SlideShare a Scribd company logo
1 of 27
Network Design and Administration II
RCS315
Network Design Background
• Today's IT environment continues to grow in
both design and complexity at a rapid pace.
• Your business' success hinges on a well-
designed, reliable network.
• Designing, architecting, implementing and
managing technology is what we do.
• A great network design can help an
organization grow, enhance its performance,
and provide increased security.
2RCS315
Network Design Concept
• Network design is a category of systems design that
deals with data transport mechanisms. As with other
systems' design disciplines, network design follows an
analysis stage, where requirements are generated, and
precedes implementation, where the system (or
relevant system component) is constructed.
• The objective of network design is to satisfy data
communication requirements while minimizing
expense. Requirement scope can vary widely from one
network design project to another based on
geographic particularities and the nature of the data
requiring transport.
3RCS315
Network design Principals
• Regardless of network size or requirements, a critical factor for the successful
implementation of any network design is to follow good structured engineering
principles. These principles include
– Scalability:
Scalable network designs can grow to include new user groups and remote sites and can
support new applications without impacting the level of service delivered to existing users.
– Availability:
A network designed for availability is one that delivers consistent, reliable performance, 24
hours a day, 7 days a week. In addition, the failure of a single link or piece of equipment
should not significantly impact network performance.
– Security:
Security is a feature that must be designed into the network, not added on after the network
is complete. Planning the location of security devices, filters, and firewall features is critical to
safeguarding network resources.
– Manageability:
No matter how good the initial network design is, the available network staff must be able to
manage and support the network. A network that is too complex or difficult to maintain
cannot function effectively and efficiently.
• To meet these fundamental design goals, a network must be built on a hierarchical
network architecture that allows for both flexibility and growth.
4RCS315
NERTWORK DESIGN
METHODLOGY/analysis
Step 1.
Identify the network requirements.
• The network designer works closely with the
customer to document the goals of the project.
• Goals are usually separated into two categories:
– Business goals: Focus on how the network can make
the business more successful
– Technical requirements: Focus on how the technology
is implemented within the network
5RCS315
Step 2.
Characterize the existing network.
– Information about the current network and
services is gathered and analyzed.
– It is necessary to compare the functionality of the
existing network with the defined goals of the
new project.
– The designer determines whether any existing
equipment, infrastructure, and protocols can be
reused, and what new equipment and protocols
are needed to complete the design.
6RCS315
Step 3.
Design the network topology and solutions
– A common strategy for network design is to take a
top-down approach. In this approach, the network
applications and service requirements are identified,
and then the network is designed to support them.
– When the design is complete, a prototype (a model)
or proof-of-concept test is performed. This approach
ensures that the new design functions as expected
before it is implemented.
– Here logical design is simulated to see if it gives out
the expected results.
7RCS315
NOTE: Determining the Scope of the Project
• While gathering requirements, the designer
identifies the issues that affect the entire
network and those that affect only specific
portions.
• Failure to understand the impact of a
particular requirement often causes a project
scope to expand beyond the original estimate.
• This oversight can greatly increase the cost
and time required to implement the new
design
8RCS315
Impacting the Entire Network
• Network requirements that impact the entire
network include the following:
– Adding new network applications and making major
changes to existing applications, such as database or
Domain Name System (DNS) structure changes
– Improving the efficiency of network addressing or
routing protocol changes
– Integrating new security measures
– Adding new network services, such as voice traffic,
content networking, and storage networking
– Relocating servers to a data center server farm
9RCS315
Impacting a Portion of the Network.
• Requirements that may only affect a portion
of the network include the following:
– Improving Internet connectivity and adding
bandwidth
– Updating access layer LAN cabling
– Providing redundancy for key services
– Supporting wireless access in defined areas
– Upgrading WAN bandwidth
10RCS315
HIERARCHICAL NETWORK DESIGN
• As from above, a hierarchical design is used to group
devices into multiple networks.
• The networks are organized in a layered approach thus
A hierarchical network design involves dividing the
network into discrete layers.
• Each layer, or tier, in the hierarchy provides specific
functions that define its role within the overall
network.
• This helps the network designer and architect to
optimize and select the right network hardware,
software, and features to perform specific roles for that
network layer.
11RCS315
The hierarchical design model has
three basic layers:
• Core layer:
– Connects distribution layer devices
• Distribution layer:
– Interconnects the smaller local networks
• Access layer:
– Provides connectivity for network hosts and end
device
12RCS315
Representation
RCS315 13
OR:Diagrammatically representation
14RCS315
Or: Multi Building Enterprise Network Design
RCS315 15
What Happens at the Core Layer?
• The core layer is sometimes called the network backbone.
