Transport Network Design RAGHUNANDAN CHAUDHARY 0 HND / THIRD SEMESTER Transport Network Design Table of Content Part – 1 Network Design 3 Network Lifecycle Models 4 Network Design Principles 5 Layer of Network 7 OSI Model 8 TCP/IP Model 10 Features of Scalable Network 11 Cisco Enterprise Architecture Model 12 Issues related to Redundancy 14 Spanning Tree Protocols 14 Solving Bandwidth & Load Issues 15 Selecting Network Device 15 Implementing LAN Design with Layer 2 & 3 Redundancy 16 IP Planning Table 17 Analyzing PVST+ & Rapid PVST+ Protocols 24 Analyzing Layer 3 Redundancy 25 Ether-channel Technology Solving Bandwidth & Load Issues 27 Conclusion 28 Part – 2 WAN 28 PPP 29 Frame Relay 30 DSL 30 WAN Technology 30 Private WAN Technology 31 Leased Lines 31 RAGHUNANDAN CHAUDHARY 1 HND / THIRD SEMESTER Transport Network Design Dialup 31 Ethernet WAN 31 Public WAN Technology 32 DSL 32 Wireless 32 VPN Technology 33 VPNs 33 Remote Access 34 Site-to-Site 34 Deploying Network Monitoring & Troubleshooting Documentation 35 Troubleshooting Methods 42 Syslog server 43 NTP Server 43 SMP 43 OSI Model 43 Conclusion 45 References 45 RAGHUNANDAN CHAUDHARY 2 HND / THIRD SEMESTER Transport Network Design PART 1 Explore LAN design principles and their application in the network design process. Network Design Network design is the practice of planning and designing a communications network. Network design starts with identifying business and technical requirements and continues until just before the network implementation stage (when you actually do the work to deploy and configure what was designed). Network design includes things like network analysis, IP addressing, hardware selection, and implementation planning. Network design is a category of systems design that deals with data transport mechanisms. The objective of network design is to satisfy data communication requirements while minimizing expense. Requirement scope can vary widely from one network design project to another based on geographic particularities and the nature of the data requiring transport. These developments require existing infrastructures to be adapted and that the design of new networks mitigate best-effort delivery issues, avoid low bandwidths and high latency problems and be based on traffic priority. (Latency = to describe delays in communication over a network) Latency meaning in networking is best thought of as the amount of time it takes for a packet of data to be captured, transmitted, processed through multiple devices, then received at its destination and decoded. Bandwidths is the maximum amount of data transmitted over an internet connection in a given amount of time. Bandwidth is often mistaken for internet speed when it's actually the volume of information that can be sent over a connection in a measured amount of time – calculated in megabits per second (Mbps). RAGHUNANDAN CHAUDHARY 3 HND / THIRD SEMESTER Transport Network Design Network Lifecycle Models 1. Prepare This is where you define high-level requirements and strategy. For example, your deliverables from this phase may include requirements documentation and current state surveys. 2. Plan: This stage deals with specific network requirements based on information gathered in the planning stages. 3. Design: During the design stage, the information gathered from the previous two stages is used to create a detailed network design. 4. Implement: This is where the work gets done to configure and deploy the network infrastructure. There is often testing to validate the design in this phase. 5. Operate: This is the portion of the lifecycle where the network is in production use. During this stage, monitoring is an important part of validating that the network is working as designed and being able to quickly address issues when it isn’t. 6. Optimize: At some point in most networks’ lifecycle, tweaks and optimizations are needed. This is the RAGHUNANDAN CHAUDHARY 4 HND / THIRD SEMESTER Transport Network Design stage where those changes are identified. For major changes, the cycle begins again to plan and implement them. Network Design Principles In order for enterprise networks and internet infrastructures to meet expected demands, their design will have to take into consideration principles such as availability, scalability, resiliency, reliability and quality of service (QoS). Availability Critical business applications have been accessible to authorize persons during all the time, most of the companies work for 24/7. It should have the alternative ways to accessing the critical applications in case of failure of main medium or link, for example you can use the dialup connection as backup. The goal of availability while designing the network is setup the redundancy so that resources are available to authorize people at all the time. Scalability Our network should be scalable for future improvements and installations. Your design should be flexible enough to merge acquisitions. As a result, network engineers designing and supporting enterprise or Internet needs, such as converged network traffics, centralized control and mission-critical applications. Resiliency In computer networking, resilience is the ability to "provide and maintain an acceptable level of service in the face of faults and challenges to normal operation. Threats and challenges for RAGHUNANDAN CHAUDHARY 5 HND / THIRD SEMESTER Transport Network Design services can range from simple misconfiguration over large scale natural disasters to targeted attacks. Efficiency We can provide the efficiency with placing the best hardware and software in the network. Also make sure that your network equipment is cost effective, you can also build the most efficient network with choosing the most suitable and cost-effective hardware and software. You can provide the efficiency with QoS, AAA and filtering. AAA stands for authentication, authorization, and accounting. AAA is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. Functionality All network applications and devices should be performing all the functions properly. You have to make sure, does your network infrastructure suppose the all the services running in your network? For example, you are using the Microsoft dot net then you have the enough bandwidth and hardware to work your applications to work efficiently. Manageability You can manage your network using different tools like Cisco works or tools that can improve control over the network like capacity management, monitoring performance and detecting fault. You also need to manage the network security. Performance We also need to focus of network performance during designing the network, make sure that all your applications and devices have bandwidth they need. Hierarchy A hierarchical design separates a network into distinct layers, where each layer has a series of functions that define its role in the network. Because of this, a network designer can choose the optimal hardware, software, and features to take on a particular role for that network layer. A hierarchy is an organizational structure in which items are ranked according to levels of importance. RAGHUNANDAN CHAUDHARY 6 HND / THIRD SEMESTER Transport Network Design Layer of Network Cisco has three layer or three-tier hierarchical network model. It divides critical flat network multiple and manageable networks. Each level within hierarchy focus on particular set of roles. This model renders The Sage Group Plc. with high degree of flexibility to attain optimization and make appropriate selection of feature, software and hardware. This comprises of access layer, distribution layer and core layer. 1. Core Layer This is the layer that routes traffic between different geographical sites. In other words, it’s the network backbone. The core layer is where high-throughput, expensive core routers shine. 2. Distribution Layer The distribution layer sits between the core and access layers. It acts as a boundary and implements network policies to restrict or allow data flows between different subnets within the network. Less expensive routers and L3 switches are the common workhorses of the distribution layer. 3. Access Layer The access layer is the layer for endpoint devices like user PCs, printers, and VoIP phones. Smaller “access switches” are responsible for switching packets and routing traffic at this layer. 