You are on page 1of 5

NAME: ARTWELL T SITHOLE

REG NUMBER: R227758B


PROGRAM: HONORS IN NETWORK ENGINEERING
COURSE: NETWORK DESIGN & IMPLEMENTATION

1
ASSIGNMENT 1
QUESTION 1
Layers within Hierarchical Network Design

Access Layer
- The access layer is the edge of the network where end devices connect, such as workstations,
printers, phones, and access points.
- Its primary function is to provide connectivity for end devices and extend the network.
- The access layer is responsible for meeting the needs of end-device connectivity.
- It often incorporates Layer 2 switches and provides high-bandwidth connectivity and Layer 2
switching capabilities.

Distribution Layer
- The distribution layer is located between the access and core layers.
- Its main purpose is to provide policy-based connectivity and control the boundary between the
access and core layers.
- It performs functions such as routing, data filtering, and implementing access lists and other
filters.
- The distribution layer helps optimize traffic flow and ensures efficient data management within
the network.

Core Layer
- The core layer is the backbone of the network and is considered the most critical layer.
- It consists of high-speed routers that provide fast transport between distribution switches in the
network.
- The core layer is responsible for moving information on the network as quickly as possible.
- It ensures reliable and efficient communication between different parts of the network.

QUESTION 2

QUESTION 3

Top-Down Approach
- The top-down approach starts with analyzing the requirements and goals of the organization or
business.
- It focuses on understanding the needs of the network applications and services before selecting
the appropriate technologies and devices.
- This approach ensures that the network design is aligned with the organization's objectives and
can adapt to its specific requirements.
- The top-down approach typically follows a systematic methodology, such as the PPDIOO
(Prepare, Plan, Design, Implement, Operate, Optimize) model, to ensure a comprehensive and
well-thought-out design.

2
- By starting from the top layer of the OSI model and working down, the top-down approach
allows for a holistic view of the network design, considering factors such as scalability, security,
and performance.

Bottom-Up Approach
- In contrast, the bottom-up approach begins with the lower layers of the OSI model, such as the
physical layer, and works its way up.
- This approach often focuses on specific technologies, protocols, and network media, with less
emphasis on the overall requirements and applications.
- Network professionals may be more familiar with this approach as it aligns with their expertise
in networking technologies.
- The bottom-up approach can be quicker to implement as it prioritizes setting up the necessary
equipment and infrastructure.
- However, it may result in an inappropriate network design if the specific requirements and
applications are not adequately considered.

QUESTION 4

FCAPS Model

The FCAPS model stands for Fault, Configuration, Accounting, Performance and Security. It is a
network management framework developed by the International Organization for
Standardization (ISO). It provides a structured approach to managing and monitoring network
systems.

Fault Management
- Fault management focuses on detecting, isolating, and resolving network faults or problems.
- It involves practices such as fault detection, fault isolation, fault correlation, and fault
resolution.
- The goal is to identify and address network issues promptly to minimize downtime and ensure
network stability.
- Historical fault data analysis helps identify trends and enables proactive measures to improve
network performance.

Configuration Management
- Configuration management involves managing and maintaining the configuration of network
devices and systems.
- It includes tasks such as device provisioning, configuration backup, change management, and
version control.
- The aim is to ensure that network devices are correctly configured, consistent, and compliant
with organizational policies and standards.
- Effective configuration management helps prevent configuration errors and facilitates efficient
network operations.

Accounting Management
- Accounting management focuses on tracking and monitoring network resource usage and costs.

3
- It involves activities such as collecting, analyzing, and reporting network usage data, including
bandwidth utilization, traffic patterns, and resource allocation.
- Accounting management helps organizations understand resource consumption, optimize
network utilization, and allocate costs accurately.

Performance Management
- Performance management aims to monitor and optimize network performance to meet defined
service levels and user expectations.
- It involves measuring and analyzing various performance metrics, such as latency, throughput,
packet loss, and response times.
- Performance management helps identify bottlenecks, optimize network capacity, and ensure
efficient network operations.

Security Management
- Security management focuses on protecting network systems, data, and resources from
unauthorized access, threats, and vulnerabilities.
- It includes tasks such as user authentication, access control, encryption, intrusion detection, and
security policy enforcement.
- Security management ensures the confidentiality, integrity, and availability of network
resources and helps mitigate security risks.

The FCAPS model provides a comprehensive framework for network management, covering key
aspects of fault detection and resolution, configuration control, resource accounting, performance
optimization, and security enforcement. It helps network operators and service providers
understand the major functions of network management systems and evaluate network
management tools and capabilities.

QUESTION 5

3 guidelines to ensure acceptable voice quality when routing voice traffic:

Provide Sufficient Bandwidth


Voice traffic requires a certain amount of bandwidth to ensure clear and uninterrupted
communication. It is recommended to allocate at least 384 Kbps (kilobits per second) of
bandwidth for voice traffic. By ensuring sufficient bandwidth, you can prevent congestion and
packet loss, which can degrade voice quality.

Minimize Latency and Jitter


Latency refers to the delay in transmitting voice packets from the sender to the receiver. To
maintain good voice quality, the latency should be kept below 150 milliseconds. Jitter, on the
other hand, refers to the variation in delay between voice packets. Minimizing jitter ensures a
steady and consistent delivery of voice packets, contributing to a smoother communication
experience.

4
Implement Quality of Service (QoS)
QoS mechanisms prioritize voice traffic over other types of network traffic, ensuring that voice
packets receive preferential treatment. QoS helps in providing dedicated bandwidth, improving
loss characteristics, avoiding network congestion, shaping network traffic, and setting traffic
priorities across the network. By implementing QoS, you can ensure that voice traffic is given
the necessary resources and network conditions to maintain acceptable voice quality.

You might also like