Routers and switches at the core layer provide high-speed
connectivity.
• The core layer includes one or more links to the devices at
the enterprise edge to support Internet, virtual private
networks (VPN), extranet, and WAN access
• The core layer is responsible for transporting large amounts
of data quickly and reliably.
• The designer must ensure that the core layer is designed
with fault tolerance, especially because all users in the
network can be affected by a failure. The ability to avoid
unnecessary delays in network traffic quickly becomes a
top priority for the network designer.
16RCS315
Goals of the Core Layer
• The core layer design enables the efficient,
high-speed transfer of data between one
section of the network and another.
• The primary design goals at the core layer are
as follows:
– Provide 100% uptime.
– Maximize throughput.
– Facilitate network growth
17RCS315
Core Layer Technologies
• Technologies used at the core layer include
the following:
1. Routers or multilayer switches that combine
routing and switching in the same device
2. Redundancy and load balancing
3. High-speed and aggregate links
4. Routing protocols that scale well and converge
quickly, such as Enhanced Interior Gateway
Routing Protocol (EIGRP) and Open Shortest
Path First (OSPF) Protocol
18RCS315
Redundant Links
• Implementing redundant links at the core layer
ensures that network devices can find alternate
paths to send data in the event of a failure.
• When Layer 3 devices are placed at the core layer,
these redundant links can be used for load
balancing in addition to providing backup.
• In a flat, Layer 2 network design, Spanning Tree
Protocol (STP) disables redundant links unless a
primary link fails. This STP behavior prevents load
balancing over the redundant links
19RCS315
Mesh Topology
• Most core layers in a network are wired in either
a full-mesh or partial-mesh topology.
• A full-mesh topology is one in which every device
has a connection to every other device.
• Although full-mesh topologies provide the
benefit of a fully redundant network, they can be
difficult to wire and manage and are more costly.
• For larger installations, a modified partial-mesh
topology is used. In a partial-mesh topology, each
device is connected to at least two others,
creating sufficient redundancy without the
complexity of a full mesh
20RCS315
Network Traffic Prioritization
• Failures at the core layer can potentially affect all
users of the network. Therefore, preventing
failures becomes a daunting task.
• The network designer has to incorporate features
or additions to the design to minimize or
eliminate the effects of a core layer failure.
• The users on a network do not want to wait to
complete their daily tasks because of a lack of
care in the design.
21RCS315
Preventing Failures
• The network designer must strive to provide a network that is resistant to
failures and that can recover quickly in the event of a failure. Core routers
and switches can contain the following:
1. Dual power supplies and fans
2. A modular chassis-based design
3. Additional management modules
• Redundant components increase the cost, but they are usually well worth
the investment. Core layer devices should have hot-swappable
components whenever possible. Hot-swappable components can be
installed or removed without first having to turn off the power to the
device. Using these components reduces repair time and disruption to
network services.
• Larger enterprises often install generators and large uninterruptible power
supply (UPS) devices. These devices prevent minor power outages from
causing large-scale network failures.
22RCS315
Reducing Human Error
• Human errors contribute to network failures.
• Unfortunately, the addition of redundant links and
equipment cannot eliminate these factors.
• Many network failures are the result of poorly planned,
untested updates or additions of new equipment.
• Never make a configuration change on a production
network without first testing it in a lab environment!
• Failures at the core layer cause widespread outages. It is
critical to have written policies and procedures in place to
govern how changes are approved, tested, installed, and
documented. Plan a back-out strategy to return the
network to its previous state in case changes are not
successful
23RCS315
Network Convergence
• The choice of a routing protocol for the core
layer is determined by the size of the network
and the number of redundant links or paths
available.
• A major factor in choosing a protocol is how
quickly it recovers from a link or device failure.
24RCS315
Convergence Definition and Factors
• Network convergence occurs when all routers
have complete and accurate information about
the network. The faster the convergence time,
the quicker a network can react to a change in
topology.
• Factors that affect convergence time include the
following:
– The speed at which the routing updates reach all the
routers in the network
– The time that it takes each router to perform the
calculation to determine the best paths
25RCS315
Selecting a Routing Protocol for
Acceptable Convergence Time
• Most dynamic routing protocols offer acceptable
convergence times in small networks.
• In larger net- works, protocols such as Routing
Information Protocol Version 2 (RIPv2) may
converge too slowly to prevent disruption of
network services if a link fails.
• Generally, in a large enterprise network, EIGRP or
OSPF provide the most stable routing solution.
26RCS315
Design Considerations with
Convergence in Mind
• Most networks contain a combination of dynamic
and static routes.
• Network designers need to consider the number
of routes required to ensure that all destinations
in the network are reachable.
• Large routing tables can take significant time to
converge. The design of network addressing and
summarization strategies in all layers affects how
well the routing protocol can react to a failure
27RCS315