3 Tier Design Model layer Two-tier design model It is appropriate for small to medium sized campus networks in which distribution as well as RAGHUNANDAN CHAUDHARY 7 HND / THIRD SEMESTER Transport Network Design core functions are combined into a single layer. This is referred to as collapsed coredistribution architecture. This model shares various characteristics with partial mesh model, but there are certain additional benefits. This model is used within metropolitan settings in which cost is reduced but still some redundancy exists. Network Design Models The networking model describes the architecture, components, and design used to establish communication between the source and destination systems. Aliases for network models include protocol stacks, protocol suites, network stacks, and network protocols. There are 2 predominant models available. Open Systems Interconnection (OSI) Model & Transmission Control Protocol/Internet Protocol (TCP/IP) Model. (Aliasing refers to the process of creating and configuring multiple IP addresses on a single Network Interface). OSI MODEL or LAYER 1. Physical Model This layer deals with electrical, mechanical, functional, and procedural characteristics of physical links. Network topology comes under this layer. One prominent aspect of the physical layer is encoding. Encoding refers to the representation of data. The objective of encoding is to ensure the maximum probability that the message, being transmitted is sent without any errors. There are different types of encoding available. They differ in the way the 0’s and 1’s are represented. Basic representation is -5V signal for 0 and +5V signal for 1. 2. Data Link Model The main responsibility of the Data Link Layer (DLL) is ensuring Flow Control, Error Control, Access Control, Framing, and the reading of physical addresses. Framing: The process of taking a packet from the layer above and adding a frame to the packet is called framing. The frame includes data such as the end of the packet, message length, etc. to achieve accurate information at the receiving end. Flow Control: DLL restricts the size of the traffic and waits for the receiver to acknowledge the first batch of frames before sending the next batch. Error Control: Due to long-distance transmission, sometimes the bits of information might get corrupted. The corruption of bits leads to poor service. Listed below are a couple approaches to handling data corruption. RAGHUNANDAN CHAUDHARY 8 HND / THIRD SEMESTER Transport Network Design 3. Network Model The network layer is one of the most important layers. It enables many features such as: Address Assignment: IP addresses are assigned to the host. There are two ways of assigning addresses: Static and Dynamic. Static addresses are assigned manually and do not change under any circumstances. Dynamic IP’s, on the other hand, are assigned on an as-needed basis. Routing: Selecting the route can be done manually or automatically. Today, most of it is automatic. There are two predominant algorithms used for routing: Distance Vector Routing and Link State Routing. Fragmentation: Within the transport layer, there is a constraint on the maximum allowable size for data. Therefore, bits are segmented accordingly in the transport layer. 4. Transport Layer or Model The transport layer is the fourth layer in the OSI model and enables the following services: Reliability: This layer ensures that a packet sent is received without corruption. If not, the packet is resent. This may add a delay. But, it is suitable for applications where data integrity is a must. Flow-Control: The rate of sending information is limited by the buffer size and the receiver capacity. The delays caused due to propagation, queing, and transmission are taken into account by the flow-control algorithms. Congestion Control: In routers, the entry of packets can be decided based on the current traffic. Multiplexing and De-multiplexing: Before the transport layer, the ports do not play a major role. The ports can be thought of as multiple inputs to the same network channel. 5. Session Model The inclusion of this layer enables maintaining sessions during browsing. This helps with implementing authentication, authorization, synchronization, and dialog control. Let us consider examples to appreciate the significance of the session layer. Authentication: Once a user logs in, he/she should remain logged in until he/she logs out. Obtaining the status of a user’s authentication happens at this layer. Authorization: Access rights to specific parts of a website are given to super-users and admins. Dialog Control: Allows various systems running applications like WebEx to communicate. The challenge here is to send and receive data simultaneously, that is overcome by half-duplex or full-duplex protocols under the session layer. Synchronization: The digital experience relies on audio and video being synchronized. RAGHUNANDAN CHAUDHARY 9 HND / THIRD SEMESTER Transport Network Design The session layer ensures the timestamps of the audio and video received are in the right order. 6. Presentation Layer The presentation layer ensures the translation of characters from the original format in the host system to the format of the receiving system. It also adds encryption and decryption features. Data compression is handled at this layer. Encryption: Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (cipher text). Decryption: Decryption is the process of converting cipher text back to plaintext. 7. Application Layer The entire process begins at the end user’s device. This can be a phone, laptop, server, etc. The application layer provides the interface for data exchange between the program and the user. For example, Facebook’s web application/mobile application is the interface through which we like, share, comment, and perform various other activities. All these activities generate snippets of data that needs to be transmitted across the network. TCP/IP MODEL RAGHUNANDAN CHAUDHARY 10 HND / THIRD SEMESTER Transport Network Design The network of networks that we refer to as the Internet is based on the TCP/IP model. Therefore, it is also referred to as the TCP/IP Protocol Suite. It is a four-layered architecture specifically built for the internet. The protocol is defined in the IETF (Request For Comments) RFC 791 and 793. Many of the layers that we see in the OSI Model are not available in the TCP/IP Model. The internet requires the following features: Reliability, Security, Traffic Efficiency. TCP/IP model uses TCP in the transport layer and IP in the network layer. The four layers of the network model are as follows. Application Layer: In the TCP/IP Model, the Application layer encompasses the first three layers in the OSI model, that is, Application layer, Presentation layer, and the Session Layer. Transport Layer: This layer is the same as the one mentioned in the OSI model. Transmission Control Protocol (TCP) is used in this model. TCP ensures reliability and helps avoids congestion in networks. Network Layer: Internet Protocol (IP) is used predominantly in this layer. Until recently, IPv4 was the most common protocol in use. It provided 32 bits for assigning addresses. It supported around 4.29 million unique devices. In the late 1990s, the number of devices overtook the 4 million mark, and therefore IPv6 was introduced. IPv6 is the protocol that allows 4.3 billion devices. It has 128 bits assigned for the network address. Network Interface: It enables the transmission of data. The layer corresponds to the data link layer and the physical layer in the OSI Model. Features of Scalable Network Internetwork provides unique features, every scalable network possess essential attributes in common. Reliable and Available RAGHUNANDAN CHAUDHARY 11 HND / THIRD SEMESTER Transport Network Design This network can be grown up without creating an impact on existing users. They are suitable for modular devices as they are reliable due to which these networks allow expansion. Responsive A responsive network renders high quality services for different protocols as well as applications without creating worst response for systems. The internetwork needs to be capable for responding for issues related with latency which are very common in system network architecture (SNA) traffic but still scalable network routes the packets without creating any kind of impact on QoS. Efficient Large internetwork needs to use the nominal resources, basically this includes bandwidth. It is affirm able to enhance data without buying WAN services or any kind of hardware. For this, it is necessary to optimize the redundant broadcasts, routing updates and service location requests. Adaptable They include various protocols, hardware technologies and applications which makes it easy for the user. Redundancy Network redundancy is the process of adding additional instances of network devices and lines of communication. To help ensure network availability and decrease the risk of failure along the critical data path. Hierarchy Each layer, or tier, in the hierarchy provides specific functions that define its role within the overall network. This helps the network designer and architect to optimize and select the right network hardware, software, and features to perform specific roles for that network layer Scalability Small failure domains CISCO ENTERPRISE ARCHITECTURE MODEL The Cisco Enterprise Architecture is a modular approach to network design. Following are RAGHUNANDAN