STUDENT GUIDE
ICTNWK517
Determine Best-Fit Topology for a Wide
Area Network
.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 2 of 20
This STUDENT GUIDE, its contents and layouts, and any inclusions are
the property of MILCOM Institute, and no part may not be reproduced in
any form without prior written permission of MILCOM Institute
Apart from any use permitted under the Copyright Act 1985.
The information contained in this binder and materials handed out
during the course are designed to be used for educational purposes only.
Some diagrams, pictures and information included in this reference are with
compliments from Wikipedia and other communications industry websites.
MILCOM Institute cannot be held accountable for the content
accuracy or technical correctness of these materials.
Trademarks: Brand and product names are either trademarks or
registered trademarks of their respective holders and are
used for identification purposes only.
ICTNWK517 Determine best-fit topology for a wide area network
This STUDENT GUIDE is the support resource for the
© MILCOM Communications Pty Ltd RTO 6859
Trading as MILCOM Institute
W: http://www.milcom.edu.au
E: [email protected]
P: 1300 369 320
Revision Control
V 1.0 | May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 3 of 20
Table of Contents
TABLE OF CONTENTS ………………………………………………………………………………………………..3
OVERVIEW ………………………………………………………………………………………………………………..4
LEARNING OUTCOMES ………………………………………………………………………………………………7
TOPIC 1: IDENTIFYING WAN NEEDS ……………………………………………………………………………8
TOPIC 2: CREATING WAN SPECIFICATION …………………………………………………………………13
REVIEW AND ASSESSMENT……………………………………………………………………………………….20
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 4 of 20
Overview
Introduction
The Student Guide should be used in conjunction with the recommended reading and any
further course notes or activities given by the trainer/assessor.

Topics Content
Topic 1: Identify WAN needs  Identification of segments of proposed
WAN
 Functional analysis of segments
 Traffic content and volumes
 WAN functional matrix
Topic 2: Create WAN specification  Business needs
 Budget constraints
 Resource requirements
 Physical environment affecting design
 WAN connectivity
 Documenting WAN service
Unit review and Assessment Tasks
AssignmentTutorOnline

Recommended text
The following text is recommended for this unit:
Cole, K. Management Theory and Practice. 7ed. Cengage Learning (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers)
Chapters 6 Building a strong communication foundation.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 5 of 20
Content
The Student Guide includes:
 Topics for the unit
 Activities
 Links to websites containing relevant information
 (if the links are broken, copy and paste into a web browser).
Activities:
The trainer/assessor will provide a simulated work environment therefore, the activities
provided in the Student Guide:
 Reflect real life work tasks.
 Are performed to industry safety requirements as relevant.
 Use authentic workplace documentation.
 Require you to work with others as part of a team.
 Require you to plan and prioritise competing work tasks.
 Involve the use of standard, workplace equipment such as computers and software.
 Take into consideration workplace constraints such as time and budgets.
 Activities will either be self-directed or carried out as part of group or team work.
 Read through the activity carefully and ask the trainer/assessor for guidance if
required.
 Time will be allocated for completing the activity, along with class discussion and
feedback.
 Some activities may require you to submit work to the trainer/assessor for feedback.
Where this is the case, it will be indicated at the bottom of the activity.
Video clips:
 If presented in class, take part in any class discussions, providing feedback and
contributing to debate and arguments.
 If directed to watch the video in self-study, or independently in class, then take notes
so that contributions to any future class discussions can be made.
Roleplays:
The trainer/assessor will direct class roleplays.
When undertaking these activities ensure that you understand the purpose of the roleplay
and take part as if you are in a professional situation to provide your fellow classmates with
a true-to-life experience. Roleplays rely on your ability to act in a manner which imitates real
life situations and can provide you with depth of understanding and practical skills.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 6 of 20
Homework/Self-study
At the end of each session the trainer/assessor will direct you to complete any activities,
questions or reading from the day’s session as homework.
Further to this, time should be spent in self-study reading topic notes, independent
research, completing project work or watching webinars/video clips that relate to an area
being covered.
Any work that you submit should be:
 Professionally typed and presented, using headings, consistent style and layout.
 Your own work and not copy and pasted information from the internet.
 If you are using information researched, reference and source the material or link.
 Submit your work to the trainer/assessor within the timeframe allocated.
Folder management and naming documents
As a guide, keep all work for this unit in a folder that has the unit code as its name, along
with the name of the student. Any activities and assessment tasks should then be saved to
this folder.
Save documents logically within the folder structure, include:
 Unit code
 Task number
 Task name
 Your last name (optional)
 The date or version number (optional)
Back up
Always have a backup of work on a different device. If the college has a student network
drive this would be the safest option, however, a backup to a USB or removable hard drive
should also be undertaken. If using a USB to save files, then ensure a backup is kept on a
laptop or home computer.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 7 of 20
Learning outcomes
By the end of this unit, students will be able to have the skills and knowledge required to
identify the best way computers and local area networks (LANs) can be connected to make a
wide area network (WAN).
Outcomes include:
 Identifying WAN needs
 Creating WAN specification
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 8 of 20
Topic 1: Identifying WAN Needs
Identification of segments of proposed WAN
Network topology is the layout of how a network is connected and how the different nodes
within the network communicate. How a network is connected can determine costs,
maintenance, functionality, fault detection, performance, hardware and software being
used and the utilisation of resources within the network.
Each topology has its advantages and disadvantages, and which one is used will be
dependent on factors such as location, area, cost and requirements.
A typical network topology for networks are:
Local Area Networks (LANs) Bus, Star, Mesh, Ring, Hybrid
The star and extend star (tree topology) are the most popular topologies for Ethernet
networks.
Wider Area Networks (WANs) relate to the interconnection of networks over geographical
areas.
The type of topology chosen for a WAN will be dependent on the number of sites that must
be connected, the distance between then and existing infrastructure.
Different topologies include Peer-to-Peer, Ring, Star, Mesh or Tiered.
Class activity: Draw a WAN topology for each of the topologies Mesh, Ring, Star.
Virtual Private Networks (VPNs) have multiple remote peers transmitting private data
securely to one another over an unsecured network. There are three common categories of
VPN topologies:
 Hub and spoke, partial or full mesh, hybrid
 Extranet topologies
 Special purpose topologies