More Related Content

What's hot

Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Structure cabling a basic approach
Structure cabling a basic approachStructure cabling a basic approach
Structure cabling a basic approachdhaneshkhurana016
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™UzumakiMugiwara
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Top 10 Data Center Success Criteria
Top 10 Data Center Success CriteriaTop 10 Data Center Success Criteria
Top 10 Data Center Success CriteriaInternap
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification Ali Mirfallah
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
DataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure PresentationDataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure PresentationMuhammad Asad Rashid
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 

What's hot (20)

Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
WLAN
WLANWLAN
WLAN
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Structure cabling a basic approach
Structure cabling a basic approachStructure cabling a basic approach
Structure cabling a basic approach
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Top 10 Data Center Success Criteria
Top 10 Data Center Success CriteriaTop 10 Data Center Success Criteria
Top 10 Data Center Success Criteria
 
Computer networks
Computer networksComputer networks
Computer networks
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
DataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure PresentationDataCenter:: Infrastructure Presentation
DataCenter:: Infrastructure Presentation
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Network architecture
Network architectureNetwork architecture
Network architecture
 

Similar to network design and administration

Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptasaijohn
 
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...VirtualTech Japan Inc.
 
NETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptxNETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptxamanueltafese2
 
Chapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksChapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksjosepholaguer
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptxKISHOYIANKISH
 
Unit 1
Unit 1Unit 1
Unit 1sasi
 
Chapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptxChapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptxAxmedMaxamuudYoonis
 
13257474.ppt-it-networking-gdfgdfgdfgdbd
13257474.ppt-it-networking-gdfgdfgdfgdbd13257474.ppt-it-networking-gdfgdfgdfgdbd
13257474.ppt-it-networking-gdfgdfgdfgdbdssuser38ba4b
 
chapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfchapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfAxmedMaxamuud6
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxphilipnelson29183
 
computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptxssuser5cb8d3
 

Similar to network design and administration (20)

Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Week2
Week2Week2
Week2
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.ppt
 
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
 
NETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptxNETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptx
 
Vcs standard ccna 2 ch-1.1
Vcs standard ccna 2 ch-1.1Vcs standard ccna 2 ch-1.1
Vcs standard ccna 2 ch-1.1
 
Chapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksChapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworks
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Chapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptxChapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptx
 
13257474.ppt-it-networking-gdfgdfgdfgdbd
13257474.ppt-it-networking-gdfgdfgdfgdbd13257474.ppt-it-networking-gdfgdfgdfgdbd
13257474.ppt-it-networking-gdfgdfgdfgdbd
 
chapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfchapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdf
 
Vaibhav (2)
Vaibhav (2)Vaibhav (2)
Vaibhav (2)
 
ROUTE module 1
ROUTE module 1ROUTE module 1
ROUTE module 1
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
Grid computing
Grid computingGrid computing
Grid computing
 
computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptx
 
LAN-Design-Module-PPT.pptx
LAN-Design-Module-PPT.pptxLAN-Design-Module-PPT.pptx
LAN-Design-Module-PPT.pptx
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