CHAUDHARY 12 HND / THIRD SEMESTER Transport Network Design the primary Cisco Enterprise Architecture modules: Enterprise campus, Enterprise edge, Service provider edge. It accommodate the need for modularity in network design, Cisco developed the Cisco Enterprise Architecture model. This model provides all the benefits of the hierarchical network design on the campus infrastructure, and facilitates the design of larger, more scalable networks. The Cisco Enterprise Architecture model separates the enterprise network into functional areas that are referred to as modules. The modularity that is built in to the architecture allows flexibility in network design and facilitates implementation and troubleshooting. Cisco Enterprise Campus: A campus network is a building or group of buildings connected into one enterprise network that consists of many LANs. A campus is generally limited to a fixed geographic area, but it can span several neighboring buildings (for example, an industrial complex or business park environment). Regional offices, SOHOs, and mobile workers may need to connect to the central campus for data and information. The Cisco Enterprise Architecture model facilitates the design of larger, more scalable networks. It represents the focused views of the Cisco Service-Oriented Network Architecture (SONA), which concentrates on each area of the network. CISCO ENTERPRISE ARCHITECTURE MODEL RAGHUNANDAN CHAUDHARY 13 HND / THIRD SEMESTER Transport Network Design Issues related to Redundancy Redundancy failures When a redundant link or device is down, it needs to be detected and repaired before the backup connection also dies. Without the proper level of monitoring, you may not know that a redundant connection is running on a single link. More than once, I’ve seen network outages because a both halves of a redundant configuration failed. In many cases the first failure occurred days, weeks, or months before the second failure, only it was not detected and reported. In one case, a redundant connection was shut down for troubleshooting and was overlooked when the troubleshooting session ended. The network outage occurred when the other connection also experienced a problem. A redundancy failure can be caused by incorrect HSRP/VRRP/GLBP configuration, failure of a redundant link, failure of a redundant device, or the application of an ACL/Firewall that blocks an alternate path. Spanning Tree Protocols Spanning Tree Protocol (STP) is a link management protocol that provides path redundancy while preventing undesirable loops in the network. When it comes to ethernet networks, only one active path can exist between two stations in order for them to function properly. Loops occur in networks for a variety of reasons. The most common reason you find loops in networks is from trying to provide multiple levels of redundancy. When having multiple root switches in a network used to provide this redundancy, the problem that arises is infinite loops between the switches and the end workstations they’re connected to. If a loop exists in the network topology, the potential exists for duplication of messages. When loops occur, some switches see stations appear on both sides of the switch. This confuses the forwarding algorithm and allows duplicate frames to be forwarded. Spanning Tree comes into play by only allowing a singular path to destinations when having multiple (redundant) links such as this. In a STP environment, the switches exchange information among themselves using bridge protocol data units (BPDU) and will then listen in on all ports for this BPDU message. Once a bridge is turned on, it automatically assumes that it is the root bridge in the STP tree. The STP software chooses a root bridge and calculates all paths from the lower bridges back to itself. In the event of hardware failure of a root bridge in the redundant environment, a new root is elected and port paths would be recalculated. With multiple uplinks, STP is a must in our switched environment to provide multiple redundancies in case one goes down, another link is there to takes it place within a matter of seconds. At this stage in our continuously growing network topology, there’s virtually no way you’ll ever lose the connection to your dedicated server. That is of course you don’t RAGHUNANDAN CHAUDHARY 14 HND / THIRD SEMESTER Transport Network Design reboot the server itself, then that’ll be your expected momentary loss of connectivity. The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links providing fault tolerance if an active link fails. As the name suggests, STP creates a spanning tree that characterizes the relationship of nodes within a network of connected layer-2bridges, and disables those links that are not part of the spanning tree, leaving a single active path between any two network nodes. STP is based on an algorithm that was invented by Radia Perlman while she was working for Digital Equipment Corporation. Solving the Bandwidth and Load related Issues Link aggregation 1. In computer networking, link aggregation is the combining (aggregating) of multiple network connections in parallel by any of several methods. 2. In order to increase throughput beyond what a single connection could sustain, to provide redundancy in case one of the links should fail, or both. 3. A link aggregation group (LAG) is the combined collection of physical ports. Implement a network using LAN design principles based on a predefined set of requirements. Selecting Network Device There are many different suppliers of networking devices, however Cisco has been readily available and key in developing networks. There are many different models of routers and switches available from networking IT providers. Different models will provide different features including different number of ports, forwarding rates etc. To select the networking devices that was used for the prototype, the various routers and switches had to be analyzed to see if they would be suitable to meet the requirements of the network. RAGHUNANDAN CHAUDHARY 15 HND / THIRD SEMESTER Transport Network Design To make this selection, there were various steps that had to be undertaken to ensure that the appropriate switch and router was chosen. The switch that was chosen was the Cisco 2960 range as there were no requirement to support Power over Ethernet (PoE), it had enough ports to support the design, with enough spare ports to support scalability of the network and the routing protocols that needed to be configured on the network were supported on the switch with the current operating system version running. Within Cisco, they also have different categories which support enterprise networks. These consist of Campus LAN switches, Data Centre switches, Cloud-managed switches, Service Provider switches and Virtual Networking switches. Due to this prototype following a Hierarchical Design, the switch category that was chosen was the Campus LAN switch due to it being able to scale network performance within an enterprise LAN, whilst providing high forwarding rates and multilayer switching. The Cisco 2960 was a fixed configuration as this provided the network with a variety of port density configurations, whilst meeting the requirement of scalability. Similarly, there are different router platforms that network designers can choose from as well as having differing physical configurations and features that are available. Within the Hierarchical Design and its distribution layer, routing is required to enable devices outside the local network to communicate. As a network scales, the network designer needs to ensure that an appropriate router is chosen to meet the given requirements. There are three categories of routers: Branch router, Network edge router and Service provider router. The router that was used in this prototype was the 2901 which is a branch router; this router delivers optimized experience across WAN infrastructure. When choosing network devices, the requirements help to define what devices are to be used. Across different network vendors, their devices support different configurations and hardware which meet the given requirements. Whilst Cisco was used in this network, there are other vendors which provide similar devices, however due to other requirements and needs, Cisco was the preferred choice. Implementing LAN design with Layer 2 and Layer 3 redundancy RAGHUNANDAN CHAUDHARY 16 HND / THIRD SEMESTER Transport Network Design FIG – Set to work This is the setting to work for this task; the minimum requirements are to include three Layer 2 switches, provide redundant link between the switches, use Rapid per VLAN Spanning Tree (Rapid PVST+), use link aggregation in the main active link and provide a redundant gateway using a suitable first-hop redundancy protocol, in this case, Hot Standby Router Protocol (HSRP) will be used. IP Planning Table RAGHUNANDAN CHAUDHARY 17 HND / THIRD