Activity: Further reading
Site-to-Site VPN topologies http://docs.trendmicro.com/en-us/smb/cloud-edge-cloud
console-52/gateways/site-to-site-vpn/site-to-site-vpn-top.aspx
Draw a diagram of each of the topologies for a VPN.
Virtual Local Area Networks (VLANs) are based on logical connections rather than the usual
physical ones. Before a LAN can be divided into VLANS, switches are needed to support the
technology.
Article: https://docs.oracle.com/cd/E19120-01/open.solaris/819-6990/fumvy/index.html
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 9 of 20

Activity: Video
Virtual LANS (VLANs) https://www.youtube.com/watch?v=dpoUjnfGbeo (04:33)
Take notes and summarise what you have watched with the key takeaways.
A Wireless Local Area Network (WLAN) links two or more devices using wireless
communication rather than physical to form the local area network. A gateway can be used
to provide a connection to the wider area network. N The types of WLAN topologies include:
 Independent basic service sets
 Basic service sets
 Extended service sets
Article: Wireless LAN site topologies
http://wirelesslansite.blogspot.com/2009/07/wlan-topologies.html
The considerations of choosing any topology will include:
 The type of connection requirements
 Budget
 The amount and type of cable needed
 Future expansion and growth
Example network diagram of a university campus: https://its.umich.edu/enterprise/wifinetworks/campus-network-diagram-description
As an example, Cisco have a number of support pages which outline configurations for
connecting LAN, WLAN, VPN and WAN networks:
Setting up a basic wireless LAN connection – Configuration example
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/68005-
wlan-connect.html
Configuring WAN settings for internet connections
https://www.cisco.com/assets/sol/sb/isa500_emulator/help/guide/ad1992792.html
Connecting Remote offices by setting up VPN tunnels
https://www.cisco.com/c/dam/en/us/td/docs/routers/csbr/app_notes/rv0xx_g2gvpn_an_O
L-26286.pdf
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 10 of 20
Functional analysis of segments
Network segmentation divides a network into multiple smaller networks (subnet) where the
flow of traffic can be controlled, allowing or disallowing or blocking traffic based on specific
factors.
Segmentation can:
 Boost the network performance by containing certain traffic to portions of the
network
 Localise technical issues
 Support the prevention of unauthorised attacks
 Increase the ability to monitor network traffic
 It can be logical or physical
 Increase security
Networks are segmented by bridges, routers, switches, repeaters, hubs:
http://netcert.tripod.com/ccna/internetworking/lanseg.html
With VLAN, network segmentation creates a collection of isolated networks within the
organisation.
Typically, networks are segmented based on business functions. For example, the data held
on the payroll and personnel networks are not accessible to all employees.
The security benefits of network segmentation:
https://www.sagedatasecurity.com/blog/the-security-benefits-of-network-segmentation
Further reading: https://www.forescout.com/company/blog/network-segmentation/
Segmenting the network
It is important that the business goals of an organisation align with how segmentation of a
network is implemented as well as not to disrupt production, interrupt network functions or
incur downtime.
The segmentation of a network requires planning for firewall rule sets, routing, switching,
configurations but also to ensure that it is successfully implemented.
The business needs may require:
 A reduction in the cost of maintaining multiple networks
 Supporting business expansion
 Improving the productivity of employees by enhancing and integrating internal
communications through mobile devices, without compromising security
compliance.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 11 of 20
The different business units, therefore, will need varying functional requirements. For
example:
 A network that can support voice, data, video and wireless
 Capability to support the introduction of remote sites to the network without a
redesign.
 The ability to provide isolation between traffic of external guests and internal
employees, complying to organisational security policies for wired and wireless
connection.
Therefore, each segment will have different functional needs.
Traffic content and volumes
Estimate traffic content and volumes according to expected organisational usage, by
examining telecommunications infrastructure After the segments have been identified it can
then be determined what kind of data needs to be transferred and what the bandwidth
requirements will be. For example, audio, video, voice, images, text.
Traffic content and volume will be the amount of bandwidth required and the resource
requirements for each application.
This is usually represented in a table, showing required connections, number of segments,
the node downloads and upload speeds, the major data type and activity levels for node
upload and downloads. Also outlined would be the application requirements for software
and operating systems in use.
The telecommunications infrastructure will include the physical and logical requirements
such as:
 ADSL
 ISDN
 Leased lines
 Switched circuits and switched virtual circuits
 SDSL
 Carriers and optical network technologies
Network traffic generators can be used to simulate network traffic. The following website
has information and links to network traffic generators for WAN and LAN networks:
https://www.ittsystems.com/network-traffic-generator/

Activity: Reading and Practical task
Use the information and examples from the following websites to help calculate your Wi-Fi
bandwidth. Use the room and RTO network to work out what the bandwidth requirements would
be.
https://www.tanaza.com/blog/how-to-calculate-wi-fi-bandwidth-need/
https://searchnetworking.techtarget.com/tip/How-to-calculate-network-bandwidth-requirements
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 12 of 20
WAN functional matrix
An organisational WAN functional matrix is an overview of network functions, usually in a
table format. It details the various components of a network for each segment with the
associated functions. For example:

Segment Component Resource type Functionality
Level 1
Segment 2 Wireless
Router/Modem Routing and
modem device Connects all computers and
other resources in segment 2.
Also use to connect segment 2
with 1.
Level 1 Segment 2 Firewall Software Controls type of traffic between
networks
Activity: Practical task
Using the network topology diagram showing the segments of the proposed WAN provided
to you by your trainer/assessor in the previous activity, develop an organisational WAN
functional matrix which shows the components required for each segment.
Type up in a document that you can submit to your trainer/assessor for feedback.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 13 of 20
Topic 2: Creating WAN specification
Content:
 Business needs
 Resource requirements
 Physical environment affecting design
 WAN connectivity
 Documenting WAN service
 Budget constraints
Business needs
The business needs of an organisation should be aligned with the IT strategy for the
implementation of a network. This will take into consideration:
 Constraints and costs such as hardware, software, cabling, components, training,
support and maintenance.
 Expansion and growth projections
 The speed, performance and connectivity needs of the business
 Security of data and information
 Users of the network
 Scope of the operation
 Continuity needs
Article: Business requirements analysis
https://www.mindtools.com/pages/article/newPPM_77.htm
Article: IT Strategy
https://cio-wiki.org/wiki/IT_Strategy_(Information_Technology_Strategy)
The business needs should drive the IT strategy. A number of projects fail because these
have not been addressed at the beginning.
Article: The top 9 reasons for IT project failures: Is your project at risk?
https://www.askspoke.com/blog/it/reasons-for-it-project-failure/
Resource requirements
The resource requirements will be dependent on the functions required of the network such
as:
 The average transaction and file transfer size
 Nature of WAN traffic (constant, steady, flows or communication in bursts)
 Number of users on the network
 Telecommunications links
 Type of applications using the link.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 14 of 20
The traffic characteristics determined will also determine the WAN requirements.
To have the most optimised network, the hardware and software must match the needs of
the business functions as well as the topology.
For example, the hardware minimum requirements for a point-to-point would require
different hardware for a full mesh deployment. Hardware requirements can include: RAM,
Storage/disk space, CPU, Network interface cards.
Further resource requirements will depend upon:
 Applications being used
 Environment
 Coverage
 End users
 Devices
 The existing infrastructure
 Security needs
 Budgets
 Deadlines or schedules.
A hospital for example would require different resources for a LAN than a small firm of
estate agents.
Class discussion:
What are the current resource requirements for the RTO?
Create a table that includes both hardware and software requirements for at least one
segment. Your trainer/assessor will facilitate a class discussion and provide you with any
information about the current infrastructure.
Physical environment affecting design
When planning the design of a WAN, there are a number of physical environmental factors
that will determine how it will be implemented. Consider a university campus, there are
usually several buildings over a geographical distance requiring connectivity.
The physical location of the network nodes, the distance, media used will all influence the
network topology. Nodes can be end user workstations or servers which are located in one
or multiple buildings. The design of the network will be based on the location of the nodes
and the distance between them.
Therefore, the physical environment affecting the network design can include:
 The area or physical space where the network will be installed ie how big or small
the area is.
 The way in which an existing system is already connected.
 Scalability or expansion of the existing network.
 The type and amount of cabling
 Security
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 15 of 20
An organisation will need to select the solution that best fits the requirements, using the
