuring the basic sensor setting and clicking create.

16. Monitoring each module of the device

You might also like