You are on page 1of 53

PROGRAM TITLE: BTEC-Computing.

UNIT TITLE: Transport Network Design.

ASSIGNMENT NUMBER: Assignment 1

ASSIGNMENT NAME: Deploying Network Infrastructure Design For Golden Star Company.

SUBMISSION DATE: 23/04/2023

DATE RECEIVED: 10/04/2023

TUTORIAL LECTURER: Tran Hoang Bach.

WORD COUNT: 10191

STUDENT NAME: Nguy Nam Hai.

STUDENT ID: BKC13089.

MOBILE NUMBER: 0979384329.


Summative Feedback:

Internal verification:
Table of content
I. Learn LAN design printciples and their application in the network design process.............................4

1. Analyze network models, devices, and protocols for designing an open and ready network
infrastructure.............................................................................................................................................4

a. What are the different types of network models that can be used in designing a network
infrastructure?.......................................................................................................................................4

b. What are the different types of network devices and their functions in a network infrastructure?..3

c. What are the different protocols used in a network infrastructure and how are they implemented
to ensure an open and ready network?.................................................................................................9

2. Analyze swich and router redundancy protocols like STP, RSTP, FHRP, HSRP, and their
effectiveness in solving redundancy problems......................................................................................12

a. What are the different redundancy protocols used in switches and routers?..................................12

b. How do these protocols work and what are their advantages and disadvantages?........................15

c. How effective are these protocols in solving redundancy problems in a network infrastructure?.16

3. Explain LAN redundancy concepts, network features, such as bandwidth and load, and related
issues.........................................................................................................................................................16

a. What are LAN redundancy concepts and how are they implemented in a network infrastructure?
............................................................................................................................................................16

b. What are the different network features that affect bandwidth and load in a network
infrastructure?.....................................................................................................................................17

c. How do these features relate to LAN redundancy concepts and what issues can arise when
designing a network infrastructure?...................................................................................................18

II. Deploy a network using LAN design principles based on a predefined set of requirements.............18

1. Design a network with at least three Layer 2 switches, Layer 3 devices for PVST simulation,
and Layer 3 redundancy, and analyze different switch redundancy protocols................................18

a. Identify the required specifications for Layer 2 switches and Layer 3 devices in the network
design process.....................................................................................................................................18

b. Presents on 2-layer network design (core/distribution) and 3-layer network design including
(core, distribution, access)..................................................................................................................19

c. Explain the concept of PVST simulation and its importance in network design...........................21

d. Network implement........................................................................................................................21

2. Analyze different failover protocols such as STP, RSTP, R-PSTP, MST, and their effectiveness
in solving redundancy problems............................................................................................................31

1
a. Explain the concept of failover protocols and their importance in network design.......................31

b. Compare and contrast the different failover protocols...................................................................32

c. Evaluate the effectiveness of each failover protocol in solving redundancy problems in the
network design...................................................................................................................................33

3. Analyze Layer 3 fallback deployment for IPv4 and IPv6................................................................33

a. Define the concept of Layer 3 fallback and its importance in network design..............................33

b. Analyze the deployment of Layer 3 fallback for both IPv4 and IPv6 protocols............................34

c. Evaluate the effectiveness of Layer 3 fallback deployment in network design.............................34

4. Evaluate different link aggregation implementations using EtherChannel to address bandwidth


and load issues.........................................................................................................................................35

a. Define the concept of link aggregation and its importance in network design..............................35

b. Analyze the different link aggregation implementations, including their advantages and
disadvantages......................................................................................................................................35

c. Evaluate the effectiveness of using EtherChannel in link aggregation to address bandwidth and
load issues in network design.............................................................................................................37

III. Produce a WAN solution that fits a wide range of organizational requirements..............................37

1. Benefits and limitations of private WAN technologies....................................................................37

a. What are the advantages of private WAN technologies over public WAN technologies?............37

b. How can private WAN technologies improve network security and reliability?...........................38

c. What are the potential disadvantages of using private WAN technologies?..................................38

2. Benefits and limitations of public WAN technologies......................................................................39

a. What are the advantages of public WAN technologies over private WAN technologies?............39

b. How can public WAN technologies provide cost savings for organizations?...............................39

c. What are the potential disadvantages of using public WAN technologies?...................................40

3. Evaluation of different types of VPNs based on company needs....................................................40

a. What are the different types of VPNs available for organizations?...............................................40

b. How do site-to-site VPNs and remote access VPNs differ in terms of implementation and
functionality?......................................................................................................................................40

c. How can organizations determine which type of VPN is best suited for their specific needs and
requirements?.....................................................................................................................................41

IV. Solve a wife range of network-related problems using appropriate troubleshooting techniques and
methods...........................................................................................................................................................41
2
1. Describe common network problems and their impact on the organization's business...............41

2. Explain network fault detection techniques such as network analyzer, system logs, monitoring
software, and how to use them to detect network problems...............................................................41

3. What are the different network troubleshooting methods?............................................................42

4. How can you find the cause of network problems?..........................................................................42

5. When should you repair or replace damaged hardware and software?........................................42

6. Why is it important to update to the latest patches?.......................................................................43

7. What are the reasons for changing network configurations?.........................................................43

8. What are the steps for creating emergency remediation plans?.....................................................43

9. What are the preventive measures for network problems?............................................................44

10. Some network monitoring tools.......................................................................................................44

a. Iciga................................................................................................................................................44

b. Auvik..............................................................................................................................................45

c. SolarWinds Network Performance Monitor...................................................................................46

d. Zabbix.............................................................................................................................................46

V. R eferences............................................................................................................................................47

3
I. Learn LAN design printciples and their application in the network design process.

1. Analyze network models, devices, and protocols for designing an open and ready network
infrastructure.

a. What are the different types of network models that can be used in designing a network
infrastructure?
- There are several types of network models that can be used in designing a network infrastructure. Here
are some of the most common ones:

+ Peer-to-peer (P2P) network: A P2P network is a decentralized model in which each node in the
network can act as both a client and a server. In this type of network, there is no central server that
controls the flow of data. Instead, all nodes in the network communicate with each other directly.

4
+ Client-server network: A client-server network is a centralized model in which one or more servers
provide resources or services to clients. Clients request services from the server, and the server responds
with the requested information. This model is commonly used in enterprise networks.

+ Hybrid network: A hybrid network is a combination of a peer-to-peer network and a client-server


network. In this model, some nodes act as clients, while others act as servers. This type of network is
commonly used in larger organizations.

1
+ Mesh network: A mesh network is a decentralized model in which all nodes in the network are
connected to each other. This type of network is highly reliable and can continue to function even if
some nodes fail.

+ Bus network: A bus network is a linear model in which all nodes in the network are connected to a
single cable or wire. This type of network is inexpensive and easy to set up, but it can be slow and less
reliable than other types of networks.

