TRANSPORT NETWORK DESIGN UNIT 15 Ahamed Shamil KG-64212 Contents a) What type of network should be deployed in the Main Building and what equipment should be installed and please describe about that devices?.................................................................................3 Types of Network Switches ....................................................................................................................... 6 LAN Switch or Active Hub ................................................................................................................ 6 Unmanaged Network Switches .......................................................................................................... 7 Managed Switches ............................................................................................................................... 7 Core Routers vs. Edge Routers .......................................................................................................... 9 Virtual Router ....................................................................................................................................... 9 Nodes on a LAN ....................................................................................................................................... 10 Types of Local-Area Networks (LANs) ..................................................................................................... 10 b) What type of network should be deployed in the SUB-A Building and what equipment should be installed (describe your answer)? ………………………………………………….10 c)What type of network should be deployed in the SUB-B and what equipment should be installed (describe your answer)??.............................................................................................11 Firewall ........................................................................................................................................................ 13 d) What type of network connections should be used to link the buildings together and where and how should the College’s Internet connection be made? ……………………….15 • BUS Topology ................................................................................................................................ 17 • RING Topology ............................................................................................................................. 18 • STAR Topology ............................................................................................................................. 18 • MESH Topology ............................................................................................................................ 19 • TREE Topology ............................................................................................................................. 19 • HYBRID Topology........................................................................................................................ 20 1. Personal Area Network (PAN)..................................................................................................... 21 2. Local Area Network (LAN) .......................................................................................................... 21 3. Wireless Local Area Network (WLAN) ...................................................................................... 21 4. Campus Area Network (CAN) ..................................................................................................... 21 5. Metropolitan Area Network (MAN) ........................................................................................... 21 6. Wide Area Network (WAN) ......................................................................................................... 22 7. Storage-Area Network (SAN) ...................................................................................................... 22 8. System-Area Network (also known as SAN) .............................................................................. 22 9. Passive Optical Local Area Network (POLAN) ......................................................................... 22 10. Enterprise Private Network (EPN)............................................................................................ 22 1|Page 11. Virtual Private Network (VPN) ................................................................................................. 23 Hierarchical Network Design ........................................................................................................... 23 What does Network Redundancy mean? ............................................................................................... 26 MRP - Media Redundancy Protocol ....................................................................................................... 34 PVST+ and Rapid PVST+ ........................................................................................................................ 44 PVST+ (Per VLAN Spanning Tree Plus)................................................................................................ 44 PVST+ (Per VLAN Spanning Tree Plus) is a Cisco proprietary STP version. It is also the default STP version for Cisco devices. It is the standard named 802.1d. ....................................................................... 44 How WANs Are Connected ..................................................................................................................... 47 Leased Lines and Metro Ethernet ........................................................................................................... 48 Problems With Wide Area Networks ...................................................................................................... 48 Network Management Protocols............................................................................................................ 60 Network management protocols are network protocols................................................................ 60 Be clear about the approach of the protocol........................................................................................ 60 Network management protocols and their architecture................................................................ 61 Network management protocols and the organization of dataAnother fundamental point is the way in which the network administration protocols format and manage the management data. ................... 61 ICMP .................................................................................................................................................. 62 SNMP ................................................................................................................................................. 62 Architecture SNMP........................................................................................................................... 63 1. Duplicate IP Addresses ........................................................................................................................ 64 2. IP Address Exhaustion ......................................................................................................................... 64 3. DNS Problems ..................................................................................................................................... 65 4. Single Workstation Unable to Connect to the Network ..................................................................... 65 5. Unable to Connect to Local File or Printer Shares .............................................................................. 66 6. Local Network is Unable to Connect to the internet .......................................................................... 66 7. Slow Internet Performance ................................................................................................................. 67 According to cisco ................................................................................................................................... 68 Configuration Issues................................................................................................................................ 68 • SSID Mismatch.......................................................................................................................... 68 • Security Mismatch .................................................................................................................... 68 • Disabled WLAN ........................................................................................................................ 68 • Unsupported Data-Rates .......................................................................................................... 68 2|Page LO1 Explore LAN design principles and their application in the network design process. Part 1 a) What type of network should be deployed in the Main Building and what equipment should be installed and please describe about that devices? Network design refers to the planning of the implementation of a computer network infrastructure. Network design is generally performed by network designers, engineers, IT administrators and other related staff. It is done before the implementation of a network infrastructure. Network design involves evaluating, understanding and scoping the network to be implemented. The whole network design is usually represented as a network diagram that serves as the blueprint for implementing the network physically. Typically, network design includes the following: • • • • • Logical map of the network to be designed Cabling structure Quantity, type and location of network devices (router, switches, servers) IP addressing structure Network security architecture and overall network security processes 3|Page Main Building I recommend LAN network should be deployed in the main building based on the scenario, suppose high speed, high bandwidth connectivity. Local area network – LAN • • • • • • • • LAN is a network within a geographical location. Usually within a room/building Will be owned by the same organization Typically, wired LANs run at speeds of 100Mbps to 1Gbps, have low delay, and make very few errors. LANs can be wired or wireless (IEEE 802.11) Initially was a broadcast system IEEE 802.3 popularly called Ethernet is the most popular LAN technology It is also possible to divide one large physical LAN into multiple smaller logical LANs or VLANs 4|Page Repeaters/Hubs A repeater receives a digital signal and re-amplifies or regenerates that signal, and then forwards the digital signal out all active ports without looking at any data. An active HUB does the same thing. Any digital signal received from a segment on a HUB port is regenerated or re-amplified and transmitted out all ports on the HUB. This means all devices plugged into a hub are in same collision domain as well as in same broadcast domain. A hub is really a multiple-port repeater. HUBs, like repeaters, don’t actually examine any of the traffic as it enters and is then transmitted out to the other parts of the physical media. switches By default, switches break up collision domains but are one larger broadcast domain. Switches aren’t used to create internetworks; they’re employed to add functionality to an internetwork LAN. The main purpose of a switch is to make a LAN work better, to optimize its performance, providing more bandwidth for the LAN’s users. Switches forward frames from one port to another within the switched network. 5|Page With a layer 2 switch, an incoming frame from a particular station is switched to the appropriate output line to be delivered to the intended destination. At the same time, other unused lines can be used for switching other traffic. Just like Hub and Bridge, Switch is also used to connect the multiple devices together in a LAN segment. Basically, a Switch is the upgraded version of the Bridge. Besides providing all the functionalities of Bridge, it also offers several additional features. The biggest advantage of Switch is that, it makes switching decisions in hardware by using application specific integrated circuits (ASICs). Unlike the generic processors that we use in our PC, ASICs are the specialized processors built only to perform very few particular tasks. Usually, the ASICs in the Switches have single task and that is the switching the frames as fast as possible. An ASIC occupied switch performs this task blazingly fast. For example, an entry level Catalyst Switch 2960 can process 2.7 million frames per second. Types of Network Switches LAN Switch or Active Hub Also known as the local area network or Ethernet switch, this device is used to connect points on a company’s internal LAN. It blocks the overlap of data packets that run through a network by 6|Page allocating the bandwidth economically. When we say bandwidth, it refers to the amount of data that can be carried from one point to the other under a given period of time. With a LAN switch, it reduces the network traffic by delivering the data only to its intended recipient. The important bandwidth would first be delivered before the subsequent ones. Unmanaged Network Switches Mostly used in home networks and small companies or businesses, this device allows other devices on the network to connect with each other; it could be from one computer to the other, or a computer connected to a printing device. As what the name suggests, this type of device does not need to be watched constantly and it is the easiest and simplest installation, because of its small cable connections. Managed Switches Unlike the unmanaged network switch, this device is customizable; because of this feature, you can enhance the functionality of a certain network. This device has two types – Smart switches and Enterprise switches. Smart switches have limited features, but provide a web interface and accept configurations of basic settings. They are perfect for fast and constant LANs which support gigabit data transfer and allocations. Enterprise switches have a wide range of management features and the capability to fix, copy, and transform and display network configurations. They are usually found in large companies which contain large numbers of connections, nodes, switches, and ports. Having more features than the smart switches, Enterprise switches are usually more expensive. Layer-3 switches The function of a layer-3 switch (multilayer switch) combine L2 switch and some of a router feature. A L2 switch works with MAC addresses only, whereas a L3 switch understands IP address. L3 switches perform routing functions, it can do static routing and dynamic routing. That means, a L3 switch has both MAC address table and IP routing table. It can handle intra-VLAN communication and packets routing between different VLANs as well. L3 switch will consist of multiple broadcast domain. 