SEMESTER Transport Network Design Subnet name Size needed Network Subnet mask Assignable range A 60 192.168.10.0 /26 192.168.10.1 Broadcast – 192.168.10.63 – 192.168.10.127 192.168.10.62 B 60 192.168.10.64 /26 192.168.10.65 192.168.10.126 C 6 192.168.10.128 /29 192.168.10.129 - 192.168.10.135 192.168.10.134 D 2 192.168.10.136 /30 192.168.10.137 – 192.168.10.139 – 192.168.10.143 192.168.10.138 E 2 192.168.10.140 /30 192.168.10.141 192.168.10.142 X NTP Server /24 10.0.1.1 – 10.0.1.254 It shows the addressing scheme that will be used when the design is implemented. FIG – Additional R1 Config RAGHUNANDAN CHAUDHARY 18 HND / THIRD SEMESTER 10.0.1.255 Transport Network Design FIG – Additional R2 Config As shown in Figure 1 and Figure 2, whilst they show the complete config that is configured on the stated devices, before the config that is shown in the below figures were configured, basic configuration was configured on the devices. This includes encrypting passwords, configuring passwords, in this case “password” was used, giving interfaces IP addresses and enabling them. On the routers, whilst not considered basic configuration, Open Shortest Path First (OSPF) was also configured as a routing protocol to allow the PCs, Servers and Routers to ping across the whole of the network. RAGHUNANDAN CHAUDHARY 19 HND / THIRD SEMESTER Transport Network Design FIG – Layer 2 Device & Cabling Defined by the given requirements, within this network prototype, a minimum of three Layer 2 switches and a redundant link between all of these switches were needed. The section of this design is one of the features that provides redundancy and link aggregation at Layer 2 and 3. As shown below in Figure 5 and Figure 6, the network prototype has been configured with Rapid PVST+. FIG – STP Configuration RAGHUNANDAN CHAUDHARY 20 HND / THIRD SEMESTER Transport Network Design FIG – Rapid PVST+ Configuration Another requirement was to use link aggregation, otherwise known as Etherchannel in the main active link. FIG – Ether-channel Config This prototype needed to provide a redundant gateway using a suitable first-hop redundancy protocol, in this case HSRP was used. RAGHUNANDAN CHAUDHARY 21 HND / THIRD SEMESTER Transport Network Design FIG – HSRP (show standby) FIG – WAN Protocol (PPP) In the task below there were additional requirements that the network engineering supervisor asked for. These requirements were to add additional security options, in this case Point-to-Point Protocol (PPP) was configured to support the enterprise network solution. RAGHUNANDAN CHAUDHARY 22 HND / THIRD SEMESTER Transport Network Design Captured in this figure is the configuration that was configured on R3 within the network diagram. It has been configured using Challenge Authentication Protocol (CHAP) which is a hashed version of the password configured which makes it more secure. Within Task 4 below, there was a requirement to configure network monitoring tools which can assist network administrators. FIG – Network Time Protocol (NTP) Shown in this Figure is the synchronization of the clock to R3 within the network above. Using the commands “show ntp status” and “show clock”, it shows that the router is synchronized to use the time configured in the NTP server. FIG – SYSLOG CONFIG RAGHUNANDAN CHAUDHARY 23 HND / THIRD SEMESTER Transport Network Design FIG – Syslog Server Captured in both figure is the configuration that is on the routers and the switches within the network, and the logs that the syslog server has been sent when an event or action occurred on the network. Analyzing PVST+ and Rapid PVST+ protocols A maintain a successful network, redundancy must be implemented and maintained. Whilst adding extra links provides basic layer 1 redundancy, it also introduces loops into the network. If a switch connection is lost, another link will need to take over without creating a loop; Spanning Tree Protocol (STP) is the layer 2 redundancy protocol that is implemented to solve this problem. STP has evolved to quickly calculate which ports need to be blocked so that a VLAN-based network isn’t affected by loops. As mentioned previously, redundancy is one of the main factors that needs to be considered when designing and creating a network. By implementing this layer 2 redundancy protocol, it improves the availability of the network by implementing alternate paths with the use of additional cables and devices. Per-VLAN Spanning Tree (PVST+) is seen as a Cisco proprietary enhanced variant of STP. As previously mentioned, STP is the original standard which provides a loop free network implemented with redundant links; this created one spanning tree instance for the bridged network irrespective of the amount of VLANs. Due to there only being one root bridge, the traffic for these VLANs will be sent through the same path, leading to slower traffic and well as being slow to converge is a connection was lost. PVST+ is enhanced due to it maintaining a separate spanning tree instance for each VLAN RAGHUNANDAN CHAUDHARY 24 HND / THIRD SEMESTER Transport Network Design that is configured within the network. Each of these instances support Cisco proprietary extensions such as PortFast, root guard, and loop guard. This protocol allows a VLAN trunk to be in forwarding mode for some VLANs, whilst blocking others. This protocol allows spanning tree to optimize the traffic for every VLAN, however similar to STP, convergence is slow. This protocol load balances traffic at layer 2 by forwarding a number of VLANs on one trunk and other VLANs on another due to the VLANs being treated as separate networks. Rapid PVST+ is seen as a Cisco enhancement of Rapid Spanning Tree Protocol (RSTP) which uses PVST+ whilst providing a separate instance of an IEEE standard for each VLAN. As stated by Cisco, 2010 RSTP is an evolution of STP “that provides faster spanning tree convergence”. Unlike PVST+, RSTP provides a single instance of spanning tree and faces similar poor traffic flow speeds that STP faces. (Cisco, 2010, p.136) Each instance of Rapid PVST+ supports Cisco proprietary extensions such as PortFast, root guard, and loop guard etc. This version of spanning tree addresses the convergence issues of the other versions and the slow traffic flow speeds that is affected due to this. This version ensures that when a connection is lost, another takes over much quicker. As discussed, PVST+ and Rapid PVST+ albeit better than their counterparts, both benefit a network with their effectiveness in solving redundancy issues within a network. These protect the network from a single point of failure and ensures that a loop does not bring down the network. Without this protocol implemented, networks would fail to be redundant, and their availability would be affected. Analyzing Layer 3 redundancy implementations for IPv4 and IPv6 FHRP There are different First Hop Redundancy Protocols (FHRPs) that can be implemented within a network. FHRPs enable an engineer to configure multiple physical routers making them appear as though there are a single logical router. Using FHRPs make communication easier due to a single default gateway can be configured and the end machine can use standard protocols to communicate across the network. RAGHUNANDAN CHAUDHARY 25 HND / THIRD SEMESTER Transport Network Design First hop derives from the first router hop that a packet passes through. Redundancy protocols, both for IPv4 and IPv6 present a virtual router to the clients on the network; this router holds its own IP and MAC address, and this IP is the address which is configured on each of the end devices as the default gateway. The MAC address is what will be returned when an Address Resolution Protocol (ARP) request is sent by a host. The redundancy protocol is responsible for deciding which physical router actively forwards traffic and which one is in standby mode; the standby router will take over from the active router if it fails. To allow hosts to communicate outside a local network, a default gateway is required to allows these packets, from either a LAN or VLAN to reach these remote networks. If the default gateway fails however, the hosts within the local network will not be able to communicate out to remote networks. The solution to this issue is FHRPs which allow default gateway redundancy. HSRP Hot Standby Router Protocol (HSRP) is Cisco proprietary and was the first FHRP to be developed. HSRP is configured on a given interface and that interface will be part of a standby group. As mentioned above, HSRP has multiple routers configured into a standby group, which will share a virtual IP address and MAC address, whilst providing a default gateway. The reason behind having a physical IP as well as a virtual is to provide the redundancy; these IP addresses can either be IPv4 or IPv6 depending on what the network uses. Within HSRP, there is a priority number; one of the routers will have a higher priority number