2
+ Ring network: A ring network is a circular model in which all nodes in the network are connected to
each other in a closed loop. This type of network is reliable, but it can be slow and expensive to set up.

b. What are the different types of network devices and their functions in a network infrastructure?
- There are several types of network devices that are commonly used in a network infrastructure, each
with its own specific function. Some of the most common network devices and their functions are:

+ Switches: Switches are used to connect devices on a local area network (LAN). They allow for
efficient data transfer between devices by directing traffic only to the intended recipient.

3
+ Routers: Routers are used to connect multiple networks together, such as connecting a LAN to the
internet. They direct traffic between networks and can prioritize traffic based on specific rules.

+ Firewalls: Firewalls are used to protect a network from unauthorized access and malicious traffic.
They can block incoming traffic based on predefined rules and can also monitor outgoing traffic.

4
+ Access Points: Access points are used to provide wireless access to a network. They connect wireless
devices to a wired network and can provide additional security features such as authentication and
encryption.

+ Modems: Modems are used to convert digital signals from a computer or network device into analog
signals that can be transmitted over a phone or cable line. They also convert analog signals back into
digital signals for the receiving device.

5
+ Hubs: Hubs are similar to switches in that they connect devices on a LAN, but they do not have the
intelligence to direct traffic only to the intended recipient. Instead, they broadcast all traffic to all
devices on the network.

+ Network Attached Storage (NAS): NAS devices are used to store and share files on a network. They
provide centralized storage that can be accessed by multiple devices on the network.

6
+ Load Balancers: Load balancers are used to distribute incoming network traffic across multiple
servers. This helps to prevent any one server from becoming overloaded and can improve the overall
performance and reliability of a network.

7
+ Network Printers: Network printers are printers that are connected directly to a network, allowing
multiple devices to print to the same printer. This can be more efficient than connecting each device to a
separate printer.

+ VPN Appliances: VPN (Virtual Private Network) appliances are used to create secure connections
between remote networks or devices over the internet. They encrypt data that is transmitted over the
connection, providing a secure tunnel for sensitive information.

8
c. What are the different protocols used in a network infrastructure and how are they implemented to
ensure an open and ready network?
- There are several protocols used in a network infrastructure that ensure an open and ready network.
Some of the most common protocols and their implementations are:

+ TCP/IP (Transmission Control Protocol/Internet Protocol): This is the most widely used protocol for
data communication over the internet. TCP/IP ensures reliable delivery of data packets by dividing data
into smaller segments and reassembling them at the receiving end. It also manages addressing and
routing between devices on a network.

+ DNS (Domain Name System): DNS is used to translate human-readable domain names into IP
addresses that computers can understand. DNS servers maintain a database of domain names and their
corresponding IP addresses, allowing users to access websites and other online resources by name
rather than by IP address.

+ DHCP (Dynamic Host Configuration Protocol): DHCP is used to automatically assign IP addresses to
devices on a network. It allows for efficient use of IP addresses by assigning them only when needed
and releasing them when they are no longer in use.

9
+ SNMP (Simple Network Management Protocol): SNMP is used to monitor and manage network
devices such as routers, switches, and servers. It allows network administrators to collect data on
network performance, monitor device status, and configure devices remotely.

+ FTP (File Transfer Protocol): FTP is used to transfer files over a network. It allows users to upload
and download files from remote servers and is commonly used for website hosting and file sharing.

10
+ HTTP (Hypertext Transfer Protocol): HTTP is used to transfer data over the internet, particularly web
pages and other online resources. It is the foundation of the World Wide Web and is used by web
browsers to communicate with web servers.

+ SMTP (Simple Mail Transfer Protocol): SMTP is used to transfer email messages between servers. It
is the standard protocol for email communication over the internet.

2. Analyze swich and router redundancy protocols like STP, RSTP, FHRP, HSRP, and their
effectiveness in solving redundancy problems.

a. What are the different redundancy protocols used in switches and routers?
- Redundancy protocols are used in switches and routers to ensure high availability and reliability of
network devices. Some of the most commonly used redundancy protocols in switches and routers are:

+ Spanning Tree Protocol (STP): STP is a protocol used to prevent loops in a network topology. It
ensures that only one active path exists between any two devices on the network, while other alternate
paths are blocked to prevent data collisions.

11
+ Rapid Spanning Tree Protocol (RSTP): RSTP is an updated version of STP that provides faster
convergence and less downtime. It can detect and adapt to network changes much more quickly than
STP.

+ Multiple Spanning Tree Protocol (MSTP): MSTP is an extension of STP that allows for the creation
of multiple spanning trees on a single network. It allows for better load balancing and redundancy by
grouping multiple VLANs into a single spanning tree.

12
+ Virtual Router Redundancy Protocol (VRRP): VRRP is used to provide redundancy for router
interfaces by creating a virtual router. It allows multiple routers to share a virtual IP address and
provides failover capabilities in the event of a router failure.

+ Hot Standby Router Protocol (HSRP): HSRP is similar to VRRP in that it creates a virtual router with
a shared IP address, but it is Cisco proprietary. It allows for redundancy and failover between routers in
a network.

13
+ Gateway Load Balancing Protocol (GLBP): GLBP is a Cisco proprietary protocol that provides
redundancy and load balancing for gateway routers. It allows multiple routers to share a virtual IP
address and distribute traffic between them based on a load-balancing algorithm.

- These redundancy protocols provide essential features for ensuring a high level of network availability
and reliability. By implementing these protocols, network administrators can ensure that their network
is resilient to device failures and can provide a seamless experience for network users.

14
b. How do these protocols work and what are their advantages and disadvantages?
Protocol Function Advantage Disadvantage

Spanning Tree Protocol Prevent network loops Ensures a loop-free Causes network
(STP) by blocking alternate topology downtime during
paths network convergence

Rapid Spanning Tree Faster convergence and Provides faster Can be complex to
Protocol (RSTP) less downtime convergence, reduces configure, may cause
network downtime instability

Multiple Spanning Tree Better load balancing Provides better load Can be complex to
Protocol (MSTP) and redundancy balancing and configure, may cause
redundancy instability

Virtual Router Provides failover Provides redundancy Can cause network


Redundancy Protocol capabilities in the event and failover capabilities instability during
(VRRP) of a router failure failover

Hot Standby Router Provides redundancy Provides redundancy Cisco proprietary


Protocol (HSRP) and failover capabilities and failover capabilities protocol, may not be
in the event of a router compatible with non-
failure Cisco devices

Gateway Load Provides redundancy Provides redundancy Cisco proprietary


Balancing Protocol and load balancing for and load balancing protocol, may not be
(GLBP) gateway routers capabilities compatible with non-
Cisco devices

c. How effective are these protocols in solving redundancy problems in a network infrastructure?
- The redundancy protocols discussed earlier - Spanning Tree Protocol (STP), Rapid Spanning Tree
Protocol (RSTP), Multiple Spanning Tree Protocol (MSTP), Virtual Router Redundancy Protocol
(VRRP), Hot Standby Router Protocol (HSRP), and Gateway Load Balancing Protocol (GLBP) - are all
effective in solving redundancy problems in a network infrastructure.