available technologies that matches the need.
A network plan shows the topology of the network, which should be linked to a network
equipment location diagram and a cabling diagram. It provides a clear illustration of the
physical set up and can identify any issues or impacts that may affect the design.
Article: Network planning and implementation:
https://hubpages.com/technology/Network-Planning-and-Implementation
WAN connectivity
Choosing a WAN service can be influenced by a number of factors such as the purpose of
the WAN, the geographical set up, the traffic requirements and service provider options
available.
The purpose of the WAN can include considerations such as:
– If the WAN is being used for connecting internal staff, external businesses, clients
or all three
– The type of authorised access required for users
– If connection is required over a small area, remotely or a number of areas
The geographic set up will identify if the WAN is set up locally, regionally or globally and if it
is to one branch or to many in a distributed manner.
Traffic requirements will include the type of data to be supported, for example large files,
streaming videos, VOIP; the volume of traffic, the quality of service and security
requirements such as data integrity or confidentiality.
Selecting the connection options will also be required, such as:
 Using a private or public infrastructure
 A dedicated or switched private WAN
 The type of VPN access required for a public WAN
 The connection options available for the area
 The cost and ongoing expense.
Class discussion: Consider the RTO and the WAN service being used. How would this differ
to the RTO if it was based in a small country town out west, such as Dalby in Queensland?
It is important to keep back-ups in case there are any disruptions in the WAN connection,
along with redundant links in case of failure.
A mitigation plan, disaster recovery plan, continuity plan or risk management plan can
provide an organisation with procedures to cope with any issues with downtime that can
occur from failure in WAN connectivity.
Article: WAN requirements for successful disaster recovery
http://www.continuitycentral.com/feature0403.htm
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected] Student Guide for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed | Not controlled when downloaded | Page 16 of a total of 20 pages
A wide area network that uses SD-WAN (software-defined networking) removes the networking hardware from the control mechanism, which makes the management and operation of the WAN much more straightforward. It allows for several LAN connections to be established in order to improve the overall quality of service.
The use of several data lines for WAN redundancy improves the overall performance of a network and allows for business continuity to be maintained. Network redundancy refers to the installation of alternate network devices, equipment, and communication mediums on a network, which are not used unless there is a path failure or the network is unavailable for some reason.
In addition to dedicated circuit switched connections (leased lines), other types of WAN connections include On-demand circuit switched connections, Packet-switched virtual circuits, and Broadband. Network failures can have significant ramifications for enterprises that rely on continuous connectivity and uptime with high availability to function properly. Businesses can improve network performance while still maintaining the ability to carry on with operations in the event of a WAN outage by utilizing multiple data connections.
It is possible to establish and maintain communication without interruptions by using numerous data lines, which can be an effective solution.
This article: WAN ideas (Selecting WAN technology) can be found at http://www.ciscopress.com/articles/article.asp?p=2832405&seqNum=5 on the Cisco Press website.
Concepts Modems are devices that connect to an Internet Service Provider and allow users to access the internet. It is necessary to configure routers in order to make the connection. While a modem links you to the internet, a router connects you to Wi-Fi, which is where the name comes from.
Modems come in a variety of shapes and sizes, including:

DSL stands for digital subscriber line.

ISDN stands for Integrated Services Digital Network (Cable and Integrated Services Digital Network).

An analogy would be: (used for dialup connections)

Additional reading and a video are recommended.

More reading material can be found at:

Backups, archives, and disaster recovery across the wide area network

https://searchstorage.techtarget.com/tutorial/WAN-backups-archives-and-disaster

recovery

Successful disaster recovery necessitates the use of wide area networks.
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 16 of 20
SD-WAN (software-defined networking in a wide area network) separates the networking
hardware from its control mechanism which simplifies the management and operation of
WAN. It enables multiple LAN links in order to enable the quality of service
Multiple data lines for WAN redundancy increases the performance of a network and
enables business continuity. Network redundancy is where alternative network devices,
equipment and communication medium are installed on a network but not used unless
there is path failure or unavailability of the network.
A WAN connection can be a dedicated circuit switched connection (leased line), On-demand
circuit switched connection, Packet-switched virtual circuit, and Broadband. Network
outages can have major implications to businesses that require continuous connection and
uptime with high availability. By using multiple data lines a business can have better
network performance but also be able to continue with operations if there is a WAN failure.
Having multiple data lines can be an effective solution to connect and maintain connectivity
without disruptions.
Article: WAN concepts (Selecting WAN technology)
http://www.ciscopress.com/articles/article.asp?p=2832405&seqNum=5
Concepts
 Modems
Used to connect to an Internet Service Provider and provide internet access. Routers need
to be configured for the connection. Whilst a modem connects to the internet, a router
connects devices to Wi-Fi.
Types of modems include:

DSL: Digital subscriber line
ISDN: Cable and Integrated Services Digital Network
Analog: (used for dialup connections)
Activity: Further reading and Video
Further reading:
WAN backups, archives and disaster recovery
https://searchstorage.techtarget.com/tutorial/WAN-backups-archives-and-disaster
recovery
WAN requirements for successful disaster recovery
Videos:
SD-WAN explained (CISCO) https://www.youtube.com/watch?v=b9vxhqPAu3w (06:02)
How to create a robust disaster recovery plan (Webinar)
https://www.connectingup.org/learn/articles/how-create-robust-disaster-recovery-plan
webinar (51:57)
The trainer/assessor will facilitate a class discussion about the outcomes from the video.
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 17 of 20
Modems are needed to convert data from digital to analogue and vice versa, because a
computer uses digital data of zero’s and one’s (which are stepping, square and discrete) for
transmission, whereas telephone lines use analogue waves (which are smooth and
continuous).
Different modems have different features:
http://www.mywifispeed.com/types-and-functions-of-modems/
Router specifications:

5 important router specs, explained


IP routing: EIGRP.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-
mt/ire 15-mt-book/ire-enhanced-igrp.html
IP routing: OSPF:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/xe-16/iroxe-16-book/iro-cfg.html
Routing information protocol:
https://www.geeksforgeeks.org/routing-information-protocol-rip/
 Internet protocol (IP) addressing
IP addressing is a number assigned to each device connected to a network that uses the
Internet Protocol for communication. It has two purposes:
1. To host or network interface identification
2. Location addressing
Article: What is an IP Address?
https://blog.telegeography.com/how-do-ip-addresses-work
 Packet switching
Packet switching is a transmission process where data is broken into blocks of data for faster
transmission across network devices. When data is sent across a network, the file is broken
into packets so that it can be sent across the network in the most efficient way. The packets
are then routed by network devices to the destination.
Article: How packet switching works on computer networks
https://www.lifewire.com/packet-switching-on-computer-networks-817938
 Transmission control protocols or internet protocols (TCPS/IPS)
This is a transmission protocol used to connect network devices on the internet, specifying
how data is exchanged over the internet by providing end-to-end communication that
identifies how it should be addressed, transmitted, routed and received the other end
Asynchronous and synchronous transmission
https://www.geeksforgeeks.org/difference-between-synchronous-and-asynchronoustransmission/
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 18 of 20
 Use of microwave and satellite communication in networking
Microwaves can be used for communication purposes and is able to transmit large
quantities of data. Satellite communication relays and amplifies transmission through
satellite dishes, not using cables or telephone lines for connection.
Documenting WAN service
Documentation of a WAN service is used to record how the network is connected, who is
responsible for network connectivity, to document all the components of the network, to
provide configuration information, physical locations of connections and links, Operating
systems, nodes, servicers, routers, ports, etc.
It provides a history of what has been done for future reference and can be modified to
include any changes or updates made to the network.
For example:
Provider for WAN service

Company:
Vendor:
Link type:
Location:
SLA:
Account number: Telstra
Telstra
Ethernet
Melbourne CBD
24/7
89665488963
Technical specifications

Upload speed:
Download speed:
Router:
IP Addresses: 100 Mbps
100 Mbps
AT-78-FW34
69.102.115.34
69.102.115.35
69.102.115.36
Documentation can be a number of documents, diagrams and links such as online
documentation, network diagrams, IP tables, network diagrams, logical network diagrams,
configurations, etc. It can also include documentation from the service provider, vendors
and licencing documents.
Article: Network documentation best practices: What to create and why
https://www.auvik.com/franklymsp/blog/network-documentation-best-practices/
The following is documentation for Azure Virtual WAN as an example of vendor
documentation:
https://docs.microsoft.com/en-us/azure/virtual-wan/
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 19 of 20

Activity: Review
There are a number of software applications that can be used for drawing network diagrams
and maps. Review the following, using the free trial or refer to your RTO for the software
being used for this unit.
Lucid chart have a free sign up for creating network diagrams, along with templates for data
flow diagrams, concept maps and flow charts:
https://www.lucidchart.com/pages/templates/network-diagram/wan-network-diagram
template
Concept Draw has a video and free trial for drawing network diagrams:
https://www.conceptdraw.com/examples/wan-diagram
Microsoft Visio is another diagram application that can be used for drawing network maps
and diagrams:
https://products.office.com/en-au/visio/flowchart-software
Budget constraints
Resources required for creating the network based on business needs will identify any
constraints and form the budget. For example, the number of servers, workstations, cables,
modems, switches, routers and other devices and software needed, along with
implementation, training and maintenance. The constraints on a budget will affect the
amount of hardware and software that can be purchased and deployed.
It can constrain:
 Hardware and software purchasing
 The type of topology used
 Connection types
 Cables, connectors and media converters
 Network devices
 SLA
 Uptime
 Security
Telecommunication links
© MILCOM Communications Pty Ltd trading as MILCOM Institute | RTO No. 6859 | CRICOS Provider Code:03491G
Head Office: Unit 12/1866 Princes Highway Clayton VIC 3168 | Phone: 1300 369 320 | Email: [email protected]
STUDENT GUIDE for ICTNWK517| v 1.0 | Last reviewed: May 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers | Not controlled when printed |Page 20 of 20
Review and Assessment
The content of this unit has now been covered.
Review and completion
Ensure any outstanding activities, reading, role-plays, meetings, presentations or further
tasks that require observation or submission to the trainer/assessor has been completed.
Assessment Tasks
The trainer/assessor will discuss each task in detail – please ensure the assessment
procedures, submission instructions and deadlines are clear, and you understand any
expectations.
Support
The trainer/assessor will provide support when required. If any reasonable adjustment is
required, please speak with the trainer/assessor or college support services.

Published by
Research Helper
View all posts