which means it is the preferred router, thus the active one. The other standby routers will be configured with the same virtual IP as the hosts hold this as their default gateway and are not affected if a standby router takes over. VRRP Similar to HSRP, Virtual Redundancy Protocol (VRRP) configures multiple routers to form a single virtual router, however is the open standard of HSRP. Although both HSRP and VRRP elects one router to handle all traffic that is sent to the virtual IP address, in VRRP a group will have a master router with backup routers instead of active and standby. The main difference between configuring HSRP in IPv4 and IPv6 is that for IPv6, HSRP version 2 must be enabled on an interface before it can be configured, this is not the case for RAGHUNANDAN CHAUDHARY 26 HND / THIRD SEMESTER Transport Network Design IPv4. Hosts that are configured to support IPv6 will learn of available IPv6 devices through IPv6 neighbour discovery messages. Similar to IPv4 HSRP, IPv6 HSRP will have a HSRP group number, a virtual IPv6 linklocal address that is derived from the virtual MAC address. Periodic neighbour discovery messages are sent for the HSRP virtual IPv6 linklocal address once the group is active, however these stop after a final message is send when the group leaves the active state. Similar to HSRP, to configure VRRP IPv6, it requires VRRP version 3 to be configured; the other versions of VRRP do not support IPv6. Once VRRP version 3 has been enabled, there is also a different set of configuration commands that are used to configure IPv6 from IPv4. Although there are differences between configuring FHRP protocols with IPv4 and IPv6, the theory behind the protocols is the same across the different versions of IPs. The virtual IP and MAC address are different due to the layout of the addresses and the blocks of addresses that Cisco allow the protocols to use. Ether Channel technology solving bandwidth and load issues Ether Channel Also known as Port Bonding, Ether Channel is a port channel technology that is used to group several ports (two to eight ports) into one logical channel. This report will evaluate the Ether Channel technology and how it helps to solve bandwidth and load issues. Most networks will usually have a number of links between switches to provide redundancy and resiliency on the network. Within a network that is configured with STP, this protocol will put numerous ports into blocking mode to protect the network from loops and layer 3 routing protocols will view these links as individual ones. Once etherchannel has been implemented, STP and the layer 3 routing protocols will treat the grouped links as an individual one which will stop STP from blocking the given ports. There are two aggregation protocols that can be used to implement ether channel; Port Aggregation Protocol (PAgP) and Link Aggregation Control Protocol (LACP). PAgP is Cisco’s proprietary protocol that can be used to configure channels and ether channel on ports. The links in the group must have the same parameters such as speed, duplex, VLAN information otherwise the ports will not be grouped into a channel. Once this channel is active, it will be added to STP ad a single bridge port and PAgP will send RAGHUNANDAN CHAUDHARY 27 HND / THIRD SEMESTER Transport Network Design packets in 30 second intervals to manage the link for consistency e.g. link additions, changes and failures. PAgP uses “auto” and “desirable”; auto enables PAgP only if a PAgP device is detected and desirable enables PAgP unconditionally. LACP is non-proprietary, thus is used between other vendor networks. It has the same purpose as PAgP, however uses different commands to configure etherchannel on the network. LACP uses the commands “active” and “passive”; active enables LACP unconditionally and passive enables LACP only if a LACP device is detected. Ether channel can be configured without PAgP or LACP by using the command “on”, however Cisco advises one of the protocols to be used to assist with compatibility issues whilst also managing link additions and failures between the configured switches.Ether channel helps solve bandwidth issues as it helps achieve greater speeds by grouping links, thus increasing the amount of bandwidth due to the links being seen as one link instead of multiple. This technology also solves load balancing issues as it will balance the traffic load across the links, increasing efficiency on the network. Another benefit of using ether channel is the redundancy it provides; due to there being multiple links grouped into one logical channel, there are more available links to mitigate against a loss of links. Conclusion: In the end, this part of the report represents the design and prototype of the network designed for Cyber-link Incorporation along with the detailed documentation of several redundancy protocols. The design of the bank shows the connection between the branches and also represents the implementation of Layer 2 and Layer 3 redundancy protocols such as STP, OSPF, and, Ether-Channel. With the descriptive report of these protocols. And, also the substitute of the STP which is PVST+ and Rapid PVST+ is compared which shows that the protocols, when used in the right ways with proper configuration, makes it easier to differentiate various segment of the network like layers. PART 2 WAN A Wide Area Network (WAN) differs to that of a LAN in that a WANs infrastructure is typically leased from a service provider instead of owning the infrastructure which is usually what occurs within a RAGHUNANDAN CHAUDHARY 28 HND / THIRD SEMESTER Transport Network Design LAN. Defined by Cisco, 2010, p.200, a WAN is a “Data communications network that serves users across a broad geographic area and often uses transmission devices provides by common carriers.” There are a number of different WAN technologies that can be implemented within a network. A given set of requirements will define which WAN technology is appropriate for the enterprise network. PPP The first WAN technology that was considered when designing and implementing the given network was Point-to-Point Protocol (PPP). PPP is a layer 2 protocol which can be used over different forms of media e.g. asynchronous serial or synchronous serial and will encapsulate the frames ready for transmission over layer 2 physical links. PPP uses three main components: High-Level Data Link Control (HDLC), Link Control Protocol (LCP) and Network Control Protocol (NCP). This protocol relies on LCP for establishing and maintain the data-link connection, NCP for establishing and configuring layer 3 protocols and uses HDLC-like framing for transporting layer 3 packets over PPP links. Whilst HDLC is the default serial encapsulation protocol, PPP has more features and transports layer 3 packets across a layer 2 PPP link which is non-proprietary. One of the features that PPP supports is Link Quality Management (LQM); this monitors the quality of the link, and if the error percentage falls below that configured, the link is disabled, and packets will be rerouted or dropped. The other feature that PPP supports is Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). PAP is the least secure version of these protocols as the passwords are sent in plaintext and PAP is performed only when the initial link is established. CHAP is a more secure version as the passwords that are sent are hashed and is used at the initial start-up of a link and there are checks that occur periodically on the link ensuring that the router is still communicating with the same host. There are three steps to establish a PPP session: First it will go through a Linkestablishment phase, then an Authentication phase, and finally the Network layer protocol phase. In the first stage, LCP packets are sent by each PPP device to establish and test the link. If PAP or CHAP is configured on the links, the second phase will take place, where the password is sent across the authenticate link. The final stage involves using NCP to allow multiple layer 3 protocols to be encapsulated and sent over a PPP date link. RAGHUNANDAN CHAUDHARY 29 HND / THIRD SEMESTER Transport Network Design Frame Relay Frame Relay is another WAN technology that could be implemented when designing and implementing a network. This technology is whereby varied-length packets are transmitted by switching; this is accomplished by breaking packets into chunks at the sending device. Each of these packets can be sent over different routes to get to its end destination; these packets are then reassembled in the correct order at the receiving device. Frame relay uses virtual circuits compared to physical circuits that are used with leased lines. Virtual circuits link together the number of devices that are connected to the providers network and is provided between the two Data Terminal Equipment (DTE) devices, showing them to be connected via a physical circuit, when