- These protocols are designed to provide redundancy and failover capabilities that ensure high
availability and reliability of network devices. They achieve this by detecting and adapting to network
changes quickly, providing alternate paths in case of a link failure, and ensuring that data traffic is
distributed evenly across available paths.

- Moreover, the effectiveness of these protocols depends on the specific network topology, the number
and types of devices, and the traffic patterns within the network. For example, STP and RSTP are
effective in simple network topologies with fewer devices, while MSTP is useful in complex topologies
with multiple VLANs.

- VRRP, HSRP, and GLBP provide redundancy and failover capabilities for routers and gateways,
ensuring that traffic is routed through alternate paths if a router fails. These protocols are particularly
useful in high-availability network environments, such as data centers and mission-critical applications.
15
- In summary, the effectiveness of these protocols depends on the specific network topology and the
network's requirements. By providing redundancy and failover capabilities, these protocols ensure that
the network is highly available and reliable, minimizing network downtime and ensuring smooth
network operation.

3. Explain LAN redundancy concepts, network features, such as bandwidth and load, and
related issues.

a. What are LAN redundancy concepts and how are they implemented in a network infrastructure?
- LAN redundancy concepts refer to the use of techniques and protocols to ensure high availability and
reliability of Local Area Networks (LANs) in a network infrastructure. LAN redundancy techniques are
implemented to minimize downtime and ensure seamless operation of the network in case of device
failure or network congestion.

Some of the LAN redundancy concepts that are commonly used in network infrastructure include:

+ Redundant links: This involves the use of multiple physical links between network devices to provide
redundancy and alternate paths in case of a link failure. Redundant links can be implemented using
techniques such as link aggregation, port channeling, or virtual port channeling.

+ Redundant devices: This involves the use of redundant devices such as switches or routers to ensure
network availability and seamless operation in case of a device failure. Redundant devices can be
implemented using techniques such as hot standby, virtual device context, or virtual router redundancy.

+ Spanning Tree Protocol (STP): STP is a protocol that ensures a loop-free topology by blocking
alternate paths. It is used to prevent network loops and ensure seamless operation of the network. STP
can be enhanced by using Rapid Spanning Tree Protocol (RSTP) or Multiple Spanning Tree Protocol
(MSTP) to provide faster convergence and better load balancing.

+ Virtual LAN (VLAN) redundancy: This involves the use of VLANs to provide redundancy and
alternate paths in case of a network failure. VLAN redundancy can be implemented using techniques
such as VLAN trunking or VLAN Spanning Tree Protocol (VSTP).

+ Quality of Service (QoS) mechanisms: QoS mechanisms are used to ensure that critical traffic such as
voice or video is given priority over less critical traffic such as data. QoS mechanisms can be
implemented using techniques such as traffic shaping, traffic policing, or Quality of Service Marking.

- Overall, LAN redundancy concepts are implemented in a network infrastructure to ensure high
availability and seamless operation of the network. By providing redundancy, alternate paths, and
failover mechanisms, LAN redundancy concepts ensure that the network is highly available and
reliable, minimizing network downtime and ensuring smooth network operation

b. What are the different network features that affect bandwidth and load in a network
infrastructure?
- There are several network features that can affect bandwidth and load in a network infrastructure:

16
+ Network topology: The network topology refers to the physical or logical layout of the network. The
topology can affect the efficiency of data transmission and impact network bandwidth and load.

+ Network capacity: The capacity of the network refers to the amount of data that can be transmitted
over the network in a given period. The capacity of the network can be limited by factors such as the
bandwidth of network links, the processing power of network devices, and the amount of memory
available on network devices.

+ Network traffic: The amount and type of network traffic can significantly affect network bandwidth
and load. Heavy network traffic can cause congestion and slow down the network, while specific types
of traffic such as multimedia streams can require more bandwidth.

+ Network protocols: The choice of network protocols can also affect network bandwidth and load.
Some protocols are more efficient at data transmission than others and can reduce network load.

+ Network devices: The type and capabilities of network devices such as switches, routers, and
firewalls can affect network bandwidth and load. High-performance devices with advanced features can
handle larger amounts of data and reduce network load.

+ Quality of Service (QoS): QoS mechanisms can also impact network bandwidth and load by
prioritizing certain types of traffic such as voice or video over other traffic. By allocating bandwidth to
critical traffic, QoS can ensure that the network operates efficiently and reduces network load.

c. How do these features relate to LAN redundancy concepts and what issues can arise when designing
a network infrastructure?
- The network features that affect bandwidth and load are closely related to LAN redundancy concepts.
LAN redundancy techniques are designed to ensure high availability and seamless operation of the
network, even in the event of device failure or network congestion. These techniques can affect network
bandwidth and load, and network administrators need to consider these factors when designing a
network infrastructure.

- For example, redundant links and devices can increase network capacity and provide alternate paths in
case of a link or device failure. However, these techniques can also increase network load and consume
additional bandwidth. Network administrators need to carefully balance redundancy and network
capacity to ensure that the network operates efficiently and effectively.

- Similarly, protocols such as STP or QoS mechanisms can affect network bandwidth and load. STP can
reduce network load by preventing network loops, but it can also cause network congestion by blocking
alternate paths. QoS mechanisms can ensure that critical traffic is prioritized, but they can also consume
additional bandwidth, reducing the overall capacity of the network.

- When designing a network infrastructure, several issues can arise related to LAN redundancy concepts
and network features that affect bandwidth and load. For example, implementing redundant links and
devices can be complex and require careful planning to ensure that they operate seamlessly. Network
administrators must also consider factors such as traffic patterns, device capabilities, and network
capacity when implementing redundancy and QoS mechanisms.

17
II. Deploy a network using LAN design principles based on a predefined set of requirements.

1. Design a network with at least three Layer 2 switches, Layer 3 devices for PVST simulation, and
Layer 3 redundancy, and analyze different switch redundancy protocols.

a. Identify the required specifications for Layer 2 switches and Layer 3 devices in the network design
process.
- When designing a network, it is important to identify the required specifications for Layer 2 switches and
Layer 3 devices to ensure that they meet the network's needs. Here are some key specifications to consider:

Layer 2 Switches Layer 3 Devices

Number of ports: The number of ports required Routing protocols: Layer 3 devices require routing
depends on the size of the network and the number protocols to exchange routing information and make
of devices that need to be connected. forwarding decisions. Common routing protocols
include OSPF, BGP, and EIGRP.

Switching capacity: Switching capacity refers to the Number of interfaces: The number of interfaces
amount of data that can be processed by the switch required depends on the size of the network and the
per second. A higher switching capacity is better for number of connections required.
networks with heavy traffic.

Forwarding rate: The forwarding rate is the speed at Routing table size: The routing table stores
which the switch can forward data packets. A higher information about the network topology and routing
forwarding rate is better for networks with high paths. The routing table size required depends on the
bandwidth requirements. size of the network and the number of routes.