network design and administration

  • 1. Network Design and Administration II RCS315
  • 2. Network Design Background • Today's IT environment continues to grow in both design and complexity at a rapid pace. • Your business' success hinges on a well- designed, reliable network. • Designing, architecting, implementing and managing technology is what we do. • A great network design can help an organization grow, enhance its performance, and provide increased security. 2RCS315
  • 3. Network Design Concept • Network design is a category of systems design that deals with data transport mechanisms. As with other systems' design disciplines, network design follows an analysis stage, where requirements are generated, and precedes implementation, where the system (or relevant system component) is constructed. • The objective of network design is to satisfy data communication requirements while minimizing expense. Requirement scope can vary widely from one network design project to another based on geographic particularities and the nature of the data requiring transport. 3RCS315
  • 4. Network design Principals • Regardless of network size or requirements, a critical factor for the successful implementation of any network design is to follow good structured engineering principles. These principles include – Scalability: Scalable network designs can grow to include new user groups and remote sites and can support new applications without impacting the level of service delivered to existing users. – Availability: A network designed for availability is one that delivers consistent, reliable performance, 24 hours a day, 7 days a week. In addition, the failure of a single link or piece of equipment should not significantly impact network performance. – Security: Security is a feature that must be designed into the network, not added on after the network is complete. Planning the location of security devices, filters, and firewall features is critical to safeguarding network resources. – Manageability: No matter how good the initial network design is, the available network staff must be able to manage and support the network. A network that is too complex or difficult to maintain cannot function effectively and efficiently. • To meet these fundamental design goals, a network must be built on a hierarchical network architecture that allows for both flexibility and growth. 4RCS315
  • 5. NERTWORK DESIGN METHODLOGY/analysis Step 1. Identify the network requirements. • The network designer works closely with the customer to document the goals of the project. • Goals are usually separated into two categories: – Business goals: Focus on how the network can make the business more successful – Technical requirements: Focus on how the technology is implemented within the network 5RCS315
  • 6. Step 2. Characterize the existing network. – Information about the current network and services is gathered and analyzed. – It is necessary to compare the functionality of the existing network with the defined goals of the new project. – The designer determines whether any existing equipment, infrastructure, and protocols can be reused, and what new equipment and protocols are needed to complete the design. 6RCS315
  • 7. Step 3. Design the network topology and solutions – A common strategy for network design is to take a top-down approach. In this approach, the network applications and service requirements are identified, and then the network is designed to support them. – When the design is complete, a prototype (a model) or proof-of-concept test is performed. This approach ensures that the new design functions as expected before it is implemented. – Here logical design is simulated to see if it gives out the expected results. 7RCS315
  • 8. NOTE: Determining the Scope of the Project • While gathering requirements, the designer identifies the issues that affect the entire network and those that affect only specific portions. • Failure to understand the impact of a particular requirement often causes a project scope to expand beyond the original estimate. • This oversight can greatly increase the cost and time required to implement the new design 8RCS315
  • 9. Impacting the Entire Network • Network requirements that impact the entire network include the following: – Adding new network applications and making major changes to existing applications, such as database or Domain Name System (DNS) structure changes – Improving the efficiency of network addressing or routing protocol changes – Integrating new security measures – Adding new network services, such as voice traffic, content networking, and storage networking – Relocating servers to a data center server farm 9RCS315
  • 10. Impacting a Portion of the Network. • Requirements that may only affect a portion of the network include the following: – Improving Internet connectivity and adding bandwidth – Updating access layer LAN cabling – Providing redundancy for key services – Supporting wireless access in defined areas – Upgrading WAN bandwidth 10RCS315
  • 11. HIERARCHICAL NETWORK DESIGN • As from above, a hierarchical design is used to group devices into multiple networks. • The networks are organized in a layered approach thus A hierarchical network design involves dividing the network into discrete layers. • Each layer, or tier, in the hierarchy provides specific functions that define its role within the overall network. • This helps the network designer and architect to optimize and select the right network hardware, software, and features to perform specific roles for that network layer. 11RCS315
  • 12. The hierarchical design model has three basic layers: • Core layer: – Connects distribution layer devices • Distribution layer: – Interconnects the smaller local networks • Access layer: – Provides connectivity for network hosts and end device 12RCS315
  • 15. Or: Multi Building Enterprise Network Design RCS315 15