7|Page Routers Routers are used to connect networks together and route packets of data from one network to another. Routers, by default, break up a broadcast domain. A router creates & maintains a table of the available routers and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through number of network points with routers before arriving at its destination. The router connects the different network segments. It switches the data packets between those networks which are either located in the different logical segments or built with the different network layer protocols. When a router receives a data packet on any of its interface, it checks the destination address of that packet and based on that destination address, it forwards that data packet from the interface which is connected with the destination address. To forward a data packet to its destination, router keeps the records of connected networks. These records are maintained in a database table known as the routing table. Routing table can be built statically or dynamically. Basically routers are used: • • • To connect different network segments. To connect different network protocols such as IP and IPX. To connect several smaller networks into a large network (known as the Internetwork) 8|Page • • • • • To break a large network into smaller networks (Known as the Subnets. Usually created to improve the performance or manageability.) To connect two different media types such as UTP and Fiber optical. To connect two different network architectures such as Token Ring and Ethernet. To connect LAN network with Telco company’ office (Known as the DTE device). To access DSL services (known as the DSL Router). Core Routers vs. Edge Routers A core router is a wired or wireless router that distributes Internet data packets within a network, but does not distribute data packets between multiple networks. In contrast, an edge router is a wired or wireless router that distributes Internet data packets between one or more networks, but does not distribute data packets within a network. Virtual Router Unlike a physical wired or wireless router, a virtual router is an abstract, intangible object that acts as a default router for computers sharing a network. The router functions using the Virtual Router Redundancy Protocol (VRRP), which becomes active when a primary, physical router fails or otherwise becomes disabled 9|Page b) What type of network should be deployed in the SUB-A Building and what equipment should be installed (describe your answer)? A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). The difference between a LAN and WAN is that the wide-area network spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs) and are often connected through public networks. By Vangie Beal Nodes on a LAN Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending email or engaging in chat sessions. LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line; but the distances are limited and there is also a limit on the number of computers that can be attached to a single LAN. Recommended Reading: Webopedia's Network Topology Study Guide. • • • Types of Local-Area Networks (LANs) There are many different types of LANs, with Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers. The following characteristics differentiate one LAN from another: Topology: The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line. Protocols: The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture. Media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves. 10 | P a g e ADSL router Asymmetric digital subscriber line (ADSL) is a type of DSL broadband communications technology used for connecting to the Internet. ADSL allows more data to be sent over existing copper telephone lines (POTS), when compared to traditional modem lines. A special filter, called a microfilter, is installed on a subscriber's telephone line to allow both ADSL and regular voice (telephone) services to be used at the same time. ADSL requires a special ADSL modem and subscribers must be in close geographical locations to the provider's central office to receive ADSL service. Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate).( By Vangie Beal) L2 switch A layer 2 switch is a type of network switch or device that works on the data link layer (OSI Layer 2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. It uses hardware based switching techniques to connect and transmit data in a local area network (LAN). Routers Routers are used to connect networks together and route packets of data from one network to another. Routers, by default, break up a broadcast domain. A router creates & maintains a table of the available routers and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through number of network points with routers before arriving at its destination. 11 | P a g e c)What type of network should be deployed in the SUB-B and what equipment should be installed (describe your answer)?? Access point(wired/wireless) An access point is a device, such as a wireless router, that allows wireless devices to connect to a network. Most access points have built-in routers, while others must be connected to a router in order to provide network access. In either case, access points are typically hardwired to other devices, such as network switches or broadband modems. Access points can be found in many places, including houses, businesses, and public locations. In most houses, the access point is a wireless router, which is connected to a DSL or cable modem. However, some modems may include wireless capabilities, making the modem itself the access point. Large businesses often provide several access points, which allows employees to wirelessly connect to a central network from a wide range of locations. Public access points can be found in stores, coffee shops, restaurants, libraries, and other locations. Some cities provide public access points in the form of wireless transmitters that are connected to streetlights, signs, and other public objects. While access points typically provide wireless access to the Internet, some are intended only to provide access to a closed network. For example, a business may provide secure access points to its employees so they can wirelessly access files from a network server. Also, most access points provide Wi-Fi access, but it is possible for an access point to refer to a Bluetooth device or other type of wireless connection. However, the purpose of most access points is to provide Internet access to connected users. The term "access point" is often used synonymously with base station, though base stations are technically only Wi-Fi devices. It may also be abbreviated AP or WAP (for wireless access point). However, WAP is not as commonly used as AP since WAP is the standard acronym for Wireless Access Protocol. Switch Layer 2 switching (or Data Link layer switching) is the process of using devices’ MAC addresses on a LAN to segment a network. Switches and bridges are used for Layer 2 switching. They break up one large collision domain into multiple smaller ones. In a typical LAN, all hosts are connected to one central device. In the past, the device was usually a hub. But hubs had many disadvantages, such as not being aware of traffic that passes through them, creating one large collision domain, etc. To overcome some of the problems with hubs, the bridges were created. They were better than hubs because they created multiple collision domains, but they had limited number of ports. Finally, switches were created and are still widely used today. Switches have more ports than bridges, can inspect incoming traffic and make forwarding decisions accordingly. Each port on a switch is a separate collision domain. 12 | P a g e Firewall A firewall is a type of cybersecurity tool that is used to filter traffic on a network. Firewalls can be used to separate network nodes from external traffic sources, internal traffic sources, or even specific applications. Firewalls can be software, hardware, or cloud-based, with each type of firewall having its own unique pros and cons. The primary goal of a firewall is to block malicious traffic requests and data packets while allowing legitimate traffic through. Firewall types can be divided into several different categories based on their general structure and method of operation. Here are eight types of firewall: • • • • • • • • Packet-filtering firewalls Circuit-level gateways Stateful inspection firewalls Application-level gateways (a.k.a. proxy firewalls) Next-gen firewalls Software firewalls Hardware firewalls Cloud firewalls 13 | P a g e d) What type of network connections should be used to link the buildings together and where and how should the College’s Internet connection be made? As per the given situation, fiber association is the ideal and viable answer for interconnect fundamental structure and SUB-A structure when separations surpass 100m, which is the time when Ethernet cabling starts to endure debasement. Running fiber cabling gives a far more prominent separation ability. Where there is underground ducting running between the structures, rather than 'pulling' links through, arrange architects will introduce the fiber utilizing their 'link blowing' or ' link streaming' machines. If no such ducting exists, at that point overhead cabling should be considered. Main Building to SUB-B Building A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the internet. Site-to-site VPN extends the company's network, making computer resources from one location available to employees at other locations. An example of a company that needs a site-to-site VPN is a growing corporation with dozens of branch offices around the world. There are two types of site-to-site VPNs: • Intranet-based — If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN. • Extranet-based — When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those 14 | P a g e companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets. Even though the purpose of a site-to-site VPN is different from that of a remote-access VPN, it could use some of the same software and equipment. Ideally, though, a site-to-site VPN should eliminate the need for each computer to run VPN client software as if it were on a remote-access VPN. Dedicated VPN client equipment, described later in this article, can accomplish this goal in a site-to-site VPN. Now that you know the two types of VPNs, let's look at how your data is kept secure as it travels across a VPN. Internet connectivity Will associate web passage to head office firewall by means of Site-to – website VPN Tunnel and control traffic from firewall and Router. Main Building to SUB-A here are many complex fiber optic data transmission systems being employed as per the application requirement. The easiest way to understand a fiber optic link system is by discussing simple point to point fiber optic links. A P2P or point to point fiber optic data link consists of an optical transmitter to transmit the data, optical fiber as the medium, and an optical receiver. There will be splicing points in between the fiber optic link system, there will be fiber optic connectors at transmitter and receiver points. A full duplex fiber optic link is the commonly employed fiber optic application. Such fiber optic links consist of two simple P2P fiber optic links. Duplex fiber optic links transmit in opposite directions between the input and output equipments. Duplex fiber optic links can be configured 15 | P a g e using a single fiber. In such cases, fiber optic splitters are used at each end to couple the transmitted optical signal onto the fiber and receive the optical signal to the detector. Split down to single units, all fiber optic link systems are a sets of P2P fiber optic links. Different fiber optic link system topologies come from the different ways that P2P fiber optic links can be connected between equipments. Note that the word fiber optic topology refers to the configuration of various equipments and the fiber optic components interconnecting them. Equipments used in a fiber optic link system may be computers, workstations, consoles and such related equipments. P2P or Point to point fiber optic links are connected to produce different type of fiber optic link systems. Some of the fiber optic link systems produced with point to point link includes linear bus, ring topology, star topology and tree topology. Thus we can see that Point to point fiber optic links are the basic building units of all fiber optic systems. A fiber-optic cable, also known as an optical-fiber cable, is an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed. Different types of cable[1] are used for different applications, for example, long distance telecommunication, or providing a high-speed data connection between different parts of a building. Internet connectivity Will interface web door to head office firewall by means of Point to Point Fiber Optic underground conduit Cable Tunnel and control web traffic from firewall and switch. 