VLAN support: Virtual LANs (VLANs) are used to QoS support: Quality of Service (QoS) mechanisms
segment the network and provide security and are used to prioritize traffic and ensure that critical
flexibility. Switches that support VLANs are traffic is not affected by congestion. Layer 3 devices
required in networks that need to be segmented. that support QoS are required in networks with high-
bandwidth requirements.

PoE support: Power over Ethernet (PoE) allows Security features: Layer 3 devices should have
devices to receive power over the network cable, security features such as firewalls, access control
eliminating the need for separate power sources. PoE lists (ACLs), and virtual private network (VPN)
switches are required for devices such as IP phones capabilities to protect the network from external
and wireless access points. threats.

b. Presents on 2-layer network design (core/distribution) and 3-layer network design including (core,
distribution, access).
* 2-layer network design (core/distribution).

The 2-layer network design is also known as the core/distribution model. It consists of two layers - the core
layer and the distribution layer:

- The core layer:

18
+ Core layer consists of biggest, faster, and most expensive routers with the highest model

numbers and core layer is considered as the back bone of network.

+ Core layer routers are used to merge geographically separated networks.

+ The core layer routers move information on the network as fast as possible.

+ The switches operating at core layer switches packets as fast as possible.

- The distribution layer:

+ The distribution layer is located between the access and core layers.

+ The purpose of this layer is to provide boundary definition by implementing access lists and other filters.

+ Therefore the distribution layer defines policy for the network.

+ Distribution layer include high-end layer 3 switches.

+ Distribution layer ensures that packets are properly routed between subnets and VLANs in your enterprise.

Advantages Disadvantages

Simple and easy to deploy Limited flexibility in adding new services or


applications

Scalable High cost due to the need for high-capacity devices


at the core layer

High-performance connectivity between different


parts of the network

Provides redundancy and high availability

* 3-layer network design (core/distribution/access).

The 3-layer network design, also known as the core/distribution/access model, is an extension of the 2-layer
design. It includes an additional layer called the access layer, which connects end-user devices such as
computers, printers, and servers to the network (because it is an extension of the layer 2 network design, so
core and distribution layers are the same as layer 2 network design):

- The access layer:

+ Access layer includes access switches which are connected to the end devices (Computers, Printers,
Servers etc.).

+ Access layer switches ensures that packets are delivered to the and devices.

Advantages Disadvantages

19
Provides more flexibility in adding new services or More complex and challenging to deploy and
applications manage

Better scalability and capacity planning Requires careful planning to ensure proper
segmentation and traffic flow between layers

Improved network segmentation and security

Lower cost compared to the 2-layer design due to the


use of lower-capacity devices at the access layer

c. Explain the concept of PVST simulation and its importance in network design.
- Per-VLAN Spanning Tree (PVST) simulation is a feature that allows network administrators to simulate
multiple instances of the Spanning Tree Protocol (STP) on a single switch. The PVST simulation enables the
switch to create a separate instance of STP for each VLAN on the network, allowing the switch to support
multiple VLANs with different STP topologies.

- This is important in network design because STP is a protocol used to prevent network loops and ensure
network stability, but it operates on a per-switch basis, rather than a per-VLAN basis. Without PVST, a
single STP topology would be used for all VLANs on the switch, which can lead to network inefficiencies
and instability.

- With PVST simulation, network administrators can optimize network performance by assigning different
priorities to different VLANs, allowing certain VLANs to have faster and more reliable paths to the root
bridge. This feature also helps to prevent network loops and ensure network stability in multi-VLAN
environments.

20
- Moreover, PVST simulation is a key element in designing high-availability networks because it allows for
the creation of redundant links for each VLAN. This redundancy ensures that traffic can be rerouted to an
alternate path in the event of a link or device failure, minimizing network downtime and enhancing network
availability.

d. Network implement.
- As per the specification requirement in the scenario, I have created a network model with L2 switches, L3
Device for Rapid PVST+ and L3 redundancy, redundant links between the switches as shown below and the
table :

* Address table:

Department Network Device IP Address Subner Mark Default


gateway

HR 172.16.30.3 HR_PC 172.16.30.11 255.255.255.0 172.16.30.3

IT 172.16.20.3 IT_PC 172.16.20.10 255.255.255.0 172.16.20.3

Marketing 172.16.10.3 Marketing_PC 172.16.10.10 255.255.255.0 172.16.10.3

Servers 172.16.40.3 DHCP_Server 172.16.40.40 255.255.255.0 172.16.40.3

Mail_Server 172.16.40.100

Branch 172.16.50.3 PC1 172.16.50.11 255.255.255.0 172.16.50.3

PC2 172.16.50.10

Outside Web

21
* Network devices table:

Devices Interface Ip Address Subnet Mask

Hanoi_Branch Router Se0/3/0 100.0.1.2 255.255.255.0

Gig0/0 172.16.100.1 255.255.255.0

Gig0/1 172.16.200.1 255.255.255.0

Tunnel1 10.0.1.1 255.255.255.0

Branch Router Se0/3/1 100.0.2.2 255.255.255.0

Gig0/0 172.16.16.1 255.255.255.0

Tunnel1 10.0.1.2 255.255.255.0

ISP Se0/3/0 100.0.1.1 255.255.255.0

Se0/3/1 100.0.2.1 255.255.255.0

* NAT IP and Devices table:

Devices IP Address IP NAT

Marketing_PC 172.16.10.10

Branch_PC1 172.16.50.11

Branch_PC2 172.16.50.10

IT_PC 172.16.20.10

* Hanoi_Branch network:

- Through the necessary specifications for the switches in part a Layer 2 and Layer 3, I designed a LAN with
L2 and L3 switches, trunk connections and redundant link devices between switches for the HQ network:

22
- I have established Rapid PVST+ on L3 switches:

- For vlans 10 and 30, Mulltilayer Switch 1 serves as the root. On the other side, vlan 20 and 40 have their
roots in multilayer switch 2. Additionally, using Auto-Desirable, ether-channel is enabled on both switches
(PagP).

- Due to redundant connectivity, even if one of the L3 switches is down, the connections will still be
maintained:

23
-The PC from the Marketing department can still ping the HQ Router even if the L3 switch 2 is down, as can
be seen in the image above.

- A business requirement is access control between departments. The corporate servers and its services are
still accessible to these departments, but an access-list has been set up on both L3 switches to prevent
department traffic from moving from one to the other.

- The following illustration demonstrates what occurs when an access-list stops a marketing department PC
from pinging an HR department PC:

-When a PC from the IT department pings a PC from the Marketing department, the identical outcome
occurs:

24
- Next, on the DNS and Syslog server, configure DNS for the mail and web servers in the manner described
below to resolve the domain name for web and mail service:

25
- The website may now be accessed by typing "namhai.vip" in place of the IP address "172.16.40.40."