they are sending the frames into a shared infrastructure. The main disadvantage of frame relay is that it only has one single point of failure, which means that it does not provide a resilient addition to a network. DSL The third WAN technology that could be implemented is Digital Subscriber Line (DSL); this connection technology is considered to be an “always-on” connection which uses existing twisted pair telephone lines to transport high-bandwidth data and provides IP services to users. DSL delivers a dedicated, ppp public network access, and is used between a service provider’s central office and the customer site that requires access to the Internet. To allow DSL to work, a modem is required; this converts an Ethernet signal from the end user’s device to a DSL signal, this signal is then sent to the central office. This technology is a popular choice for companies due to it supporting remote access users. A user must connect to an ISP which will then establish an IP connection through the Internet to the enterprise network. Due to it using an analog medium, it provides a reliable connection that prevents interruptions and packet loss. The above WAN technologies have been examined against a set of enterprise requirements for a given design, and PPP is the selected WAN technology that is appropriate for the requirements stated in the above section. This is due to having multiple PPP serial interfaces within the network design and provides the resiliency and other needs that the network needs to meet. WAN Technologies RAGHUNANDAN CHAUDHARY 30 HND / THIRD SEMESTER Transport Network Design There are many different WAN technologies, however these can be broken down to either be public or private WAN technologies. There are benefits and drawbacks to these technologies and these will be analyzed below. Private WAN technologies Leased Lines Leased Lines is a form of private WAN technologies due to these being point-to-point lines that are leased from a service provider. These lines are permanent dedicated connections which provide WAN communication paths from a customer’s site to the provider’s network. Organizations pay a monthly fee to lease these lines from a service provider which enables them to use the line. The fee of these lines differs due to there being different capabilities, the bandwidth that is required and the distance between the connected points. There are a number of benefits and drawbacks to using leased lines, the advantages being simplicity, quality and availability. They require minimal knowledge to install and maintain, the links normally provide high service quality, and due to the dedicated connection, it removes latency between the connections. The drawbacks are cost and there is limited flexibility. The point-to-point links tend to be the more expensive type of WAN access, as well as each endpoint requiring an interface on the router, which increases the equipment. Leased lines have a fixed capacity, which means that the bandwidth may not meet the requirements specifically. Dialup Dialup is another form of WAN access and can be used when there is no other technology available. This technology is appropriate when there is a requirement for intermittent, low-volume data transfers. There are multiple advantages and disadvantages of this technology, the advantages being simplicity, availability, and low implementation cost. The disadvantages consist of the low data rates and a long connection time. Similar to that of leased lines, due to this also being a dedicated circuit, there is little delay or latency for point-to-point traffic, however due to the low bit rates, voice and video traffic is not effectively sent over the network. Ethernet WAN RAGHUNANDAN CHAUDHARY 31 HND / THIRD SEMESTER Transport Network Design Ethernet started off as a LAN access technology, due to the maximum cable length being on kilometer. However, there are newer Ethernet standards that use fiber-optic cables which make it possible for Ethernet to now be a WAN technology e.g. it can range from 5km to 70km depending on the IEEE base used. An Ethernet WAN has multiple benefits consisting of reduced expenses and administration, easy integration with existing networks and enhanced business productivity. It provides a high-bandwidth layer 2 network which supports managing of data, voice and video within the same infrastructure; this increases bandwidth and allows companies to inexpensively connect sites to other sites and networks. Public WAN technologies DSL As mentioned previously, this technology is an always-on connection that will use existing telephone lines to transport high-bandwidth data, whilst providing IP services to users. An Ethernet signal is converted from an end device to a DSL signal using a DSL modem which is then sent to the central office. A remote user must connect to an ISP before an IP connection is established through the Internet to the enterprise network. This technology has multiple benefits and drawbacks such as it is achieving fast data rates, no additional wiring and security due it normally accessing a separate network the main section of the network. The drawbacks of this technology are the proximity, the greater the distance, the less efficient the service will be, slower uploads and if the lines are busy with other communications occurring, the connection may be slow. Wireless Wireless uses the unlicensed radio spectrum to transmit and receive data; due to this spectrum being unlicensed, it is accessible to anyone who has a wireless device. There are multiple wireless technologies that have evolved that allow wireless access to travel further than the local transmission range of 100 feet. One of these technologies is Municipal Wi-Fi which provides high-speed Internet access for free or for a low cost. To connect to this Wi-Fi, a user needs a wireless modem; this provides a stronger radio frequency than wireless adapters do. Another technology is Worldwide Interoperability for Microwave Access (WiMAX), and provides a high-speed broadband service with wireless access, whilst covering a broad area similar to that of a mobile network compared to a Wi-Fi hotspot. WiMAX is similar to that RAGHUNANDAN CHAUDHARY 32 HND / THIRD SEMESTER Transport Network Design of Wi-Fi, however it operates at higher speeds, over a further distance and for a larger number of users. Users must subscribe to an ISP that has a WiMAX tower within a distance of 30 miles and will also need a WiMAX receiver and an encryption code to access the base station. VPN Technology Virtual Private Networks is another public WAN technology and is used to address security concerns when risks are incurred when a user works remotely by using a broadband service to access the enterprise WAN over the Internet. A VPN is an encrypted virtual connection between private networks over a public network and uses a VPN tunnel which is routed through the Internet from the private network of the organization to the remote site or end device. VPNs have multiple benefits such as cost saving, security, scalability, and compatibility with broadband technology. VPNs are cost saving due to it enabling companies to use the Internet to connect remote sites, and to connect remote users to the main enterprise site without using dedicated WAN links. VPNs use advanced encryption and authentication protocols which protect data from unauthorized access and is scalable due to it using the Internet infrastructure which means it is easy to add additional users. There are two types of VPN access, Site-to-site VPNs and Remote-access VPNs, these will be explained in the task below. Analyzed above are the benefits and drawbacks of private and public WAN technologies; multiple WAN technologies can be configured and implemented together in an enterprise network and these helps to build a network to meet the needs and requirements that is given when designing any given network. Some of these WAN technologies are necessary when implementing an enterprise WAN network, however only the requirements can state which of these technologies will need to be configured. VPNs As mentioned in the above task, there are two types of VPNs that can be used depending on an organization’s needs. A WAN is a connection of multiple remote LANs using someone else’s, usually a service provider’s network and a router. The difference between a WAN and a VPN is that a local host and router will view these networks as remote networks, however a VPN includes the local host within the remote network by using the WAN link that connects the end user to the remote LAN, meaning that RAGHUNANDAN CHAUDHARY 33 HND / THIRD SEMESTER Transport Network Design the end device acts as though its local on the remote network. Remote Access Remote Access is the first type of VPN and is also known as a Client-to-Site VPN. This VPN allows remote users to securely access the enterprise network remotely. Each