16 | P a g e Part 2 1. An analysis of the network design models and how they contribute to the design of a scalable and reliable network. Totally suitable versatile and dependable system configuration is significant for entrepreneurs. A little system is regularly more helpless to infections and spyware than bigger systems, because of programming vulnerabilities. Modern programming worked to deal with these dangers is similarly as significant as having top notch steering frameworks and equipment. Realizing how to structure a PC arrange isn't in every case simple. Everything from the situation of the switch in a sign chain to the quantity of PCs in the system will influence the progression of data inside an association. • • • • • • • • • Setting up a system for the workplace requires the accompanying: A secure Internet association from the Internet Service Provider (ISP) A switch with a fast Internet association A modem Firewall capacities One or more switches (enables PCs to connection to each other over an inward system) Phone line/link/fiber optic connecting (wired or remote) Ethernet center points Management and security programming For little systems, the essential rationale pursues that the ISP sends data to the modem, which associates with the switch, which at that point interfaces the private company work areas and workstations either wired or remotely. Select a suitable topology to configure nodes together: • BUS Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology. 17 | P a g e • RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device. • STAR Topology In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. 18 | P a g e • MESH Topology It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices. • TREE Topology It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three levels to the hierarchy. 19 | P a g e • HYBRID Topology It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology (ring topology and star topology). 20 | P a g e Choose a network design type which is suitable to organizations behavior 1. Personal Area Network (PAN) The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device. 2. Local Area Network (LAN) We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs. Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN) Functioning like a LAN, WLANs make use of wireless network technology, such as WiFi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network. 4. Campus Area Network (CAN) Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources. 5. Metropolitan Area Network (MAN) These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.). 21 | P a g e 6. Wide Area Network (WAN) Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart. The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public. 7. Storage-Area Network (SAN) As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs. 8. System-Area Network (also known as SAN) This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-toprocessor applications. The computers connected on a SAN operate as a single system at very high speeds. 9. Passive Optical Local Area Network (POLAN) As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices. 10. Enterprise Private Network (EPN) These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources. 22 | P a g e 11. Virtual Private Network (VPN) By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely. The recurrence of Wi-Fi associations in business settings has been on the ascent. Emergency clinics, grounds, corporate workplaces, and even retail outlets depend on PC systems administration to give helpful data to their representatives and clients consistently. According to this announcement, Wi-Fi association is significant for Telco and Networking Solutions. Hierarchical Network Design This topic discusses the three functional layers of the hierarchical network model: the access, distribution, and core layers. Network Hierarchy Early networks were deployed in a flat topology as shown Flat Switched Network Hubs and switches were added as more devices needed to be connected. A flat network design provided little opportunity to control broadcasts or to filter undesirable traffic. As more devices and applications were added to a flat network, response times degraded, making the network unusable. A better network design approach was needed. For this reason, organizations now use a hierarchical network design as shown 23 | P a g e Hierarchical Network A hierarchical network design involves dividing the network into discrete layers. Each layer, or tier, in the hierarchy provides specific functions that define its role within the overall network. This helps the network designer and architect to optimize and select the right network hardware, software, and features to perform specific roles for that network layer. Hierarchical models apply to both LAN and WAN design. The benefit of dividing a flat network into smaller, more manageable blocks is that local traffic remains local. Only traffic that is destined for other networks is moved to a higher layer. For example, in the flat network has now been divided into three separate broadcast domains. A typical enterprise hierarchical LAN campus network design includes the following three layers: • • • Access layer: Provides workgroup/user access to the network Distribution layer: Provides policy-based connectivity and controls the boundary between the access and core layers Core layer: Provides fast transport between distribution switches within the enterprise campus Another sample three-layer hierarchical network design is displayed. Notice that each building is using the same hierarchical network model that includes the access, distribution, and core layers. 24 | P a g e Multi Building Enterprise Network Design NOTE There are no absolute rules for the way a campus network is physically built. While it is true that many campus networks are constructed using three physical tiers of switches, this is not a strict requirement. In a smaller campus, the network might have two tiers of switches in which the core and distribution elements are combined in one physical switch. This is referred to as a collapsed core design. 25 | P a g e 2. A detailed explanation of Local Area Network redundancy concepts, network features, such as bandwidth and load and their related issues. The explanations should contain the possible solutions provided at Layer 2 and 3 of the OSI Model. Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant paths. The network can then continue to operate when a single link or port has failed. Redundant links can also share the traffic load and increase capacity. Multiple paths need to be managed so that Layer 2 loops are not created. The best paths are chosen, and an alternate path is immediately available should a primary path fail. The Spanning Tree Protocols are used to manage Layer 2 redundancy. Redundant devices, such as multilayer switches or routers, provide the capability for a client to use an alternate default gateway should the primary default gateway fail. A client can now have multiple paths to more than one possible default gateway. First Hop Redundancy Protocols are used to manage how a client is assigned a default gateway, and to be able to use an alternate default gateway should the primary default gateway fail. (cisco) What does Network Redundancy mean? Network redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover. Network redundancy is primarily implemented in enterprise network infrastructure to provide a redundant source of network communications. It serves as a backup mechanism for quickly swapping network operations onto redundant infrastructure in the event of unplanned network outages. Typically, network redundancy is achieved through the addition of alternate network paths, which are implemented through redundant standby routers and switches. When the primary path is unavailable, the alternate path can be instantly deployed to ensure minimal downtime and continuity of network services. https://www.techopedia.com/definition/29305/network-redundancy LAN redundancy concepts Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links to provide fault tolerance if an active link fails. 26 | P a g e As the name suggests, STP creates a spanning tree within a network of connected layer2 bridges, and disables those links that are not part of the spanning tree, leaving a single active path between any two network nodes. STP is based on an algorithm that was invented by Radia Perlman while she was working for Digital Equipment Corporation. In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to do this. RSTP was designed to be backwardscompatible with standard STP. STP was originally standardized as IEEE 802.1D but the functionality of spanning tree (802.1D), rapid spanning tree (802.1w), and multiple spanning tree (802.1s) has since been incorporated into IEEE 802.1Q-2014. Purpose of Spanning Tree STP provides the mechanism to have redundant links at Layer 2 while avoiding the potential for loops and MAC address database instability. 27 | P a g e List of Spanning Tree Protocols Several varieties of spanning tree protocols have emerged since the original IEEE 802.1D. The varieties of spanning tree protocols include • • • • • • STP: This is the original IEEE 802.1D version (802.1D-1998 and earlier) that provides a loop-free topology in a network with redundant links. Common Spanning Tree (CST) assumes one spanning tree instance for the entire bridged network, regardless of the number of VLANs. PVST+: This is a Cisco enhancement of STP that provides a separate 802.1D spanning tree instance for each VLAN configured in the network. The separate instance supports PortFast, UplinkFast, BackboneFast, BPDU guard, BPDU filter, root guard, and loop guard. 802.1D-2004: This is an updated version of the STP standard, incorporating IEEE 802.1w. Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w: This is an evolution of STP that provides faster convergence than STP. Rapid PVST+: This is a Cisco enhancement of RSTP that uses PVST+. Rapid PVST+ provides a separate instance of 802.1w per VLAN. The separate instance supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard. Multiple Spanning Tree Protocol (MSTP): This is an IEEE standard inspired by the earlier Cisco proprietary Multiple Instance STP (MISTP) implementation. MSTP maps multiple VLANs into the same spanning tree instance. The Cisco implementation of MSTP is MST, which provides up to 16 instances of RSTP and combines many VLANs with the same physical and logical topology into a common RSTP instance. Each instance supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard. Redundancy at OSI Layers 1 and 2 Redundancy at OSI Layers 1 and 2. The three-tier hierarchical network design that uses core, distribution, and access layers with redundancy attempts to eliminate a single point of failure on the network. Multiple cabled paths between switches provide physical redundancy in a switched network. This improves the reliability and availability of the network. Having alternate physical paths for data to traverse the network makes it possible for users to access network resources, despite path disruption. The following steps explain how redundancy works in the topology shown. 1. PC1 is communicating with PC4 over a redundant network topology. 2. When the network link between S1 and S2 is disrupted, the path between PC1 and PC4 is automatically adjusted to compensate for the disruption. 3. When the network connection between S1 and S2 is restored, the path is then readjusted to route traffic directly from S2 to S1 to get to PC4. 28 | P a g e For many organizations, the availability of the network is essential to supporting business needs; therefore, the network infrastructure design is a critical business element. Path redundancy is a solution for providing the necessary availability of multiple network services by eliminating the possibility of a single point of failure. Redundancy is an important part of hierarchical design for preventing disruption of network services to users. Redundant networks require adding physical paths, but logical redundancy must also be part of the design. However, redundant paths in a switched Ethernet network can cause both physical and logical Layer 2 loops. Logical Layer 2 loops can occur because of the natural operation of switches, specifically, the learning and forwarding process. When multiple paths exist between two devices on a network, and there is no spanning tree implementation on the switches, a Layer 2 loop occurs. A Layer 2 loop can result in three primary issues: MAC database instability: Instability in the content of the MAC address table results from copies of the same frame being received on different ports of the switch. Data forwarding can be impaired when the switch consumes the resources that are coping with instability in the MAC address table. Broadcast storms: Without some loop-avoidance process, each switch can flood broadcasts endlessly. This situation is commonly called a broadcast storm. Multiple frame transmission: Multiple copies of unicast frames can be delivered to destination stations. Many protocols expect to receive only a single copy of each transmission. Multiple copies of the same frame can cause unrecoverable errors. 