Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Outline the importance of network planning
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Outline the importance of network planning
Logical vs. Physical Network Design
The typical Top-Down approach to network design uses a systematic method to plan, design, and implement a new network. Generally, the Top-Down methodology involves analysis of the business requirements and goals, development of the logical design based on such goals, development of the physical design, and a phase for testing, optimizing, and documenting the network design. This paper focuses on the activities performed to create a logical design of a network and then goes on to explain how the physical design is created.
Logical Network Design
It is difficult to discuss the principles of the logical design without first discussing the importance of planning and analysis. After all, the goal of initial network planning is to ascertain enough information to create the logical network design proposal. Logical design begins by determining the need of the users. How does the business use a network to share information? What services does the network need to provide? What resources are needed? What are the requirements for network protocols, applications, performance, and security? These are the most important questions to consider in the beginning stages of design.
A network engineer must gather information such as projected traffic patterns and determine if there is a potential for bottlenecks. If this is the case, the design might require multiple communication paths to resources or the implementation of clustered servers with replicated data for load balancing. Also, the job functions of the clients must be studied. What are their jobs and work patterns and how does this affect the placement of servers, high-bandwidth links, and other physical components? Furthermore, a networ...
... middle of paper ...
...ing physical design of the same network (Figure 3).
Figure 2. Example of a logical network design diagram
Figure 3. Example physical network design diagram
References
Oppenheimer, P. (Aug. 2004). Analyzing Business Goals & Constraints of Network Design.
Retrieved May 22, 2006 from
http://www.informit.com/articles/article.asp?p=328773&rl=1
Microsoft TechNet (Jan. 2005). Medium business solution for core infrastructure. Chapter 2:
Physical Network Design. Retrieved May 22, 2006 from
http://www.microsoft.com/technet/itsolutions/smbiz/mits/ci/mit_cich2.mspx
Mueller, S. & Ogletree, T. (Nov. 2003). Network Design Strategies. Retrieved May 21, 2006
from http://www.quepublishing.com/articles/article.asp?p=101762
Wen, Y. (2001). Enterprise IP LAN/WAN Design. Retrieved May 21, 2006 from
http://best.me.berkeley.edu/~ywen/home/bp_lanwandesign_v_1.pdf
Don’t hesitate to bring in experts to make sure your network is configured properly. Correct assessment, however the lesson doesn’t factor in when to bring in an expert. Despite an over-reliance on technology, there needs to be a timeframe for this expert and how their analysis will support overall technological requirements.
The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network (WAN) and network security in place requires updated documentation. The purpose of this paper is to consolidate the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality controls are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their current network topology and a baseline to evaluate security of the network.
Security of the companies data is one of the most important components which allows the business to perform its day to day operation using various networking devices, services that absolutely needs to be protected from intruders. Some of these devices include online transactions, the exchange of data between users and clients both internal and external and external web data needs to be secured. There are several polices that would need to be configured such as a web sever and firewall configurations. However, with these configurations the first and most important task is to identify any vulnerabilities or loopholes in security within the company. The company has both LAN (Local Area Network) and WAN (Wireless Local Area Network) and a web sever. These resources need to be secured at all times from hackers or anyone else by implementing the appropriate security measures.
n.a. - n.a. - n.a. - n.a. - n.a. - A+E Networks. 2009. The 'Standard' of the 'Standard'. Web. The Web.
First, in order to decide how to formulate a plan to achieve the objective,
Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction. Such applications require mission-critical networks that accommodate voice, video, and data traffic, and these networks must be scalable to support increasing numbers of users and the need for greater
These three strategies I have discussed are based on my personal experiences and opinions. They can be very helpful to someone building a network. The process may be very long and frustrating at times, but can prove to be very rewarding.
An Open Shortest Path First (OSPF) protocol is the most used interior gateway protocol and computation intensive protocol where energy consumption in Internet Protocol (IP) networks is the main concern. The energy in an IP network can be saved by allowing a subset of IP router interfaces on sleep mode setting during the low traffic hours through the model of “move” by dint of an Energy Aware Routing (EAR) strategy, which is completely compatible with OSPF and is based on the “Shortest Path Tree (SPT) exportation” techinque or “Dijkstra's Algorithm”. In case of heavy traffic hours, the EAR strategy is not usable and may cause denial of service. The strategy implemented can help a network operator to control the network performance and allow a smoothed QoS degradation. This performance evaluation study permits to save about 30% of network links with a insignificant rise of link loads and network path lengths.
...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.
The decision tree is an effective way to make a business decision; because you can write out multiple alternatives and different options that will go along with these alternatives. To show how effective the decision tree is, this paper will demonstrate how a Network Manager at Bellsouth will handle a situation that has come about due to the Department of Transportation (DOT) needing to add a guardrail to a road in which a major cable is in the way.
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
Together with all the design and the cutoff center to an gang with a formal system for testing and need to keep on trail seen pictures of the firewall and switch . Firewalls between each one Web relation and white Earth and the zone that can be protected. Documentation must be reduce all business bunches. Unstable social occasions, ought that can be to check the ports and groups. Kept up a show of exercises and connections, and security offers that must be hurry to check firewalls and switches that can be entered.
Networks in organisation are dynamic and complex entities which can be quite challenging to configure and manage. (Kim & Feamster 2013). These corporate networks consist of multiple routers, switches, firewalls, middleboxes and a particular advantage of network management is the ability to monitor the entire business network. As all the devices are interconnected with many event occurring simultaneously, problems with once device can eventually lead and spread throughout...
A critical part of network planning involves setting up of security mechanisms. Deploying the network with security configuration provides superior visibility, continuous control and advanced threat protection across the extended network. Additionally, security procedures define policies to monitor the network for securing critical data, obtain visibility, mitigate threats, identify and correlate discrepancies.
The network management plan and security plan is important to help the company figure out how they will improve its network and security procedures for the company. Planning involves outlining objectiv...