host on the network has a VPN client software loaded onto them or will use a web-based client. A Network Access Server (NAS) is required as this is the device that the user will connect to from the Internet in order to use the VPN that the organization has installed. This NAS requires valid credentials inputted by the user to sign in to the VPN. Before it creates a connection, the NAS will use its own authentication process or a separate authentication server that is on the network. This VPN tends to have a timer which disconnects the session after a period of time which is a security precaution; the user will need to re-establish the connection with the VPN to be able to access the organization’s network again. Site-to-Site Site-to-Site is the second type of VPN that can be used and is also called intranet VPN. This VPN allows an organization to connect remote sites to the enterprise backbone securely over a public medium rather than using WAN connections such as frame relay; each site has a VPN gateway, for example a router, firewall etc. A site-to-site VPN uses encryption, thus when traffic is sent through the VPN tunnel, it is hashed as it is sent and will be decrypted once it gets to its destination. All traffic that is sent through the tunnel must have a digital signature authentication; to get the authentication, a public key infrastructure (pki) must be implemented and the receiver will need the private key to decrypt it. It has a “lifetime” configured which is how long the tunnel is alive for, this secures the traffic from hackers and malicious content. Both of these VPNs improve security within a network and when connected to a WAN, across a network. VPNs are cost effective as once it is set up, it simply needs to be maintained and is simple for a user to understand. They are also scalable as it is very easy to add additional users to the site or to download software onto an additional device. The main disadvantage of VPNs if that the organization does not know where their packets are being sent, although this can be an advantage to stop hackers, if the VPN is hacked, the hacker can send the traffic elsewhere and gain access to the information being sent. Overall, out of these two VPNs, the best one to implement in the network above to meet organizational needs would be the remote access vpn due to there being a small number of RAGHUNANDAN CHAUDHARY 34 HND / THIRD SEMESTER Transport Network Design users on the network. If the network were to be a large enterprise network, then the site-tosite VPN would have been the appropriate VPN. Deploying network monitoring tools and troubleshooting documentation Te Expected Actual Evidence st Result Result I expect to see all of the connections from R1, R2 and R3 to be active, and the cables to be connected as specified in the addressing table. Using the To fix this, I went into each interface across all routers command and used the command “no shut” to activate all the “show ip int interfaces; this is shown in Figure 7. no. 1. brief” within all routers, it showed that all the interfaces except g0/1 on R2 were disabled. Figure 7: Repair inactive interfaces The commands that were used across all routers are the following: R1#sh ip int brief R1(config)#int g0/1 R1(config-if)# no shut R1(config-if)# int s0/0/0 RAGHUNANDAN CHAUDHARY 35 HND / THIRD SEMESTER Transport Network Design R1(config-if)# no shut R1(config-if)# int s0/0/1 R1(config-if)# no shut R2#sh ip int brief R2(config)# int s0/0/0 R2(config-if)# no shut R2(config-if)# int s0/0/1 R2(config-if)# no shut R3#sh ip int brief R3(config)# int g0/1 R3(config-if)# no shut R3(config-if)# int s0/0/0 R3(config-if)# no shut R3(config-if)# int s0/0/1 R3(config-if)# no shut 2. I expect to To show the To fix this, I went into int s0/0/1 as this was the interface see the clock rate, the that had the wrong configuration and as shown below in clock rates command Figure 8, I configured it to have the same clock rate as the on all the “show other two DCE interfaces. DCE controllerss0/ interfaces 0/1” was to be inputted. The configured output of the at “64000”. command is shown in RAGHUNANDAN CHAUDHARY 36 HND / THIRD SEMESTER Transport Network Design FIG – Examine DCE Requirement The commands that were used across all routers are the following: R1#sh controllers s0/0/0 R2#sh controllers s0/0/1 R2(config)# int s0/0/1 R2(config-if)# clock rate 64000 R3#sh controllers s0/0/0 3. All serial To interfaces should be configured view whether the configured with the wrong configuration type and entered expected result “encapsulation ppp”, this made the encapsulation type was to use the case, the PPP as the encapsulat To fix this issue, I entered the interfaces that were ppp. Shown in Figure 10 is the change of encapsulation type once the above command was inputted. command “sh int ion type. s0/0/0” was RAGHUNANDAN CHAUDHARY 37 HND / THIRD SEMESTER Transport Network Design inputted. As shown in Figure 9, the output of this command showed the interfaces to have HSRP as the encapsulation type. FIG – Examine Encapsulation type FIG – Encapsulation Type Fix The commands that were used across all routers are the following: R1#show int s0/0/0 R1(config)# int s0/0/0 R1(config-if)# encapsulation ppp R2#show int s0/0/1 R2(config)# int s0/0/1 R2(config-if)# encapsulation ppp R3#show int s0/0/0 RAGHUNANDAN CHAUDHARY 38 HND / THIRD SEMESTER Transport Network Design R3(config)# int s0/0/0 R3(config-if)# encapsulation ppp 4. Examine and set CHAP usernames and passwords – I expect to see each router to be configured with the correct CHAP usernames and passwords. As PPP As shown in Figure 11, when the debug command was wasn’t used, it showed that the interfaces on which PPP was working, meant to be configured were closed/misconfigured. I Used the “debug ppp authenticat ion” command and “sh run” to view the usernames and passwords that were configured. These commands showed that some of the usernames and passwords across the routers were wrong. FIG – Debugging PPP FIG – Misaligned Configuration FIG – Aligned Configuration The commands that were used across all routers are the following: R1#debug ppp authentication R1(config)# username R3 password cisco R1(config)# int s0/0/0 R1(config-if)# ppp authentication chap R1(config-if)# int s0/0/1 R1(config-if)# ppp authentication chap RAGHUNANDAN CHAUDHARY 39 HND / THIRD SEMESTER Transport Network Design R2#debug ppp authentication R2(config)# username R1 password cisco R2(config)# no username R11 R2(config)# int s0/0/1 R2(config-if)# ppp authentication chap R3#debug ppp authentication R3(config)# username R2 password cisco R3(config)# int s0/0/0 R3(config-if)# ppp authentication chap R3(config-if)# int s0/0/1 R3(config-if)# ppp authentication chap 5 Verify IP To view the IP Shown in Figure 14 is the addressing table on R2. This . addressing addresses showed that whilst the serial interfaces were configured - I expect configured correctly, the gigabitEthernet interface was not. To correct the IP on the addressing devices, I used to match to the the IP command addressing table above. “sh ip int brief”. This showed that across the routers, some were misconfigured . this, I used the commands below: R2(config)# int g0/1 R2(config-if)# ip add 209.165.200.161 255.255.255.224 FIG – IP addressing The commands that were used across all routers are the following: R1#sh ip int brief RAGHUNANDAN CHAUDHARY 40 HND / THIRD SEMESTER Transport Network Design R1(config)# int g0/0 R1(config-if)# no ip add R1(config-if)# int g0/1 R1(config-if)# ip add 10.0.0.1 255.255.255.128 R1(config-if)# int s0/0/0 R1(config-if)# ip add 172.16.0.1 255.255.255.252 R2#sh ip int brief R2(config)# int g0/1 R2(config-if)# ip add 209.165.200.161 255.255.255.224 R3#sh ip int brief R3(config)# int g0/1 R3(config-if)# ip add 10.0.0.129 255.255.255.128 R3(config-if)# int s0/0/1 6 Verify full When the R3(config-if)# ip add 172.16.0.6 255.255.255.252 As shown below in Figure 15, pinging was successful to . connectivit commands each device. The PCs were able to ping the webserver and y – I expect to be successful in being able to traceroute a path from “ping” and the webserver was able to ping the PCs. “tracert” were used, they were successful in reaching the FIG – Ping Connectivity webserver. PC1 and PC3 to the webserver. RAGHUNANDAN CHAUDHARY 41 HND / THIRD SEMESTER Transport Network Design FIG – PC1 Ping connectivity FIG – PC2 ping connectivity Troubleshooting Methods: There are many different troubleshooting methods that can be used and implemented in a network to solve enterprise-wide networking issues. This report will evaluate a number of troubleshooting methods and their effectiveness in a network; as shown previously, a syslog server and a Network Time Protocol (NTP) server were configured in the network prototype. Syslog Server Syslog is a logging tool which sends log events from all devices that it is configured on to the server