29 | P a g e Issues with Layer 1 Redundancy: MAC Database Instability Ethernet frames do not have a time to live (TTL) attribute, like IP packets. As a result, if there is no mechanism enabled to block continued propagation of these frames on a switched network, they continue to propagate between switches endlessly, or until a link is disrupted and breaks the loop. This continued propagation between switches can result in MAC database instability. This can occur because of broadcast frames forwarding. Broadcast frames are forwarded out all switch ports, except the original ingress port. This ensures that all devices in a broadcast domain are able to receive the frame. If there is more than one path for the frame to be forwarded out, an endless loop can result. When a loop occurs, it is possible for the MAC address table on a switch to constantly change with the updates from the broadcast frames, resulting in MAC database instability. The following steps demonstrate the MAC database instability issue. shows a snapshot during Step 4. 1. PC1 sends out a broadcast frame to S2. S2 receives the broadcast frame on F0/11. When S2 receives the broadcast frame, it updates its MAC address table to record that PC1 is available on port F0/11. 2. Because it is a broadcast frame, S2 forwards the frame out all ports, including Trunk1 and Trunk2. When the broadcast frame arrives at S3 and S1, they update their MAC address tables to indicate that PC1 is available out port F0/1 on S1 and out port F0/2 on S3. 3. Because it is a broadcast frame, S3 and S1 forward the frame out all ports, except the ingress port. S3 sends the broadcast frame from PC1 to S1. S1 sends the broadcast frame from PC1 to S3. Each switch updates its MAC address table with the incorrect port for PC1. 4. Each switch again forwards the broadcast frame out all of its ports, except the ingress port, resulting in both switches forwarding the frame to S2. 30 | P a g e 5. When S2 receives the broadcast frames from S3 and S1, the MAC address table is updated again, this time with the last entry received from the other two switches. This process repeats repeatedly until the loop is broken by physically disconnecting the connections causing the loop or powering down one of the switches in the loop. This creates a high CPU load on all switches caught in the loop. Because the same frames are constantly being forwarded back and forth between all switches in the loop, the CPU of the switch must process a lot of data. This slows down performance on the switch when legitimate traffic arrives. A host caught in a network loop is not accessible to other hosts on the network. Additionally, because of the constant changes in the MAC address table, the switch does not know out of which port to forward unicast frames. In the previous example, the switches will have the incorrect ports listed for PC1. Any unicast frame destined for PC1 loops around the network, just as the broadcast frames do. More and more frames looping around the network eventually create a broadcast storm. Issues with Layer 1 Redundancy: Broadcast Storms A broadcast storm occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed. Consequently, no bandwidth is available for legitimate traffic and the network becomes unavailable for data communication. This is an effective denial of service. A broadcast storm is inevitable on a looped network. As more devices send broadcasts over the network, more traffic is caught within the loop, consuming resources. This eventually creates a broadcast storm that causes the network to fail. There are other consequences of broadcast storms. Because broadcast traffic is forwarded out every port on a switch, all connected devices have to process all broadcast traffic that is being flooded endlessly around the looped network. This can cause the end device to malfunction because of the high processing requirements for sustaining such a high traffic load on the NIC. The following steps demonstrate the broadcast storm issue. the result during Step 6. 1. PC1 sends a broadcast frame out onto the looped network. 2. The broadcast frame loops between all the interconnected switches on the network. 3. PC4 also sends a broadcast frame out on to the looped network. 4. The PC4 broadcast frame also gets caught in the loop between all the interconnected switches, just like the PC1 broadcast frame. 5. As more devices send broadcasts over the network, more traffic is caught within the loop, consuming resources. This eventually creates a broadcast storm that causes the network to fail. 31 | P a g e 6. When the network is fully saturated with broadcast traffic that is looping between the switches, new traffic is discarded by the switch because it is unable to process it. In Figure 2-3, S2 is now discarding additional frames. Because devices connected to a network are regularly sending out broadcast frames, such as ARP requests, a broadcast storm can develop in seconds. As a result, when a loop is created, the switched network is quickly brought down. Issues with Layer 1 Redundancy: Duplicate Unicast Frames Broadcast frames are not the only type of frames that are affected by loops. Unicast frames sent onto a looped network can result in duplicate frames arriving at the destination device. The following steps demonstrate the duplicate unicast frames issue. a snapshot during Step 5 and Step 6. 1. PC1 sends a unicast frame destined for PC4. 2. S2 does not have an entry for PC4 in its MAC table, so it floods the unicast frame out all switch ports in an attempt to find PC4. 3. The frame arrives at switches S1 and S3. 4. S1 does have a MAC address entry for PC4, so it forwards the frame out to PC4. 5. S3 also has an entry in its MAC address table for PC4, so it forwards the unicast frame out Trunk3 to S1. 6. S1 receives the duplicate frame and forwards the frame out to PC4. 7. PC4 has now received the same frame twice. 32 | P a g e RSTP The 802.1D Spanning Tree Protocol (STP) standard was designed at a time when the recovery of connectivity after an outage within a minute or so was considered adequate performance. With the advent of Layer 3 switching in LAN environments, bridging now competes with routed solutions where protocols, such as Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP), are able to provide an alternate path in less time. Cisco enhanced the original 802.1D specification with features such as Uplink Fast, Backbone Fast, and Port Fast to speed up the convergence time of a bridged network. The drawback is that these mechanisms are proprietary and need additional configuration. Rapid Spanning Tree Protocol (RSTP; IEEE 802.1w) can be seen as an evolution of the 802.1D standard more than a revolution. The 802.1D terminology remains primarily the same. Most parameters have been left unchanged so users familiar with 802.1D can rapidly configure the new protocol comfortably. In most cases, RSTP performs better than proprietary extensions of Cisco without any additional configuration. 802.1w can also revert back to 802.1D in order to interoperate with legacy bridges on a per-port basis. This drops the benefits it introduces. The new edition of the 802.1D standard, IEEE 802.1D-2004, incorporates IEEE 802.1t-2001 and IEEE 802.1w standards. 33 | P a g e First Hop Redundancy Protocol (FHRP) IP routing redundancy is designed to allow for transparent fail-over at the first-hop IP router. Both HSRP and VRRP enable two or more devices to work together in a group, sharing a single IP address, the virtual IP address. The virtual IP address is configured in each end user's workstation as a default gateway address and is cached in the host's Address Resolution Protocol (ARP) cache. In an HSRP or VRRP group, one router is elected to handle all requests sent to the virtual IP address. With HSRP, this is the active router. An HSRP group has one active router, at least one standby router, and perhaps many listening routers. A VRRP group has one master router and one or more backup routers. MRP - Media Redundancy Protocol MRP is an open standard for Ring topologies in industrial networks enabling faster recovery times in switch loop scenarios (10ms or better) than spanning tree protocols. In a ring network each Ethernet switch is connected to two other switches forming a ring. The benefit is that each switch has a redundant connection (links) into the network and may also provide a more cost-effective cabling infrastructure than using an aggregation switch at a central location. For these reasons, ring topology networks are popular within industrial infrastructures. The disadvantage in forming a ring network using switches is that using this topology introduces a “switch loop” condition. The loop creates broadcast storms as broadcasts and multicasts are 34 | P a g e forwarded by switches out of every port. The switch or switches will repeatedly rebroadcast the broadcast messages, flooding the network. Since the Layer 2 header does not support a Time to Live (TTL) value, if a frame is sent into a looped topology, it can loop forever severely consuming all available bandwidth on the loop making the network unusable. One resolution to this problem is to simply break the loop somewhere in the ring. Spanning Tree protocols such as RSTP were developed to detect these switch loop conditions and then intelligently reconfigure the network to provide this break, eliminating the switch loop. Also, if anything happens in the network, a topology change notification is sent out to create a different safe path. Although effective enough for many networks, Spanning Tree protocols take a relatively long time for this re-convergence to complete. RSTP, as an example, can take a few seconds for the network to recover which is not good enough for mission critical industrial Ethernet applications. Specialized Ring protocols have been designed for mission critical industrial networks operating in a ring topology providing a recovery time of 10ms or better, significantly quicker than RSTP. Media Redundancy Protocol (MRP) is a common standards-based protocol (IEC 624392) which provides this capability. The way MRP works is that a “Ring Manager” switch will drop (block) all packet forwarding on one of its two designated ring ports (Fig 2), in effect “breaking” the switch loop. All the traffic from devices connected to all the switches in the loop will still have a path to each other, with redundant links, but without the harmful switch loop. 35 | P a g e The Ring Manager is in constant communication with its MRP peers. If one of the two links on any of the other ring nodes detects a failure, the client node will send a message to the Ring Manager which will then unblock its blocked port enabling communication again between all of the switches. Special poll packets which can traverse blocked ports, are sent around the ring and monitored by the Ring Manager. If the Ring Manager does not see its poll packets come back around the ring, it knows that one of the switch nodes, or even a switch/hub that does not support MRP, has failed. The Ring Manager will then unblock its port and resume the forwarding of packets on both of its ring ports. All devices on switches, except the failed node, will again have a path to each other. During these topology change events, the various switches on the ring will be informed to clear the MAC tables that they have built-up so they can re-learn the port to destination MAC addresses of the devices connected to the ring. Given the intelligence behind the protocol, it is strongly recommended that each switch node in the ring supports MRP. 36 | P a g e 3. Provide a detailed account of how redundancy protocols support scalable networks. What should be considered As a basis for functional and purposeful network, design is of paramount importance and directly contributes to the successful operation or failure of the network. For a well-designed network following criteria must be met: • • • Designing the network with resiliency in mind Using technology to identify and eliminate single points of failure Having processes in place to reduce the risk of human error In addition to these three basic criteria that must be considered when building an efficient network and which must complement each other, one needs to take into account elements that will ensure the successful implementation of the design. • • • • • • • Physical infrastructure Topological/protocol hierarchy Scaling and Redundancy Addressing aggregation (IGP and BGP) Policy implementation (core/edge) Management/maintenance/operations Cost There are different ways in which network can be designed. The network can be designed on the basis of three-layer hierarchical model or collapsed core model or any other model, which is now considered best practice. However, it should be remembered that no matter which model is used, one needs to take into account the specificities of the organization for which the network is designed for. DESIGN In the case of Small and Medium Enterprise networks one can choose a collapsed core design, slightly altered using stackable switches instead of two separate core switches. In this case, stackable switches can provide maximum redundancy in the network. In the case of smaller networks generally it is not justified to use the full three-layer hierarchical model with the access, distribution and core layers. The reasons for this are the additional costs for the distribution layer equipment that generally is not required, additional network complexity, higher maintenance costs and so on. Since there are no distribution layers there is fewer points of potential failures in the network. Also, if the funds intended for the distribution layer are re-directed to other equipment, organization can get better and more reliable equipment which in turn contributes to the resilience of the network. 