  • 16. What Happens at the Core Layer? • The core layer is sometimes called the network backbone. Routers and switches at the core layer provide high-speed connectivity. • The core layer includes one or more links to the devices at the enterprise edge to support Internet, virtual private networks (VPN), extranet, and WAN access • The core layer is responsible for transporting large amounts of data quickly and reliably. • The designer must ensure that the core layer is designed with fault tolerance, especially because all users in the network can be affected by a failure. The ability to avoid unnecessary delays in network traffic quickly becomes a top priority for the network designer. 16RCS315
  • 17. Goals of the Core Layer • The core layer design enables the efficient, high-speed transfer of data between one section of the network and another. • The primary design goals at the core layer are as follows: – Provide 100% uptime. – Maximize throughput. – Facilitate network growth 17RCS315
  • 18. Core Layer Technologies • Technologies used at the core layer include the following: 1. Routers or multilayer switches that combine routing and switching in the same device 2. Redundancy and load balancing 3. High-speed and aggregate links 4. Routing protocols that scale well and converge quickly, such as Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) Protocol 18RCS315
  • 19. Redundant Links • Implementing redundant links at the core layer ensures that network devices can find alternate paths to send data in the event of a failure. • When Layer 3 devices are placed at the core layer, these redundant links can be used for load balancing in addition to providing backup. • In a flat, Layer 2 network design, Spanning Tree Protocol (STP) disables redundant links unless a primary link fails. This STP behavior prevents load balancing over the redundant links 19RCS315
  • 20. Mesh Topology • Most core layers in a network are wired in either a full-mesh or partial-mesh topology. • A full-mesh topology is one in which every device has a connection to every other device. • Although full-mesh topologies provide the benefit of a fully redundant network, they can be difficult to wire and manage and are more costly. • For larger installations, a modified partial-mesh topology is used. In a partial-mesh topology, each device is connected to at least two others, creating sufficient redundancy without the complexity of a full mesh 20RCS315
  • 21. Network Traffic Prioritization • Failures at the core layer can potentially affect all users of the network. Therefore, preventing failures becomes a daunting task. • The network designer has to incorporate features or additions to the design to minimize or eliminate the effects of a core layer failure. • The users on a network do not want to wait to complete their daily tasks because of a lack of care in the design. 21RCS315
  • 22. Preventing Failures • The network designer must strive to provide a network that is resistant to failures and that can recover quickly in the event of a failure. Core routers and switches can contain the following: 1. Dual power supplies and fans 2. A modular chassis-based design 3. Additional management modules • Redundant components increase the cost, but they are usually well worth the investment. Core layer devices should have hot-swappable components whenever possible. Hot-swappable components can be installed or removed without first having to turn off the power to the device. Using these components reduces repair time and disruption to network services. • Larger enterprises often install generators and large uninterruptible power supply (UPS) devices. These devices prevent minor power outages from causing large-scale network failures. 22RCS315
  • 23. Reducing Human Error • Human errors contribute to network failures. • Unfortunately, the addition of redundant links and equipment cannot eliminate these factors. • Many network failures are the result of poorly planned, untested updates or additions of new equipment. • Never make a configuration change on a production network without first testing it in a lab environment! • Failures at the core layer cause widespread outages. It is critical to have written policies and procedures in place to govern how changes are approved, tested, installed, and documented. Plan a back-out strategy to return the network to its previous state in case changes are not successful 23RCS315
  • 24. Network Convergence • The choice of a routing protocol for the core layer is determined by the size of the network and the number of redundant links or paths available. • A major factor in choosing a protocol is how quickly it recovers from a link or device failure. 24RCS315
  • 25. Convergence Definition and Factors • Network convergence occurs when all routers have complete and accurate information about the network. The faster the convergence time, the quicker a network can react to a change in topology. • Factors that affect convergence time include the following: – The speed at which the routing updates reach all the routers in the network – The time that it takes each router to perform the calculation to determine the best paths 25RCS315
  • 26. Selecting a Routing Protocol for Acceptable Convergence Time • Most dynamic routing protocols offer acceptable convergence times in small networks. • In larger net- works, protocols such as Routing Information Protocol Version 2 (RIPv2) may converge too slowly to prevent disruption of network services if a link fails. • Generally, in a large enterprise network, EIGRP or OSPF provide the most stable routing solution. 26RCS315
  • 27. Design Considerations with Convergence in Mind • Most networks contain a combination of dynamic and static routes. • Network designers need to consider the number of routes required to ensure that all destinations in the network are reachable. • Large routing tables can take significant time to converge. The design of network addressing and summarization strategies in all layers affects how well the routing protocol can react to a failure 27RCS315