that it is set up on. Syslog messages are sent over UDP and the IP transport mechanism is defined rather than the syslog content. It is down to the application to develop informative logs for the receiver. The message that is captured will contain a severity level and a facility; the facility is the type of message that is being sent e.g. any, authorization, fire etc. and the severity shows the important of the message e.g. emergency to debug, this level can be defined by the administrator. Syslog helps to reduce the downtime of the network as it logs the messages and lets the administrator know what events are occurring on the network, which can mitigate against a loss of connection. These logs are also a form of alert system due to the severity level that is sent with the messages, and this alerts the administrator to if the network needs to be troubleshoot, or whether an unauthorized user is attempting to access the network. RAGHUNANDAN CHAUDHARY 42 HND / THIRD SEMESTER Transport Network Design NTP Server When logs are being examined, it is essential to the network administrator that the correct date and time are recorded for each event that is held in the syslog server. Although the time and date can be set manually across all devices, it is easier to have an NTP source on a server which synchronizes the time across all devices to be the same. Using NTP also helps to ensure that the clock speed is the same, and it doesn’t drift. NTP was established for clock synchronization, which also helps to synchronize the time across the whole of the network. SMP Simple Network Management Protocol (SNMP) is used to receive information for the agent on the network. The administrator can poll the switch which will return with a response on its health information e.g. memory utilization, link status, firewall filter statistics etc. The switch is also capable of undergoing a process called trap whereby it sends event information to the network manager without the manager polling the switch. To communicate this information, a Management Information Base (MIB) is used; a MIB has a tree structure which defines groups of objects into related sets. MIBs are identified by Object Identifiers (OID) and these name the objects. Once configured, SNMP GETs can be received on given interfaces. Vendors recommend restricting access to specific interfaces and clients e.g. management network. OSI model Although not an official troubleshooting method, the OSI model is a seven-layer model which administrators use to troubleshoot their network if an issue arises and helps to describe how network applications on different hosts can communicate across the network. Layer 1 Layer 1 of the OSI model is the physical layer. This layer defines how bits move from one device to another and also deals with the physical characteristics of the transmission medium. Protocols that are used at this layer are Ethernet. RAGHUNANDAN CHAUDHARY 43 HND / THIRD SEMESTER Transport Network Design Layer 2 This layer is also known as the Data Link layer and combines packets into bytes and bytes into frames of which holds a source and destination MAC address. There are two sublayers within this layer: logical link control (LLC) which is used for error detection and media access control (MAC) which is used for hardware addressing and controlling the access method. Protocols that are used at this layer are PPP, HDLC and Ethernet. (Tanenbaum, 2010, p.41-48) Layer 3 Layer 3 is also the network layer and provides logical addressing which is used by routers to determine the path a packet will take; the logical addressing is also used to identify a device on the network. Protocols that are used at this layer are IP and ICMP. Layer 4 Otherwise known as the transport layer, it provides a reliable (TCP) or unreliable (UDP) delivery and error recovery. Protocols that are used at this layer are TCP and UDP. Layer 5 Layer 5 is known as the session layer and this determines how to establish, control and terminate a session between two devices. Protocols that are used at this layer are SSL. Layer 6 Also known as the presentation layer, this layer defines data formats and undertakes processes e.g. compressions and encryption. Protocols that are used at this layer are MIME. Layer 7 Layer 7 is known as the application layer and provides a user interface and enables network applications to communicate with other network applications. Protocols that are used at this layer are HTTP, Telnet, FTP etc. To troubleshoot using the OSI model, the recommended approach in the bottom-up approach. This approach starts from layer 1 and will move up the layers until the issue is found. Evaluated above are a number of troubleshooting methods and their effectiveness in solving enterprise wide networking issues without these methods being implemented a network RAGHUNANDAN CHAUDHARY 44 HND / THIRD SEMESTER Transport Network Design administrator will not know what is happening in the background of the network; the logs created by syslog are beneficial in seeing different events, NTP synchronizes not only time across the network, but will update the logs in the syslog server with the correct time that the event took place. Conclusion: To conclude this part, we firstly, presented the appropriated WAN solution by examining WAN technologies and also, analyzed the benefits of public and private WAN technologies. And, the VPN types are evaluated such as IPsec and SSL based on organizational needs. And, the network monitoring tools are evaluated along with the troubleshooting methods to create the network baselines. With that, the troubleshooting method is also evaluated for their effectiveness in solving enterprise-wide networking issues which gives that all the methods are useful and are good when used together. References Academy., C. Available at: N., 2014. cisco press. [Online] https://www.ciscopress.com/articles/article.asp?p=2202411&seqNum=7 [Accessed 10 December 2019]. Academy, C., Available at: 2019. Ciscopress.com. [Online] http://www.ciscopress.com/articles/article.asp?p=2832407&seqNum=5 [Accessed 13 December 2019]. Academy, C., Available at: 2019. Ciscopress.com.. [Online] http://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4 [Accessed 10 December 2019]. Academy, C. Available at: N., 2017. ciscopress. [Online] https://www.ciscopress.com/articles/article.asp?p=2832405&seqNum=5 [Accessed 10 December 2019]. RAGHUNANDAN CHAUDHARY 45 HND / THIRD SEMESTER Transport Network Design Academy, C. Available at: N., 2017. Ciscopress. [Online] https://www.ciscopress.com/articles/article.asp?p=2832407&seqNum=5 [Accessed 10 December 2019]. Anon., 2019. Available at: cisco.com. [Online] https://www.cisco.com/c/en/us/support/switches/catalyst-2960- 24ttlswitch/model.html [Accessed 11 December 2019]. Anon., 2019. PTGMedia. [Online] Available at: http://ptgmedia.pearsoncmg.com/images/9781587133282/downloads/9781587133 282%20_chapter_ [Accessed 20 February 2019]. Cisco1, 2019. Cisco. [Online] Available at: https://www.cisco.com/c/en/us/products/collateral/routers/4000seriesintegratedservices-routers-isr/data_sheet-c78-732542.html#ProductSpecifications [Accessed 15 February 2019]. Cisco2, 2019. Available Cisco. [Online] at: https://www.cisco.com/c/en/us/products/collateral/security/asafirepowerservices/datas heet-c78-742475.html [Accessed 12 February 2019]. Das, Available R., 2019. INFOSEC. [Online] at: https://resources.infosecinstitute.com/category/certificationstraining/securityplus/secdomains/technologies-and-tools-in-security/installingand-configuringnetwork-components-tosupport-organizationalsecurity/technologies-and-tools-vpn-concentrators/# [Accessed 11 February 2019]. Ikechukwu, U. I., 2017. Network Models and Design. Modelling the Design of Computer Networks for Effective Management, 20 Janaury, p. 7. RAGHUNANDAN CHAUDHARY 46 HND / THIRD SEMESTER Transport Network Design Lamle, T., 2013. CCNA Routing and Switching Study Guide. 6th ed. CA: Sybex Inc. Murat Kayri, I. K., 2010. A PROPOSED “OSI BASED” NETWORK. International Journal of NextGeneration Networks (IJNGN) , 2(3), p. 7. Papić, S., 2016. Achieving Optimal Redundancy in a Small Business Network, Croatia: University College Algebra, Zagreb. Ranjbar, A., 2010. Available ciscopress.com. [Online] at: https://www.ciscopress.com/articles/article.asp?p=1578504 [Accessed 16 December 2019]. RIvard, E., Available 2011. pearsonceritification.com. [Online] at: https://www.pearsonitcertification.com/articles/article.aspx?p=1730891 [Accessed 05 March 2020]. T., l., 2018. CompTIA Network+ study guide exam N10-007. 4th ed ed. CA: Sybex, . Yusuff, A., 2012. NETWORK MONITORING: Using Nagios as an Example. [Online] Available at: https://www.theseus.fi/bitstream/handle/10024/48457/Yusuff_Afeez.pdf?sequence =1&isAllowed=y [Accessed 19 March 2020]. RAGHUNANDAN CHAUDHARY 47 HND / THIRD SEMESTER Transport Network Design RAGHUNANDAN CHAUDHARY 48 HND / THIRD SEMESTER