- I'll now view the business website on the HR PC at the HR department:

26
- To start the mail service, I made user departments and supplied "Domain Name":

27
- Now we will check if they work in the east by going to the "Desktop" section and going to "Email":

28
- I will now send mail from user1@namhai.mail to namhai@namhai.mail:

29
- And the results we get are on namhai@namhai.mail:

30
2. Analyze different failover protocols such as STP, RSTP, R-PSTP, MST, and their effectiveness in
solving redundancy problems.

a. Explain the concept of failover protocols and their importance in network design.
- Failover protocols are used in network design to ensure that network devices and services remain
available in the event of a failure. These protocols are designed to automatically switch traffic to
redundant devices or services in the event of a failure, minimizing downtime and maintaining the
availability of the network.

- The importance of failover protocols in network design cannot be overstated. Networks are critical to
the operations of many organizations, and any downtime can result in lost productivity, revenue, and
reputation damage. Failover protocols can help ensure that the network remains available and minimize
the impact of any failures.
31
- There are different types of failover protocols, depending on the specific network devices or services
involved. For example, in the case of switches, Spanning Tree Protocol (STP) and its variants can
provide failover protection by disabling links in the event of a failure and automatically reconfiguring
the network to maintain connectivity. Similarly, in the case of routers, protocols such as Virtual Router
Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP) can provide failover protection
by allowing multiple routers to share the same IP address and automatically switching traffic to a
backup router in the event of a failure.

- Failover protocols can also be used for other network services, such as Domain Name System (DNS)
and Dynamic Host Configuration Protocol (DHCP). In these cases, multiple servers can be configured
to provide redundant services, and failover protocols can be used to switch traffic to a backup server in
the event of a failure.

b. Compare and contrast the different failover protocols.


Protocol Type Convergence Supported Redundancy Advantages
Time Topologies Type

Spanning Tree Layer 2 30-50 seconds Physical Active/standby Simple to


Protocol (STP) topologies configure and
deploy, widely
supported by
network
devices, ensures
only one active
path is used

Rapid Spanning Layer 2 <5 seconds Physical Active/standby Faster


Tree Protocol topologies or load blancing convergence
(RSTP) time, supports
multiple active
paths, widely
supported by
network
devices

Virtual Router Layer 3 <1 second Logical Active/standby Easy to


Redundancy topologies configure and
Protocol deploy, widely
(VRRP) supported by
network
devices, allows
multiple routers
to share a
virtual IP
address

Hot Standby Layer 3 <1 second Logical Active/standby Allows multiple


Router Protocol topologies routers to share

32
(HSRP) a virtual IP
address,
provides finer
control over
failover process

Gateway Load Layer 3 <1 second Logical Load balancing Allows multiple
Balancing topologies routers to share
Protocol a virtual IP
(GLBP) address,
supports equal
cost load
balancing

c. Evaluate the effectiveness of each failover protocol in solving redundancy problems in the network
design.
- Evaluating the effectiveness of each handover protocol failure in addressing redundancy in network design
depends on many factors, including network size and complexity, performance requirements, and
availability. system, as well as user configuration and management.

- Several failed handover protocols such as STP, RSTP, VRRP, and HSRP can be implemented to ensure
network availability in the event of a device or connection failure. However, each protocol has its own
advantages and disadvantages, and should be selected in accordance with the specific requirements of the
network.

- Evaluating the effectiveness of each failed handover protocol should include several criteria, including:

+ Switching rate: the time it takes for the network to switch to the backup device when the primary device
fails.

+ Recovery time: the time it takes to get the main unit back into service after being repaired or replaced.

+ Load balancing: the ability to distribute network load evenly between primary and backup devices.

+ Deployment complexity: the complexity of configuration and management when implementing a


particular protocol.

- Therefore, when evaluating the effectiveness of failed handover protocols, it is necessary to consider the
above factors to select the most suitable protocol for the particular network

3. Analyze Layer 3 fallback deployment for IPv4 and IPv6.

a. Define the concept of Layer 3 fallback and its importance in network design.
- Layer 3 fallback refers to the ability of a network to maintain connectivity in case of a failure or
misconfiguration of the primary routing path. It is a failover mechanism used to provide redundancy in
a network infrastructure. When a primary routing path fails, Layer 3 fallback mechanisms redirect
traffic to a secondary or backup routing path, ensuring continuity of network connectivity and
minimizing the impact of the failure.
33
- The importance of Layer 3 fallback in network design is to ensure high availability and reliability of
network services. By implementing Layer 3 fallback, network designers can minimize the risk of
network downtime, which can have severe consequences for businesses and organizations. In addition,
Layer 3 fallback can improve network performance by reducing network congestion and providing
efficient traffic routing in case of failures or traffic imbalances.

b. Analyze the deployment of Layer 3 fallback for both IPv4 and IPv6 protocols.
Layer 3 fallback for IPv4 Layer 3 fallback for IPv6

In IPv4, Layer 3 fallback can be achieved using In IPv6, the Layer 3 fallback mechanism is provided
HSRP, VRRP, or GLBP. by the Neighbor Discovery Protocol (NDP) using the
Router Advertisement (RA) message type.

HSRP is a Cisco proprietary protocol that allows NDP provides a method for a router to advertise its
multiple routers to participate in a virtual router presence and network topology information to other
group. The active router forwards packets sent to the nodes on the network. If a router fails, its
virtual router's IP address, while the standby routers replacement sends out its own RA message, and the
monitor the active router and take over if it fails. other nodes update their routing tables.

VRRP is an open standard protocol that provides a With IPv6, routers can use multiple methods to
way for multiple routers to work together to present advertise themselves and their network topology
the appearance of a single virtual router to the hosts information, such as ICMPv6 Router Advertisement
on a LAN. The active router sends packets to the messages and DHCPv6.
virtual router's IP address, and the standby routers
monitor the active router and take over if it fails.

GLBP is a Cisco proprietary protocol that provides In IPv6, there is no need for a separate protocol like
load balancing and redundancy for IP traffic on a HSRP or VRRP to provide Layer 3 fallback, as it is
LAN. It allows multiple routers to participate in a already built into NDP.
virtual router group, with one router acting as the
active virtual gateway and the other routers acting as
backup virtual gateways.

c. Evaluate the effectiveness of Layer 3 fallback deployment in network design.


- The effectiveness of Layer 3 fallback deployment in network design depends on various factors, such
as the size and complexity of the network, the criticality of the services running on the network, and the
availability of backup resources.

- Layer 3 fallback can improve network resiliency and minimize downtime by providing an automatic
failover mechanism in case of a primary link failure.

- However, it is important to ensure that the fallback mechanism is properly configured and tested to
avoid any unintended consequences.

- Additionally, Layer 3 fallback may not be sufficient in all cases and should be supplemented by other
redundancy mechanisms, such as link aggregation and redundant routing protocols.