37 | P a g e In order to make core of the network redundant and fast, perhaps the best solution is the use of stackable switches which has the benefit of eliminating STP protocol. If stackable switches are used as L3 devices FHRP can also be eliminated with maintaining adequate level of reliability. Although it is possible and even simpler and cheaper to use L3 stackable switches as routers this is not a good solution. The reason is that besides routing the traffic one need to have various security elements implemented in the network, such as filtering traffic based on UDP / TCP ports or applications, anti-virus protection and so on. For the purposes of security, one should certainly use Firewalls, and today more and more so-called Next-Generation Firewalls. In this case it would be better to use two firewalls and configure them to work together using one of the FHRP protocol or if the budget permits configure them to work in HA (High Availability) mode, and thus ensure minimal downtime in the event of failure of one of the firewalls or links to the Internet. Ultimately the topology for this network will resemble a star topology, but without the single points of failure in the core network. Also, to keep the benefit of collapsed core design every VLAN should be restricted to one access layer switch stack. For VLAN communication all the VLANs can be terminated at the core stack but this can be complex because routing has to be used for communication with the rest of the network and the Internet. Another simpler solution is to terminate all the VLANs at the firewall and have all the benefits of traffic filtering to have more secure network. If firewalls are used in HA mode than it is even simpler and more reliable solution, but as it is mentioned before it is more expensive because this kind of feature is generally licensed or comes with higher models of firewalls. TECHNOLOGIES USED FOR REDUNDANCY Technologies that can be used to provide redundancy in the network are different and depending on the combination of these technologies’ different convergence times after a failure of a link or device will be achieved. When choosing the technology, one needs to be careful, because after implementation, it can be very difficult and dangerous for the company’s business to make changes in the production network. Redundancy in the network can be implemented using a combination of the four technologies that will be briefly described below in this document. These are STP (Spanning Tree Protocol), Link Aggregation, FHRP (First Hop Redundancy Protocols) and switch stacking. STP Today it is pointless to talk about the original IEEE 802.1D STP version or CST (Common Spanning Tree) when talking about network redundancy. The reason is very slow convergence after failure of a link that takes 30-50 seconds, depending on the size of network and it can even cause problems in the convergence. In the case of smaller networks CST would also do its part, but it would be quite inefficient. For larger networks with more complex patterns of network traffic and applications sensitive to disruption of communication CST should be avoided. In addition to the slow convergence problem is also the fact that the CST does not recognize 38 | P a g e VLANs, in fact CST treat the entire network as one VLAN and thus a large number of links in the network is blocked which is certainly not something one would want in a network. The problem of slow convergence can be solved by implementing the IEEE’s RSTP (Rapid STP), but less than optimal forwarding of traffic remains as RSTP still builds one STP tree for the entire network. A better version of STP is Cisco PVST + (Per VLAN Spanning Tree Plus), which has the same slow convergence time as STP, but enables better use of links in the network. This is because of the ability to share traffic according to VLANs by making a link that is blocked for one VLAN, to be in forwarding state for another VLAN. This is also useful in the event of link failure, because in this case negative impact on the network is much smaller than in the case when STP is used. Since the convergence is per VLAN link failure affects only VLANs whose forwarding link has failed. In addition, one can configure protection against network attacks using STP BPDU Filter, Root Guard, BPDU guard, loop guard functionality as well as port fast option allowing us to have stable STP topology, which is essential for a functional network. These mechanisms are beyond the scope of this paper but should be considered when implementing PVST+. The problem that can occur is when there is many VLANs configured on a switch. In this situation switch CPU could be overloaded which can cause other problems in the network even inability to converge. If the goal is to have short convergence times, and at the same time have more STP instances Cisco’s PVRST + (Per VLAN Rapid Spanning Tree Plus) can be used which is sort of a combination of IEEEs RSTP and Cisco’s PVST + protocol. PVRST + allows us to have a short convergence and the possibility of an independent convergence of the network for each VLAN, which allows us more flexibility. With all the additional functionality that are listed under PVST + this would be a good choice for a stable STP topology. The problem that can occur is also linked to the number of instances of STP. Because PVRST + supports a separate instance of STP for each VLAN, and also has shorter convergence time, the CPU is significantly burdened, and switch can be easily led to overloading. Recommendations for implementation of PVRST + is never to configure more VLANs than required in a network, otherwise it could lead to 100% CPU load and ultimately bring down the network. However, if one want redundancy based on STP and one have lot of VLANs (hundreds), the solution is the use of IEEEs MST protocol (Multiple Spanning Tree) that allows single instance of spanning tree protocol for a group of VLANs which ultimately results in fewer instances of spanning tree protocol in a network and still have the ability to use all links. Though it may seem that STP is something that should be used in a network, sometimes it is not the case. STP should not be excluded completely, but redundancy in a network should not be based on STP. Depending on the complexity of the network STP can be a valid solution, but for example, in data center networks STP should not be used at all. Some of the reasons are inefficient use of links and slow convergence for such environments with very complex topologies that are 39 | P a g e difficult to troubleshoot. STP could be used as failback mechanism in the event of a loop, but everything should be done in order to prevent the occurrence of loops. Also one should implement redundancy in the network using other mechanisms like switch stacking and link aggregation. LINK AGGREGATION Large amounts of traffic that is circulating through the network is not uncommon even in smaller networks, and one way to increase throughput of the network is to use link aggregation. Although it seems that the main benefit of link aggregation is higher bandwidth, the primary thing that is accomplished is in fact link redundancy between switches in a network. Link aggregation can also be used for computers or servers (NIC teaming), which certainly adds to the total resilience of the network. There are different ways of performing link aggregation, some of which are standard, such as LACP (Link Aggregation Control Protocol), and some are owned by a variety of manufacturers such as Cisco, Juniper, Avaya, Huawei etc. No matter which protocol is used, one needs to know the capabilities of the solution and whether aggregated links will be able to take the burden of network traffic in the event of failure of critical elements such as links or devices. If aggregated link has insufficient bandwidth with respect to the traffic it does not fulfill the purpose for which it was designed, because in case of failure of the main link the impact will be similar to a situation where there is no link redundancy. This effect is amplified if there is no QoS (Quality of Service) mechanisms in the network which means no prioritization of traffic, which is especially problematic for real-time applications and essential communications. GATEWAY REDUNDANCY The gateway is one of the most important elements of any network and therefore it is necessary to ensure maximum availability of such devices. A way in which availability of the Gateway is ensured is to make it redundant, which means that there are at least two devices which simultaneously perform the function of the gateway in a network. Protocols that can be used for this purpose are HSRP (Host Standby Router Protocol) from Cisco and VRRP (Virtual Router redundancy protocol) which is standard and is supported by other manufacturers of networking equipment. With these protocols one can configure at least two devices to work as a single gateway, without the need to change anything on the user computers. The idea is that all computers, according to their VLAN, are configured with the same IP address for gateway. This IP address is configured on two or more routers at the edge of the network and these routers are responsible for forwarding traffic coming to that IP address. At any time, one of the routers is primary gateway, responsible for forwarding traffic, and the other serves as a backup. If a router that is the primary gateway fails, the role of the primary gateway is assumed by another router that is configured to be his backup. 40 | P a g e These protocols do not protect only against failures of the entire device, but they can be configured to track certain links or availability of services so that in case of their unavailability backup device can take the role of the primary gateway and communication can continue. Potential problem with these two protocols is that basically only one device is active at a given time, and the other serves as a backup. Of course, a manual traffic load balance can be configured so that one router is the primary gateway for one part of VLANs, and the other router is the primary gateway for another part of VLANs, which is like manual load balancing in case of STP protocol. But if the goal is to have real load balancing there is another protocol called GLBP (Gateway Load balancing Protocol) which can solve this problem. GLBP is cisco proprietary protocol which allows us to simultaneously use all the routers that act as gateway so that the traffic between them is load balanced. This is especially useful solution in large networks that have multiple exits to the Internet. Otherwise, in most cases it is enough to use HSRP or VRRP. STACKABLE AND MODULAR DEVICES Using stackable switches is a very interesting and viable option in achieving redundant network, even though equipment that supports this type of features can be significantly more expensive than conventional switches. Stacking is the idea that two or more devices can be configured to operate as a single device by connecting backplanes of these devices using special stack cables or in some cases, using fiber optic connections. The advantage of using fiber optic connection is that stacking can be achieved between devices over distances of many kilometers, for example fiber ring around the city which is composed of stackable devices all working as one. In addition to stacking devices for the purpose of network redundancy it is possible to stack their power supply, which further increases network resilience. In networks that are not large and can implement collapsed core network design it can be a very profitable long-term investment which has the advantage of eliminating STP which is relatively slow and can cause problems for network convergence after a failure. Networks using stacking technology combined with link aggregation can achieve more stable and predictable failover in case of failure of any device or any link. Moreover, these networks are easy to expand and maintain and offer greater performance. Although in certain specific situations stack could ultimately cause some negative effects, mainly it is very flexible, resilient, easy to deploy and scalable solution, especially for a relatively small network. For stacking devices, technologies that are used are mainly owned by individual vendors, such as Stack Wise and VSS (Virtual Switching System) from Cisco or IRF (Intelligent Resilient Framework) from HP, which makes sense because these technologies are optimized for specific operating system and hardware which ensures maximum stability and reliability as well as performance. Ultimately when selecting stackable solution, devices price will be the key factor because requirements for performance in smaller networks are generally met using equipment of any manufacturer. An alternative to using stackable devices is the use of modular devices. 41 | P a g e Part 3 1. Design and implement a network prototype using a network simulator (or lab devices), which incorporates redundancy at Layer 2 and 3 and link aggregation features with the following requirements: 2. Include at least three Layer 2 switches. 3. Provide redundant link between all the switches. 4. Use Rapid PVST+ (Per-VLAN Spanning Tree) as spanning tree protocol. 5. Use link aggregation in the main active link. 42 | P a g e 43 | P a g e PVST+ and Rapid PVST+ PVST+ (Per VLAN Spanning Tree Plus) PVST+ (Per VLAN Spanning Tree Plus) is a Cisco proprietary STP version. It is also the default STP version for Cisco devices. It is the standard named 802.1d. In normal STP, CST (Common Spanning Tree), only one instance can be used for the whoÅŸe network. There are no specific instances per VLAN. PVST+ (Per VLAN Spanning Tree Plus) creates an instance for each VLAN and in each instance, a different STP process occurs, a different Root bridge is selected, different port roles are used etc. 44 | P a g e There are some advantages and disadvantages of PVST+ if we compare it with normal STP (CST). What are these advantages and disadvantages? Let’s check. For the network performance, PVST+ is a better selection than STP. Because, in PVST+, STP process is done for a small group of devices, for the devices in the same VLAN. Not for the whole devices in that network. The performance is better in PVST+ than normal STP (CST), but, here the CPU and memory usage are more. This is one of the disadvantages of PVST+. Beside, the convergence time is also higher than CST in PVST+. Another important advantage of PVST+ is providing a good load balancing. Rapid PVST+ (Rapid Per VLAN Spanning Tree Plus) Rapid PVST+ (Rapid Per VLAN Spanning Tree Plus) is also a Cisco proprietary STP version. Again, it has an instance for each VLAN and each VLAN has a separate STP process. 45 | P a g e It has a faster convergence advantage if we compare it with PVST+. Beside, PVST+ (Rapid Per VLAN Spanning Tree Plus) need more CPU and memory resources than PVST+. RPVST+ has four states. These states are also the states of MST (Multiple Spanning Tree) that we will discuss later. RPVST+ States are given below: â–ª â–ª â–ª â–ª Blocking Learning Forwarding Disabled 46 | P a g e Part 4 Task: 1.1 Discuss the Wide Area Networking (WAN) concerns and make recommendations to sustain network security, reliability and performance A WAN (wide area network) is a communications network that spans a large geographic area such as across cities, states, or countries. They can be private to connect parts of a business or they can be more public to connect smaller networks together.The easiest way to understand what a WAN is to think of the internet as a whole, which is the world's largest WAN. The internet is a WAN because, through the use of ISPs, it connects lots of smaller local area networks (LANs) or metro area networks (MANs).On a smaller scale, a business may have a WAN that's comprised of cloud services, its headquarters, and smaller branch offices. The WAN, in this case, would be used to connect all of those sections of the business together.No matter what the WAN joins together or how far apart the networks are, the end result is always intended to allow different smaller networks from different locations to communicate with one another. How WANs Are Connected Since WANs, by definition, cover a larger distance than LANs, it makes sense to connect the various parts of the WAN using a virtual private network (VPN). This provides protected communications between sites, which is necessary given that the data transfers are happening over the internet. Although VPNs provide reasonable levels of security for business uses, a public internet connection does not always provide the predictable levels of performance that a dedicated WAN link can. This is why fiber optic cables are sometimes used to facilitate communication between the WAN links. X.25, Frame Relay, and MPLS Since the 1970s, many WANs were built using a technology standard called X.25. These types of networks supported automated teller machines, credit card transaction systems, and some of the early online information services such as CompuServe. Older X.25 networks ran using 56 Kbps dial-up modem connections. Frame Relay technology was created to simplify X.25 protocols and provide a less expensive solution for wide area networks that needed to run at higher speeds. Frame Relay became a popular choice for telecommunications companies in the United States during the 1990s, particularly AT&T. 47 | P a g e Multiprotocol Label Switching (MPLS) was built to replace Frame Relay by improving protocol support for handling voice and video traffic in addition to normal data traffic. The Quality of Service (QoS) features of MPLS was key to its success. So-called "triple play" network services built on MPLS increased in popularity during the 2000s and eventually replaced Frame Relay. Leased Lines and Metro Ethernet Many businesses started using leased line WANs in the mid-1990s as the web and internet exploded in popularity. T1 and T3 lines are often used to support MPLS or internet VPN communications. Long-distance, point-to-point Ethernet links can also be used to build dedicated wide area networks. While much more expensive than internet VPNs or MPLS solutions, private Ethernet WANs offer very high performance, with links typically rated at 1 Gbps compared to the 45 Mbps of a traditional T1. If a WAN combines two or more connection types like if it uses MPLS circuits as well as T3 lines, it can be considered a hybrid WAN. These are useful if the organization wants to provide a cost-effective method to connect their branches together but also have a faster method of transferring important data if needed. Problems With Wide Area Networks WAN networks are much more expensive than home or corporate intranets. WANs that cross international and other territorial boundaries fall under different legal jurisdictions. Disputes can arise between governments over ownership rights and network usage restrictions. Global WANs require the use of undersea network cables to communicate across continents. Undersea cables are subject to sabotage and also unintentional breaks from ships and weather conditions. Compared to underground landlines, undersea cables tend to take much longer and cost much more to repair. Distinctive WAN innovations can be utilized to conquer arrange security and dependability gives that are depicted as pursues: MD5: It is a generally utilized cryptographic hash capacity and it gives some affirmation that a moved document and client can coordinate checksum of downloaded record with previously existing documents. Just as it additionally gives mistake registration usefulness and helps client to perceive a degenerate or deficient download almost certain when downloading huge 48 | P a g e document. In MD process input message is separated into pieces of 512-piece square and ordinarily it used to check the respectability of records. MD5 is generally used to store passwords. In advanced mark it is utilized for giving assurance consistency on exchange. The calculation filling in as depicts as pursues: The exchange procedure begins when sender makes input message (M) and registers it with message digests (sMD). On the opposite side recipient gets the message (M-esMD) and concentrates encoded message digest (esMD). Further recipient registers possess message digest (rMD) with got message (M).Message was not adjusted during the information transmission, when both message digests are equivalent. • • • • • Broadcast reduction system is a logical domain of computer network which is use in noise reduction. By using broadcast each node is connecting with each other at data linked layer. Filters are Analog circuits which perform signal processing functions and commonly it is used in removing unwanted frequency components from the signal. Different types of digital filters can use by organizations such as active, passive, high pass, linear and non-linear etc. Firewall is a network security system that is monitoring over incoming and outgoing messages. It is working as a software solution and as a hardware appliance. Firewall protects computer or network from unauthorized users by acting as a gate through which all data must pass. System performance can also affect by it because it verifies every packets and lot of time is taken in verification process. Access control lists can be used to assign permission to non-existent nodes and stores permission safely separately from the content in an appropriate manner. VPN tunnels allow remote clients to tunnel into our network that the underlying network does not support or provide directly. It enables one network to send its data via other network connections. It can be used to carry the packets that actually provide the service not normally provided by the network. Major drawbacks of tunnels are that they are not easily moved (Jason and Thomas, 2012). 49 | P a g e 1.2 Design the Wide Area Networking (WAN) infrastructure to meet given requirement As per the requirement we have organization CBS services (PVT)Ltd based in United Kingdom and there are users in the company. They will be using CBS services application which is hosted in data center located on London there are two branches in New York, USA and Colombo, Sri Lankan. All sites have connected each other. As per CBS service bandwidth is required 100 kbps per user. To fulfil this recruitment planning we need 5 Mbps link from two ISPs. We have procured below devices. Details are as follows • • • • Two Routers (each location) Two firewalls (each location Two 3560 core switches (each location) One 3750 switch (each location) We are using WAN routing protocol (Network Technology) EIGRP. Based on technology we have applied routing policy for the load balancing. Load balancing is required when there are two ISP link and we need utilize both. Load balancing is very good technology nowadays. Every organization is using the for-load sharing. We are using IPsec tunnel as security provide to make our data traffic secure and encrypted. MD5 and 3 des algorithm has been used for data encryption. 50 | P a g e 1.3 Critically evaluate the suitability of the Wide Area Networking (WAN) Components The principle segments for a WAN are Routers, switches and modems. These parts are depicted beneath in the equipment area. CPE In telecommunications, a customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ("demarc"). The demarc is a point established in a building or complex to separate customer equipment from the equipment located in either the distribution infrastructure or central office of the communications service provider. CPE generally refers to devices such as telephones, routers, network switches, residential gateways (RG), set-top boxes, fixed mobile convergence products, home networking adapters and Internet access gateways that enable consumers to access providers' communication services and distribute them in a residence or enterprise with a local area network (LAN). Routers A router is hardware device designed to receive, analyze and move incoming packets to another network. It may also be used to convert the packets to another network interface, drop them, and perform other actions relating to a network. CME routers A Cisco Unified CME system consists of a router that serves as a gateway and one or more VLANs that connect IP phones and phone devices to the router. ... Each phone can have multiple extensions associated with it and a single extension can be assigned to multiple phones. Switch A switch, in the context of networking is a high-speed device that receives incoming data packets and redirects them to their destination on a local area network (LAN). A LAN switch operates at the data link layer (Layer 2) or the network layer of the OSI Model and, as such it can support all types of packet protocols. Firewall 51 | P a g e A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic. Accept: allow the traffic Reject: block the traffic but reply with an “unreachable error” Drop: block the traffic with no reply A firewall establishes a barrier between secured internal networks and outside untrusted network, such as the Internet. IP telephony IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN). Using the Internet, calls travel as packets of data on shared lines, avoiding the tolls of the PSTN. The challenge in IP telephony is to deliver the voice, fax, or video packets in a dependable flow to the user. Much of IP telephony focuses on that challenge. Gateways In computer networking and telecommunications, a gateway is a component that is part of two networks, which use different protocols. The gateway will translate one protocol into the other. A router is a special case of a gateway. Gateways, also called protocol converters, can operate at any network layer. The activities of a gateway are more complex than that of the router or switch as it communicates using more than one protocol. 52 | P a g e 1.4 Build and configure the Wide Area Networking (WAN) (including services) to meet a given requirement 1.5 Implement network security on a the Wide Area Networking (WAN) IP Allocation 10.10.1.0 10.10.2.0 10.10.3.0 53 | P a g e Site Location London, United Kingdom New York, USA Colombo, Srilanka Subnet mask /24 /24 /24 Configuration IOS command Line Interface 54 | P a g e London, United Kingdom location configuration • Step by step process of implementation on WAN network Router-configuration Router-London>configure terminal Router- London (config)#interface se Router- London (config)#interface serial 0/0/0 Router- London (config)#IP address 10.10.1.2 255.255.255.0 Router- London (config)# no shut down • next we have configuration firewall port that direct connected to router Firewall configuration FW-London>configure terminal FW- London (config)#interface gig0/0 FW- London (config)#IP address 10.10.1.3 255.255.255.0 FW- London (config)# no shut down Ping IP address from firewall to router • C:\ >ping 10.10.1.2 Pinging 10.10.1.2 with 32 bytes of data: Reply from 10.10.1.2: bytes=32 time=1ms TTL=255 Reply from 10.10.1.2: bytes=32 time=1ms TTL=255 Reply from 10.10.1.2: bytes=32 time=1ms TTL=255 Reply from 10.99.1.2: bytes=32 time=1ms TTL=255 Ping statistics 10.99.1.