34
- Overall, Layer 3 fallback can be an effective tool for improving network availability and should be
considered as part of a comprehensive network design strategy.

4. Evaluate different link aggregation implementations using EtherChannel to address bandwidth and
load issues.

a. Define the concept of link aggregation and its importance in network design.
- Link aggregation, also known as NIC teaming or Ethernet bonding, is a technique used in network
design to increase the bandwidth and redundancy of a network connection by combining multiple
physical links into a single logical link. Link aggregation is important in network design because it
provides a way to scale the network bandwidth without replacing existing network infrastructure, and
also improves network reliability by providing redundancy in case one of the links fails. By using link
aggregation, network administrators can achieve better network performance, load balancing, and
network resiliency, which are important requirements for modern networks.

b. Analyze the different link aggregation implementations, including their advantages and
disadvantages.
- Link aggregation, also known as port trunking, is the process of combining multiple physical network
connections into a single logical connection to increase bandwidth and improve redundancy in a
network.

- There are several different link aggregation implementations, including:

+ Static Link Aggregation (SLA): In this implementation, the administrator manually configures the
link aggregation groups (LAGs) on each switch. It requires manual configuration and cannot
automatically detect failed links.

+ Link Aggregation Control Protocol (LACP): LACP is a dynamic link aggregation protocol that
automatically detects and configures LAGs. It allows for automatic failover and load balancing across
multiple links.

+ Port Aggregation Protocol (PAgP): PAgP is a Cisco proprietary protocol similar to LACP. It provides
automatic configuration of LAGs and allows for failover and load balancing.

35
LACP and PAgp

- Advantages of link aggregation include increased bandwidth and redundancy, improved network
performance and reliability, and simplified network management. It also allows for flexible scaling and
future growth of the network.

- Disadvantages of link aggregation include increased complexity, higher cost due to the need for
additional network equipment, and the potential for misconfigurations and compatibility issues.

Implementation Advantages Disadvantages

Static Link Aggregation Simple to configure and manage Not dynamic, cannot adapt to
changes in the network

Dynamic Link Aggregation Adapts to changes in the network, More complex to configure and
can balance traffic more manage
effectively

Link Aggregation Control Standardized and interoperable, Requires support from both ends
Protocol (LACP) supports dynamic link aggregation of the link, not all devices support
LACP

Port Aggregation Protocol (PAgP) Cisco proprietary protocol that Only works with Cisco devices,
supports dynamic link aggregation not interoperable with other
vendors

- The choice of link aggregation implementation will depend on the specific requirements and
limitations of the network. LACP is a widely used industry standard and is recommended for most
networks, while PAgP is only compatible with Cisco equipment. SLA may be used in some cases where
automatic failover and load balancing are not required.

36
c. Evaluate the effectiveness of using EtherChannel in link aggregation to address bandwidth and load
issues in network design.
- EtherChannel, also known as Link Aggregation Control Protocol (LACP), is an effective method for
combining multiple physical links into a single logical link to increase bandwidth, improve redundancy,
and balance network traffic. The effectiveness of EtherChannel depends on several factors, including
the network topology, the number of links aggregated, and the type of traffic being carried.

Advantages of using EtherChannel in link Disadvantages of using EtherChannel in link


aggregation aggregation

Increased bandwidth: EtherChannel combines Complexity: EtherChannel requires configuration on


multiple physical links into a single logical link, both ends of the link, which can be complex and
which increases the available bandwidth between time-consuming.
switches.

Improved redundancy: In the event of a link failure, Limited scalability: EtherChannel is limited to a
EtherChannel can provide redundancy by maximum of eight physical links, which may not be
automatically redistributing traffic across the sufficient for larger networks.
remaining links.

Load balancing: EtherChannel can balance the Compatibility: EtherChannel may not be compatible
network traffic across all links in the channel, with all network devices and protocols, which can
preventing congestion on any single link. limit its effectiveness in some environments.

Improved performance: By distributing traffic across


multiple links, EtherChannel can reduce packet loss
and improve network performance.

III. Produce a WAN solution that fits a wide range of organizational requirements.

1. Benefits and limitations of private WAN technologies

a. What are the advantages of private WAN technologies over public WAN technologies?
- Private WAN technologies offer several advantages over public WAN technologies, including:

Private WAN Technologies Public WAN Technologies

More secure due to dedicated infrastructure and Less secure as data travels through public networks
encryption capabilities. and may be more vulnerable to interception and
attacks.

Greater control over network performance and Limited control over network performance and
reliability as resources are not shared with other reliability as resources are shared with other
organizations. organizations.

Lower latency and faster speeds as data does not Higher latency and slower speeds due to the need for
need to travel through multiple networks to reach its data to travel through multiple networks to reach its
37
destination. destination.

Higher degree of customization and flexibility in Limited customization and flexibility in terms of
terms of network design and implementation. network design and implementation as services are
standardized.

More cost-effective for large organizations with high More cost-effective for smaller organizations with
bandwidth requirements, as fixed costs can be spread lower bandwidth requirements, as usage-based
out over a larger network. pricing models can be more affordable.

b. How can private WAN technologies improve network security and reliability?
- Private WAN technologies can improve network security and reliability in several ways:

+ Security: Private WAN technologies, such as MPLS and VPLS, offer a higher level of security compared
to public WAN technologies. This is because they use private networks with dedicated connections, which
are not accessible by unauthorized users. Additionally, private WAN technologies often include built-in
security features, such as encryption and authentication, which help to prevent data breaches and
unauthorized access.

+ Reliability: Private WAN technologies typically offer better reliability than public WAN technologies.
This is because private WAN technologies provide dedicated bandwidth, which means that network
performance is not affected by other users on the network. Private WAN technologies also offer better
failover capabilities, which means that if one connection fails, traffic can be automatically rerouted to
another connection.

+ QoS: Private WAN technologies offer better Quality of Service (QoS) capabilities than public WAN
technologies. This means that network administrators can prioritize traffic according to its importance,
ensuring that critical applications receive the bandwidth they need to function properly.

+ Scalability: Private WAN technologies offer better scalability compared to public WAN technologies.
This is because private WAN technologies provide dedicated connections that can be easily scaled up or
down as needed, without affecting network performance.

c. What are the potential disadvantages of using private WAN technologies?


- While private WAN technologies offer several advantages, they also come with some potential
disadvantages, including:

+ Higher costs: Private WAN technologies can be more expensive to implement and maintain compared to
public WAN technologies. Organizations may need to invest in specialized equipment and dedicated
infrastructure.

+ Limited geographic coverage: Private WAN technologies typically have limited geographic coverage,
which means that organizations may need to use multiple providers to cover their entire network. This can
increase costs and complexity.

+ Higher complexity: Private WAN technologies can be more complex to configure and manage compared
to public WAN technologies. This can require additional resources and expertise.

38
+ Limited flexibility: Private WAN technologies are often less flexible than public WAN technologies, and
may not support as many options for customization and scalability.