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms • next we have configuration access switch port that direct connected to FW switch- London >configure terminal switch- London (config-if)# vlan 10 switch- London(config-if)# name server switch- London (config-if)# exitswitch-Dallas(config)#intraange fa0/10-22 switch- London (config-if)# switchport mode access switch- London (config-if)# switchport mode access vlan 55 | P a g e New York location configuration • Step by step process of implementation on WAN network Router configuration Router-New York>configure terminal Router-New York(config)#interface se Router-New York(config)#interface serial 0/0/1 Router-New York(config)#ip address 10.10.2.2 255.255.255.0 Router-New York(config)# no shut down next we have configuration firewall port that direct connected to router • Firewall configuration FW-New York>configure terminal FW-New York(config)#interface gig0/1 FW-New York(config)#ip address 10.10.2.3 255.255.255.0 FW-New York(config)# no shut down next we have configuration access switch port that direct connected to FW switch-New York>configure terminal switch-New York(config-if)# vlan 12 switch-New York(config-if)# name New Yorkserver switch-New York(config-if)# exit switch-New York(config)#intraange fa0/10-21 switch-New York(config-if)# switchport mode access switch -New York(config-if)# switchport mode access vlan 20 • After configuration of New York location we are able to ping London ip address from New York PC Ping ip address from firewall to router C:\ >ping 10.10.1.2 Pinging 10.10.1.2 with 32 bytes of data: Reply from 10.10.1.2: bytes=32 time=47ms TTL=255 Reply from 10.10.1.2: bytes=32 time=44ms TTL=255 Reply from 10.10.1.2: bytes=32 time=46ms TTL=255 Reply from 10.10.1.2: bytes=32 time=48ms TTL=255 Ping statistics 10.10.1.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 44ms, Maximum = 48ms, Average = 46ms 56 | P a g e Colombo location configuration • Step by step process of implementation on WAN network Router configuration Router-Colombo>configure terminal Router- Colombo (config)#interface se Router- Colombo (config)#interface serial 0/0/1 Router- Colombo (config)#ip address 10.10.3.2 255.255.255.0 Router- Colombo (config)# no shut down • next we have configuration firewall port that direct connected to router Firewall configuration FW- Colombo >configure terminal FW- Colombo (config)#interface gig0/1 FW- Colombo (config)#ip address 10.10.3.3 255.255.255.0 FW- Colombo (config)# no shut down next we have configuration access switch port that direct connected to FW switch- Colombo >configure terminal switch- Colombo (config-if)# vlan 12 switch- Colombo (config-if)# name Colombo server switch- Colombo (config-if)# exit switch- Colombo (config)#intraange fa0/10-21 switch- Colombo (config-if)# switchport mode access switch - Colombo (config-if)# switchport mode access vlan 20 • After configuration of Colombo location we are able to ping London and New York ip addressfrom Colombo PC Ping ip address from firewall to router C:\ >ping 10.10.1.2 Pinging 10.10.1.2 with 32 bytes of data: Reply from 10.10.1.2: bytes=32 time=47ms TTL=255 Reply from 10.10.1.2: bytes=32 time=44ms TTL=255 Reply from 10.10.1.2: bytes=32 time=46ms TTL=255 Reply from 10.10.1.2: bytes=32 time=48ms TTL=255 Ping statistics 10.10.1.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), 57 | P a g e Approximate round trip times in milli-seconds: Minimum = 44ms, Maximum = 48ms, Average = 46ms Ping ip address from firewall to router C:\ >ping 10.10.2.2 Pinging 10.10.2.2 with 32 bytes of data: Reply from 10.10.2.2: bytes=32 time=47ms TTL=255 Reply from 10.10.2.2: bytes=32 time=44ms TTL=255 Reply from 10.10.2.2: bytes=32 time=46ms TTL=255 Reply from 10.10.2.2: bytes=32 time=48ms TTL=255 Ping statistics 10.10.2.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 44ms, Maximum = 48ms, Average = 46ms 58 | P a g e 1.6 Monitor and troubleshoot a the Wide Area Networking We have taken one work area and introduced checking application (i.e. Eheath and MRTG for traffic observing). From Ehealth we get the data like CPU, RAM and basic logs of the gadgets. Furthermore, from MRTG we get data like connection usage and transmission capacity use. At whatever point client face any issue like inactivity and gradualness of the application we utilize this checking application to break down the issues. For the security, we have introduced syslog application which screen the Firewall traffic. On the off chance that any undesirable solicitation, Trojan and so forth hits on the Firewall, we get alert quickly on syslogs. In view of cautions, we investigate the logs and execute the new rules on the firewall which increment the unwavering quality and execution of the system. 1.7 Resolve the Wide Area Networking (WAN) issues to improve security, reliability and performance To determine the WAN system working framework issue, we login to the WAN gadgets and check the CPU, RAM and Link usage. on the off chance that we see any mistakes and variation from the norm on WAN Links, we investigate the issue by putting the directions (show interface WANPort). In view of that we check whether it is issue on specialist co-op or our end. With the assistance of observing devices if mistakes and issue happens, we get auto produced sends which help us to investigate the issue before client reports. It limits personal time and creation loss of the organization. 1.8 Critically evaluate the performance of a the Wide Area Networking (WAN) Reason for this task and structure to arrangement system of an association with the goal that client sitting in HQ and branches can get to citrix application facilitated in Datacenter. We have conveyed best supplies and great design with security estimation. There are five suggestion which can at present improve our system underneath are those: • • • • • We can introduce IPS for assessment on bundle level. We can introduce riverbed to advance WAN traffic. QOS can be applied to organize the traffic. We can make separate zone on Firewall to isolate the server and client traffic because of security reason. We can likewise do NAT to shroud our association subnet to course it on open system. 59 | P a g e Part 5 A) Based on the case study provided, evaluate at least two (2) Network Management Protocols and apply the most suitable protocol on current wireless network for analysis of traffic pattern. Network Management Protocols Understanding network management protocols can be an arduous task. It is easy to miss the technical term, the different procedures, the different ways of formatting the data, the multiple options, etc. To facilitate this task, we propose you to follow this simple guide. Network management protocols are network protocols The network administration protocols work in the field of networks and therefore are network protocols. Now, it is important to differentiate them from those network protocols that allow the transfer of data between two devices, such as TCP, UDP, SMTP, CSMA / CD, etc. In a network both data transfer protocols and administration protocols will coexist, sharing resources such as CPU and link bandwidth. It is therefore interesting to keep in mind that network management protocols also influence the overall performance of the platform. Be clear about the approach of the protocol It is easy to understand that the more complex and heterogeneous the platform, the greater difficulty we will find in its administration. Network administration has faced this complexity from three angles: • • • Faults: in this area the idea is to have procedures to detect faults and a scheme to report them. Performance: here the idea is to obtain data on the behavior of the platform that allows us to make inferences about the performance of it. Actions: Many management protocols include the ability to execute actions on managed items. When we try to understand a protocol it is important to stop for a moment and think about what angle the protocol proposes or with what angle we want to use it. 60 | P a g e Network management protocols and their architecture All management protocols propose an architecture and procedures to extract, collect, transfer, store and report management information from the managed elements. It is important to understand the architecture and procedures when it comes to understanding a management protocol, and indispensable when implementing a solution based on this protocol. Network management protocols and the organization of dataAnother fundamental point is the way in which the network administration protocols format and manage the management data. The basis is how they define and identify the elements to be administered. It is always interesting to mention: What element can I administer with this protocol? Only hardware or does it also cover applications, for example? Then it is about defining what information I can extract from the managed elements and what actions I can execute, if I can execute any. What format is used to handle the data? And how it is stored, if it is stored. Finally, what are the options I have to access this information? Now, in the rest of this article we will review three of the most popular administration protocols, trying to concentrate on the aforementioned points: focus, architecture and data organization. For this review we will take the following diagram as a guide: 61 | P a g e ICMP ICMP (Internet Control Message Protocol) is a network layer protocol that is part of the group of sub-protocols associated with the IP protocol. ICMP works in the field of fault validation and allows the calculation of certain performance metrics. The reader can read about the detailed specifications of the protocol in RFC792. The procedure proposed by ICMP is based on the detection of an error condition and the sending of a message reporting said condition. Thus, the key element is the messages contemplated by ICMP, which are usually classified in two categories: • • Error messages: Used to report an error in the packet transmission. Control messages: Used to report on the status of devices. The architecture with which ICMP works is very flexible, since any device in the network can send, receive or process ICMP messages. In practice it is used for routers and switches to report to the host that originates a packet that the packet cannot be delivered due to a network error. In addition, ICMP is also used to perform calculations of metrics on performance, such as levels of latency, response time or packet loss, among others. SNMP SNMP (Simple Network Management Protocol) is an application layer protocol that covers the areas of failures, performance and actions. SNMP offers a scheme to gather, organize and communicate management information between the devices that make up a network. This scheme manages to be common to a large number of hardware components, supporting: • • Diversity of devices: from network devices such as routers, switches, firewalls or access points to end user devices such as printers, scanners, stations or servers. Diversity of marks: most brands, when presenting a product, make sure that this product has support for SNMP included. The reader interested in reading the formal SNMP specifications should review several RFC documents, but we recommend that you start with RFC 1157. 62 | P a g e Architecture SNMP The SNMP architecture is based on two basic components: the SNMP Agents and the SNMP Administrators. In the following diagram we present a basic outline of this SNMP architecture: SNMP agents are pieces of software that run on the elements to be managed. They are responsible for collecting data on the device. Then, when SNMP administrators request such data through queries, the agent will send the corresponding. The SNMP agents can also send the SNMP Manager information that does not correspond to a query but that part of an event that occurs in the device and that requires to be notified. Then, it is said that the SNMP agent proactively sends a notification TRAP. The SNMP Administrators are found as part of a management or monitoring tool and are designed to function as consoles where all the data captured and sent by the SNMP agents is centralized. 63 | P a g e B) To resolve the problem of wireless local area network (WLAN) IP address allocation with the knowledge of troubleshooting methodology, apply appropriate steps to troubleshoot the failure of IP address allocation. At least six (6) to be discussed. Networks are networks. Despite best efforts to keep things smooth all the time every day, things happen. Here’s a look at some common network issues, some tips for quickly resolving them, and even better, how to prevent them from occurring again. 