2. Benefits and limitations of public WAN technologies

a. What are the advantages of public WAN technologies over private WAN technologies?
- Public WAN technologies offer several advantages over private WAN technologies, including:

Advantages of public WAN technologies Advantages of private WAN technologies

Wide availability: Public WAN technologies are Customization: Private WAN technologies can be
widely available from multiple providers, making it customized to meet specific business needs, such as
easier to find and compare services. security requirements or performance demands.

Scalability: Public WAN technologies are highly Greater control: Private WAN technologies provide
scalable, making it easy to add or remove services as greater control over the network, allowing businesses
needed. to optimize performance and security to meet their
specific needs.

Cost-effectiveness: Public WAN technologies can be Higher security: Private WAN technologies are
more cost-effective than private WAN technologies generally more secure than public WAN
for small businesses or businesses with limited technologies, offering greater protection against
network requirements. cyber threats and data breaches.

Flexibility: Public WAN technologies are highly Better reliability: Private WAN technologies can
flexible, allowing businesses to adjust services and provide better reliability and uptime than public
features as their needs change. WAN technologies due to dedicated connections and
more rigorous service level agreements (SLAs).

Innovation: Public WAN technologies are often at Enhanced privacy: Private WAN technologies offer
the forefront of new networking innovations and greater privacy than public WAN technologies, as
technologies. the network is not shared with other businesses or
individuals.

b. How can public WAN technologies provide cost savings for organizations?
- Public WAN technologies can provide cost savings for organizations in several ways:

+ Lower upfront costs: Public WAN technologies such as the Internet have significantly lower upfront costs
than private WAN technologies such as leased lines, MPLS circuits, or VPNs.

+ Lower ongoing costs: Public WAN technologies typically have lower ongoing costs than private WAN
technologies. For example, the cost of bandwidth is typically lower for public WAN technologies.

+ No hardware costs: Public WAN technologies such as the Internet do not require organizations to purchase
or maintain expensive networking hardware.

+ No maintenance costs: Public WAN technologies do not require organizations to maintain their own
network infrastructure, which can result in significant cost savings.

39
+ Scalability: Public WAN technologies can be easily scaled up or down to meet the changing needs of an
organization, without requiring significant additional costs.

+ Access to cloud services: Public WAN technologies provide access to cloud services that can help
organizations reduce their infrastructure costs and increase their flexibility.

c. What are the potential disadvantages of using public WAN technologies?


- There are several potential disadvantages of using public WAN technologies, including:

+ Security risks: Public WAN technologies are accessible to anyone on the internet, which makes them more
vulnerable to security threats such as hacking, malware, and data breaches.

+ Reliability: Public WAN technologies rely on the infrastructure of the internet, which can be subject to
outages, congestion, and other performance issues.

+ Limited control: Organizations may have limited control over the configuration and management of public
WAN technologies, which can make it more difficult to customize them to specific business needs.

+ Limited bandwidth: Public WAN technologies may have limited bandwidth, which can result in slower
network speeds and reduced productivity.

+ Service-level agreements (SLAs): SLAs for public WAN technologies may not provide the same level of
uptime and performance guarantees as private WAN technologies, which can impact business operations.

3. Evaluation of different types of VPNs based on company needs

a. What are the different types of VPNs available for organizations?


- There are three main types of VPNs available for organizations:

+ Remote Access VPN: This type of VPN provides secure access to a remote user or device over the public
internet. It enables remote workers to connect to their organization's network securely, typically through a
VPN client installed on their device.

+ Site-to-Site VPN: This type of VPN provides secure communication between two or more geographically
dispersed sites or networks. It creates a virtual tunnel between the sites and encrypts all traffic passing
through the tunnel. Site-to-Site VPNs are commonly used by organizations to securely connect branch
offices, data centers, or cloud providers.

+ Extranet VPN: This type of VPN provides secure communication between an organization and its external
partners, customers, or suppliers over the public internet. It enables secure sharing of data and resources
between organizations without the need for dedicated connections.

- There are also other VPN types, such as Layer 2 VPN, MPLS VPN, and SSL VPN, but these are typically
used by service providers rather than organizations.

b. How do site-to-site VPNs and remote access VPNs differ in terms of implementation and
functionality?
- Site-to-site VPNs connect two or more remote networks as if they are on the same local area network
(LAN), while remote access VPNs allow individual users to securely access a private network from a remote

40
location. Site-to-site VPNs require VPN gateways at each site, while remote access VPNs require client
software on the user's device.

c. How can organizations determine which type of VPN is best suited for their specific needs and
requirements?
- Organizations can determine which type of VPN is best suited for their needs and requirements by
evaluating their network architecture, the number of remote users and sites, the type of applications and data
being transmitted, and their budget constraints. Site-to-site VPNs are typically more suitable for
organizations with multiple sites or data centers, while remote access VPNs are more suitable for
organizations with a large number of remote users. It is important to consider the security, scalability, and
cost implications of each type of VPN before making a decision.

IV. Solve a wife range of network-related problems using appropriate troubleshooting


techniques and methods.

1. Describe common network problems and their impact on the organization's business.
- Common network problems include:

+ Slow network speeds - this can affect productivity and cause frustration for employees who need to access
resources quickly.

+ Network downtime - this can result in lost productivity and revenue for the organization, as well as
damage to the organization's reputation.

+ Security breaches - unauthorized access to sensitive information can lead to legal and financial
consequences, as well as damage to the organization's reputation.

+ Network congestion - this can result in slow network speeds and decreased performance, leading to
productivity issues.

+ Bandwidth limitations - this can impact the organization's ability to handle large amounts of data, leading
to slow network speeds and decreased productivity.

+ The impact of these network problems can range from minor inconveniences to significant financial
losses, legal issues, and damage to the organization's reputation. It is crucial for organizations to identify and
address network problems promptly to minimize their impact on the business.

2. Explain network fault detection techniques such as network analyzer, system logs, monitoring
software, and how to use them to detect network problems.
- Network fault detection techniques include:

+ Network analyzer: Also known as a protocol analyzer or packet sniffer, it captures and analyzes network
traffic to identify issues such as slow network response, failed connections, or packet loss.

+ System logs: These are log files generated by network devices such as routers, switches, and firewalls,
which record events and activities on the device. They can help identify errors, warnings, and failures that
may impact the network.

41
+ Monitoring software: These are applications that can monitor network devices, services, and applications
in real-time, providing alerts and notifications when issues arise. They can also generate reports on network
performance and availability.

- To use these techniques to detect network problems, network administrators must regularly review network
traffic, system logs, and monitoring software alerts to identify any issues. They can also use tools such as
ping and traceroute to test connectivity and latency between devices. When an issue is identified,
administrators must analyze the data collected by these techniques to isolate the problem and take
appropriate action to resolve it.

3. What are the different network troubleshooting methods?


- There are several network troubleshooting methods, including:

+ Divide and Conquer: breaking down the network into smaller segments to isolate the problem area

+ Bottom-Up: starting at the physical layer and working up through the OSI layers to identify the problem

+ Top-Down: starting at the application layer and working down through the OSI layers to identify the
problem

+ Comparison: comparing the faulty system with a working system to identify differences and potential
causes of the problem

+ Hypothesis: creating a hypothesis about the cause of the problem and testing it through network analysis
and experimentation.

4. How can you find the cause of network problems?


- To find the cause of network problems, you can follow these steps:

+ Define the problem: Clearly identify the problem and its symptoms.

+ Gather information: Collect data about the network configuration, hardware and software involved, and
any recent changes made to the network.

+ Analyze the data: Use tools like network analyzers, logs, and monitoring software to identify any
anomalies or errors.

+ Test the hypothesis: Based on the analysis, develop a hypothesis for the cause of the problem and test it by
performing appropriate actions.

+ Resolve the issue: Once the cause has been identified and verified, take necessary steps to resolve the
issue, such as updating firmware, replacing faulty hardware, or reconfiguring the network.

+ Monitor the network: Monitor the network to ensure that the issue has been fully resolved and to prevent
future occurrences of similar problems.

5. When should you repair or replace damaged hardware and software?


- Hardware and software should be repaired or replaced when they are causing network problems that cannot
be resolved through other troubleshooting methods. If the cost of repairing the hardware or software is high
or if the equipment is outdated, it may be more cost-effective to replace it with new hardware or software.
42
It's important to consider the impact of the hardware or software on the network and the organization's
business operations before deciding whether to repair or replace it.

6. Why is it important to update to the latest patches?


- It is important to update to the latest patches for several reasons:

+ Security: Software vulnerabilities can be exploited by attackers to gain unauthorized access or to carry out
malicious activities. Patches often address security vulnerabilities, so updating to the latest patches can help
protect against these threats.

+ Stability: Patches may also address stability issues, such as software crashes or system instability.
Updating to the latest patches can help improve the stability and reliability of the system.

+ Compatibility: Patches may also improve compatibility with other software and hardware, so updating to
the latest patches can help ensure that everything works together smoothly.

+ Performance: Patches may include performance improvements or optimizations, so updating to the latest
patches can help improve the overall performance of the system.

7. What are the reasons for changing network configurations?


- There could be several reasons for changing network configurations, including:

+ Business requirements: Changes in business requirements may necessitate changes in network


configurations to meet the new requirements.

+ Network expansion: As organizations grow, their network needs may expand, and changes to the network
configuration may be necessary to accommodate this growth.

+ Security concerns: As new threats emerge, changes to the network configuration may be necessary to
strengthen security measures and protect the network from potential attacks.

+ Performance issues: Changes in network traffic patterns, increased demand on network resources, or other
factors may require adjustments to the network configuration to maintain optimal performance.

+ Technology upgrades: Upgrades to hardware or software may require changes to the network
configuration to ensure compatibility and optimal performance.

8. What are the steps for creating emergency remediation plans?


- Creating an emergency remediation plan involves several steps, including:

+ Identify potential network failures and their impact on business operations.

+ Establish response teams responsible for managing the remediation process.

+ Define procedures for responding to network outages, including notification processes, troubleshooting
methods, and escalation procedures.

+ Develop a communication plan to keep stakeholders informed throughout the remediation process.

+ Establish backup and recovery procedures to minimize data loss and downtime.

43
+ Regularly test and update the remediation plan to ensure it remains effective and relevant to changing
network environments.

9. What are the preventive measures for network problems?


- There are several preventive measures that can be taken to avoid network problems. Some of them are:

+ Regular maintenance of hardware and software.

+ Implementing security measures such as firewalls, intrusion detection systems, and antivirus software.

+ Regularly updating software and firmware to the latest versions.

+ Implementing redundant hardware and backup solutions.

+ Regularly monitoring and analyzing network traffic to identify potential issues.

+ Establishing clear network policies and procedures to ensure proper use of the network.

+ Conducting regular training and education for employees to increase awareness of security risks and best
practices.

- By implementing these measures, organizations can reduce the risk of network problems and minimize
their impact on business operations.

10. Some network monitoring tools.

a. Iciga.

44
- Icinga is an additional free and open-source network monitoring tool that keeps track on data center,
cloud, and network performance. The web-based program can be set up using the GUI or a Domain
Specific Language (DSL). You have the freedom to monitor however you choose since you have the
choice between the two: The dashboard shows any performance or availability issues and color-codes
them based on their seriousness (critical or down network devices are shown in red).

- Features:

+ Dashboard

+ Web-based GUI

+ DSL configuration available

+ Icinga Modules / Extensions

b. Auvik.
- This cloud-based network monitoring solution has a number of system administration functions. The
installation procedure for collectors on your machine begins when you establish an account and access the
package with a Web browser. The Auvik package enables centralized management of several locations.
Therefore, the suite is ideal for WAN monitoring.The network discovery process is how the Auvik service
gets started. All of the necessary basic information is automatically filled in so that the monitor can work.
When new devices join the network, the continuing discovery service will notice it.

- Features:

+ Automated setup

+ Resource utilization alerts

+ Network mapping

+ Configuration management

45
c. SolarWinds Network Performance Monitor.
- SNMP may be used by this all-inclusive network performance monitoring tool to monitor device status. It
can easily discover network devices connected to your network. Use the dashboard to monitor all
connected network devices' availability and performance closely. You may inspect any discovered devices,
applications, or services using a network topology map, which depicts how your infrastructure is
interconnected. You may trace packet transfers hop-by-hop with the help of the NetPath function, which
can help you pinpoint the root cause of network performance issues more precisely.

- Features:

+ Auto discover

+ Intelligent network maps with NetPath

+ WiFi heat maps

+ SNMP monitoring

+ Reports system

+ Alerts system

d. Zabbix.
- This open-source, free network monitoring tool offers an integrated solution for network, server, cloud,
application, and services monitoring. Zabbix uses IPMP and SNMP to monitor your network. The
autodiscovery function automatically locates network devices and adds them to the monitored list.
Additionally, the application can automatically spot configuration changes, enabling you to ascertain
whether a piece of network equipment has been updated.

- Features:

46
+ Alerts system

+ Server monitoring

+ Autodiscovery feature

+ Application monitoring

+ SNMP and IPMP monitoring

+ Network monitoring templates

+ Automatic detection of configuration changes

V. R eferences.
https://www.routerfreak.com/ccna-fhrp-hop-redundancy-protocols/

https://www.youtube.com/watch?
v=LwTSMqxYQPM&list=PLJqC9dZZBp1vdCkZ1To2fgVm3PskquQrJ

https://www.youtube.com/playlist?list=PLQd3D0Eos95cZxXvwpnMNLlL6yAeuAW3K

https://www.indeed.com/career-advice/career-development/types-of-servers

https://www.networkcomputing.com/data-centers/campus-network-design-models

47

You might also like