1. Duplicate IP Addresses When two devices attempt to share a single IP, you see the dreaded “Address Already in Use” error — with no ability to access the network. The Quick Fix: The blame for this often rests with your router’s default DHCP configuration. DHCP is probably trying to assign your new device an address at the beginning of your subnet, and another device may already occupy these low-numbered addresses with static IPs. If you’ve just introduced a new device or server to your network, it may have its own DHCP server. Simply disable the DHCP server on that device to restore sanity to your network. The Preventive Measure: You can take one simple step to avoid IP conflicts by modifying your router’s configuration to begin assigning DHCP addresses near the top end of your subnet, leaving the lower addresses available for devices that require static IPs. 2. IP Address Exhaustion To troubleshoot this issue, use the ipconfig command. If the workstation has assigned itself an IP address that begins with 169.x.x.x, it means that no IP address was available from the DHCP server. The Quick Fix: Some users on cable internet might not have a local router, in which case IP addresses are assigned on a limited basis directly from your ISP. You have probably run out of allowed IP addresses from your ISP. The solution to this is to purchase either a standalone router or WIFI access point with an integrated router. This creates your own local pool of internal addresses, ensuring you won’t run out. If you already have a local router with DHCP, the default address pool might be too small for your network. By accessing the DHCP settings on the router, you can adjust the size of the address pool to meet your network’s needs. The Preventive Measure: It’s important that any internet-connected network have a local router in operation with NAT and DHCP, both for security reasons and to prevent IP address 64 | P a g e exhaustion. The router needs to be the only device connected to the modem, with all other devices connecting through the router. 3. DNS Problems Errors such as The Network Path Cannot Be Found, IP Address Could Not Be Found, or DNS Name Does Not Exist, can usually be traced to a DNS configuration issue. The command line utility nslookup can be used to quickly show a workstation’s DNS settings. The Quick Fix: Workstations and other network devices can be configured to use their own DNS servers, ignoring the server assigned by DHCP. Checking the ‘Internet Protocol Version 4 (TCP/IP)’ settings for your adapter will show if an incorrect DNS server is specified, so just select “Obtain DNS server address automatically” instead. The Prevention Measure: Your local router might be configured to operate as a DNS Server, creating a DNS pass-through to your ISPs servers. On busy networks, this may overload the capabilities of the router. Change your network’s DHCP settings to directly access your DNS servers. 4. Single Workstation Unable to Connect to the Network If only a single workstation is displaying the “No internet” message when opening a web browser, we can usually assume that the rest of the network is healthy and turn our attention to any hardware and software that is particular to this system. The Quick Fix: To resolve this network issue, start by eliminating the obvious communication barriers such as a bad cable, poor WiFi signal, failing network card or incorrect drivers. Ensure that the workstation’s network adapter is configured with the correct IP, subnet, and DNS servers. If that doesn’t solve the problem, check any firewall software on the device to ensure that necessary ports are open to the external network. Common ports include 80 and 443 for web traffic, plus 25, 587, 465, 110, and 995 for email. The Preventive Measure: It’s usually best to leave all workstation TCP/IP settings to “Automatically assigned.” Use a DHCP server to hand out a uniform configuration to all devices on the network. If a static IP is needed on a particular workstation or server, most DHCP servers allow the ability to create static IP mappings. 65 | P a g e 5. Unable to Connect to Local File or Printer Shares Sharing problems are among the most difficult network problems to solve, due to the number of components that need to be configured properly. Most commonly, sharing problems arise due to conflicts between mixed security environments. Even different versions of the same operating system sometimes use slightly different security models, which can make interconnection of workstations difficult. The Quick Fix: We can cure sharing problems most efficiently by drilling down through the possibilities in this order: 1. Ensure that the required services are running. On Windows systems, the server, TCP/IP NetBIOS Helper, workstation, and computer browser services all need to be running. On Linux machines, Samba is the primary component required to share with Windows systems. 2. Check your firewall(s). It’s very common for a workstation’s firewall to be configured to block file and printer sharing traffic, especially if a new antivirus package is installed that introduces its own firewall. Firewall issues can also exist at the hardware level, so ensure that routers or managed switches are passing share traffic within the subnet. Speaking of subnet…. 3. Ensure all workstations are on the same subnet. This problem typically only appears on complex networks, however, even simple networks sometimes have static-IP equipment with an improperly configured subnet. The result is that external traffic will move about just fine, while internal traffic will hit unexpected roadblocks. 4. All Windows network adapters will need File and Printer Sharing for Microsoft Networks, Client for Microsoft Networks, and NetBIOS over TCP/IP enabled. 5. Once the above checks have passed, it’s finally time to check the most likely culprit, permissions. There are multiple layers of access required, each with their own interface within the OS. Check for: • • • • Systems configured with the wrong workgroup or domain. Incorrectly configured HomeGroup. Network type set to Public. Incorrect NTFS permissions. 6. Local Network is Unable to Connect to the internet This situation can either be intermittent or persistent. Often times, the most difficult aspect of dealing with any external network problem is finding the company responsible. And then tasking them to solve the issue, particularly with intermittent failures that are difficult to trace. It can 66 | P a g e sometimes be such a problem that organizations will have to switch internet providers in order to solve the issue. The Quick Fix: A router and modem reboot is the first order of business. The tracert then utility can be used to identify communication breaks. It will clearly hiccup on the particular router hop that is causing the problem. Contact your ISP with your findings, providing screenshots as necessary. The Preventive Measure: To avoid the finger-pointing that can prevent rapid resolution of external issues, do some research to ensure that you procure connectivity only from local Tier 1 providers. Other ISPs are more than happy to sell you service, however, they are simply piggybacking the Tier 1 connection, since they don’t actually own the infrastructure in your area. The goal is to remove as many middle-men as possible, so that when (not if) you experience a problem, one phone call is all that is required to identify the issue and get technicians to work on it. 7. Slow Internet Performance Slow performance is typically due to congestion, or sometimes poor quality connections that have corroded or otherwise deteriorated. Congestion may not be directly related to bandwidth exhaustion, as a single overloaded port on a switch or router can diminish network performance. This can be especially true on leased lines where dedicated bandwidth is to be expected, but speed tests indicate the network is not reaching it’s rated potential. The Quick Fix: Use speed test websites, conducting tests from geographically remote servers. This can pinpoint areas of congestion on the ISP’s network. In the case of cable internet, the local network is shared amongst your neighbors, committing your ISP to a costly bandwidth upgrade when saturation occurs. Report your findings to your ISP so that they can take steps to resolve the issue. DNS servers are an often overlooked aspect of internet performance. Using incorrect DNS servers can result in routing congestion or load balancing problems. While you should typically use your ISP’s DNS settings whenever possible, they may actually be routing traffic through overloaded web caches. You can temporarily adjust your DNS settings to use OpenDNS instead. The Preventive Measure: if internet performance is critical, you’ll need to procure adequate connectivity. While cable internet may be inexpensive, you could be setting yourself up for frequent jeers from employees. A local DSL operator may offer improved reliability for a slightly higher cost, but for the most consistent performance, you may find that an expensive leased line is a requirement for your organization. 67 | P a g e According to cisco Configuration Issues For a successful wireless connection, it is essential that configuration on the WLC is done correctly. This section describes some of the most commonly seen configuration issues. • SSID Mismatch The client uses its SSID to identify and associate to the wireless network, so ensure that the SSID is configured identically on the WLC and the client. In order to check the SSID configured on the WLC, click the WLANs page. Click the appropriate WLAN, and check the SSID configured under the General tab. Note: SSID is case sensitive. It might help the wireless client to associate to the WLAN if you delete and recreate the WLAN. • Security Mismatch Security configurations must match between the WLC and the client. If the authentication type is Static WEP, check if the appropriate encryption key/key index on the WLC matches that of the client. If the authentication type is 802.1x or WPA, ensure that the authentication type/encryption key size matches between the client and the WLC. For more information on how to configure the WLC and the client for various security solutions, refer to Authentication on Wireless LAN Controllers Configuration Examples. Note: Layer 2 security solutions, such as WPA or 802.1x, cannot be used for a WLAN configured with Layer 3 security solutions, such as web authentication or passthrough. For more information on compatible security solutions refer to Wireless LAN Controller Layer 2 and Layer 3 Security Compatibility Matrix. • Disabled WLAN For a successful wireless connection, the corresponding WLAN must be active on the WLC. By default, the status of the WLAN is not enabled on the WLC. In order to activate the WLAN, click the WLANs menu in the WLC. A list of WLANs configured on the WLC displays. Click the WLAN that is configured with the SSID to which the client wants to associate. Under the General tab of the WLANs > Edit page, check the status box. • Unsupported Data-Rates For a particular standard, either 802.11b/g or 802.11a, you can optionally set certain data rates as mandatory and other data rates as supported or disabled on the WLC. For a successful association, a wireless client must support the data rates that are configured as mandatory on the WLC. In order to check the data rates configured on the WLC, click the Wireless menu on the WLC GUI, and check the data rates configured under the 802.11b/g/n > Network or 802.11a/n > Network option that appears on the left-hand side of the page. Check the support page of the client vendor to determine this. If you upgrade the client driver, it can help the client to support the required data rates. Note: For better connectivity, set the lowest data rate to mandatory on the WLC and other data rates to supported. 68 | P a g e IP Address Issues Wireless clients need valid IP addresses to communicate with the rest of the network. The controller behaves like a router with an IP helper address. That is, it fills in the gateway IP address and unicasts it to the DHCP server via the dynamic interface on which the client is installed. So be aware that DHCP snooping on switches will, by default, block these DHCP packets on untrusted ports. When the DHCP offer comes back to the controller, it changes the DHCP server IP address to its virtual IP address. The reason it does this is because when Windows roams between APs, the first thing it does is try to contact the DHCP server and renew its address. 69 | P a g e C) The monitoring of the inter-campus the Wide Area Networking (WAN) links is crucial to ensure smooth network operations. Analyse at least three (3) reasons for the links failure and suggest most suitable solution. Please describe your answer? following problems are the best candidates for interconnection failure: • • • • • • • • Cabling problem to the switch or to the LAN Wrong applique (must be data terminal equipment [DTE] for CSU/DSU connectivity) Router hardware problem Disabled port on the X.25 switch Bad T1 digital link Mismatched Ethernet version configurations Misconfigured hosts Misconfigured router Next, eliminate each potential cause as a problem source and then test the network to determine whether it is operational. The following discussion works through the problem isolation process. 70 | P a g e References Carol, X,,2013. Computer?mediated communication and social networking tools at work. Information Technology and People. 26 (2). PP.172 – 190. Morten H. A., 2011, Sensemaking in Networks: Using Network Pictures to Understand Network Dynamics, in Roger Baxter, Arch G. Woodside (ed.) Interfirm Networks: Theory, Strategy, and Behavior.17. Emerald Group Publishing Limited. PP.1 – 197. Jason B. F. And Thomas L. M., 2012. Tools for interdisciplinary design of pervasive computing. International Journal of Pervasive Computing and Communications. 8. PP.112 – 132. Sheynblat, L., Krasner, N. F., 2004. U.S. Patent No. 6,677,894. Washington, DC: U.S. Patent and Trademark Office. 71 | P a g e