100% found this document useful (1 vote)
802 views7 pages

Introduction To Network Design and Implementation

Uploaded by

Joel Ochieng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
802 views7 pages

Introduction To Network Design and Implementation

Uploaded by

Joel Ochieng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Introduction to Network Design and Implementation

A networking infrastructure involves a number of hardware components including wiring,


connectors, racks, network interface cards, client and server workstations, and communications
devices such as repeaters, bridges, shared and switched hubs, and routers. It also includes
software such as network card drivers, communications protocols, network operating systems
and network application tools.

Computer network design refers to the planning of the implementation of a computer network
infrastructure. Network design is generally performed by network designers, engineers, IT
administrators and other related staff. It is done before the implementation of a network
infrastructure.

The objective of network design is to satisfy data communication requirements while


minimizing expense. Requirement scope can vary widely from one network design project to
another based on geographic particularities and the nature of the data requiring transport.

There are a number of details your network infrastructure design should show, these include:
 A clear map of the network.
 The structure and layout of the cabling required.
 The quantity, type and location of all devices on the network.
 Your IP addressing structure.
 Details of your network security architecture and processes

Network Requirements
Most businesses actually have only a few requirements for their network:
The network should stay up all the time, even in the event of failed links, equipment failure,
and overloaded conditions.
- The network should reliably deliver applications and provide reasonable response times
from any host to any host.
- The network should be secure. It should protect the data that is transmitted over it and
data stored on the devices that connect to it.
- The network should be easy to modify to adapt to network growth and general business
changes.
- Because failures occasionally occur, troubleshooting should be easy. Finding and fixing a
problem should not be too time-consuming

Goals of Network Design


When examined carefully, these requirements translate into four fundamental network design
goals:
- Scalability: Scalable network designs can grow to include new user groups and remote
sites and can support new applications without impacting the level of service delivered
to existing users.

1
- Availability: A network designed for availability is one that delivers consistent, reliable
performance, 24 hours a day, 7 days a week. In addition, the failure of a single link or
piece of equipment should not significantly impact network performance.
- Security: Security is a feature that must be designed into the network, not added on
after the net-work is complete. Planning the location of security devices, filters, and
firewall features is critical to safeguarding network resources.
- Manageability: No matter how good the initial network design is, the available network
staff must be able to manage and support the network. A network that is too complex
or difficult to maintain cannot function effectively and efficiently

Five Things to Be Considered in Designing a Network


Important things to consider include balancing security issues with the desire for easy access to
information; building redundancy into the network in anticipation of breakdowns; and
standardizing hardware and software to keep maintenance costs in check.
- Connectivity and Security
Network connectivity today means more than Ethernet cables and wireless access points.
People today are more connected while mobile than ever before and many of them want
access to company email and data while they are out of the office. Balancing those needs while
maintaining security is a challenge that needs to be addressed in the design phase of any
network.
This includes where data is stored, either in-house or offsite with cloud-based solutions, what
types of information should be accessible, who should be able to access it, and which types of
devices should be included. Firewalls and access servers need to be secure without slowing
down operations.
- Redundancy and Backing Up
Redundancy means having backup devices in place for any mission-critical components in the
network. Even small organizations should consider using two servers. Two identical servers, for
example, can be configured with fail-safes so that one will take over if the other fails or requires
maintenance. A good rule of thumb is to have redundant components and services in place for
any part of a network that cannot be down for more than an hour.
If an organization hosts it own Web servers, or cannot be without Internet connectivity, a
second connection should be in place. Having an extra switch, wireless router, and a spare
laptop onsite is a good practice for ensuring that downtime is kept to a minimum.
- Standardization of Hardware and Software
Standardization of the hardware and software used in a network is important for ensuring the
network runs smoothly. It also reduces costs associated with maintenance, updates and repairs.
Conducting a full audit of the current computer systems, software and peripherals will help to
determine which should be standardized.
A CEO or director may require special consideration, but if 90 percent of the employees use the
same notebooks, with the same word processing and email programs, a software or hardware
patch across the organization can be conducted much less expensively than if everyone used a
different computer model with different software installed on each.

2
- Disaster Recovery Plan
A detailed disaster recovery plan should be a part of any network design. This includes, but is
not limited to, provisions for back-up power and what procedures should be followed if the
network or server crashes. It should also include when data is backed up, how it is backed up
and where copies of the data are stored. A comprehensive disaster recovery plan includes
office disasters, building disasters, and metropolitan-wide disasters.
In most cases, important data should be backed up daily. Many organizations do a full weekly
backup, with daily incremental backups that copy any files that have been modified since the
last weekly backup. Backup files should be stored in a secure location off-site in the event of a
building disaster, such as a fire.
- Future Growth of the Organization
While it is not always possible to anticipate how large an organization may be five years in the
future, some allowances for future growth must be built into the network design. For example,
Microsoft Small Business Server can be an excellent choice for many small organizations.
However, if your office already has sixty employees, Small Business Server could soon be a
wasted investment, as it has a limit of only 75 users
Network design should factor in at least 20 percent growth per year, including everything from
switch ports to data backup systems.
Traditional network design approach
The traditional network design approach follows a structured systems analysis and design
process similar to that used to build application systems.
• The network analyst met with users to determine the needs and applications.
• The analyst estimated data traffic on each part of the network.
• The analyst designed circuits needed to support this traffic and obtains cost
estimates.
• Finally, a year or two later, the network is implemented
Three forces are making the traditional design approach less appropriate for many of today’s
networks:
1. The underlying technology of computers, networking devices and the circuits
themselves if rapidly changing.
2. The growth in network traffic is immense.
3. The balance of costs has changed dramatically over the last 10 years.
Analysis and Design Principles
There are two common approaches to analyze and design networks:
Top-down approach:
The top-down design approach simplifies the design process by splitting the design tasks to
make it more focused on the design scope and performed in a more controlled manner, which
can ultimately help network designers to view network design solutions from a business-driven
approach.

3
Bottom-up approach:
In contrast, the bottom-up approach focuses on selecting network technologies and design
models first. This can impose a high potential for design failures, because the network will not
meet the business or applications’ requirements.

Here is a look at some important comparison points between these very different approaches:
TOP-DOWN BOTTOM-UP
Pros Starts with the need of the Quick
organization
Provides a ‘’big picture’’ to the Leverages previous Experience
customer and the designer
CONS Time consuming Might miss some organizational
requirements
High probability of failure

Choosing the design approach that best fits your needs will result in a stronger network.
Recognizing the pros and cons of each approach can help you build the case for the appropriate
choice, giving you the opportunity to build a network that will meet the needs of the project or
organization — and improve network performance.

Reading Assignment:
Explain the major phases of the top down network design approach.
Structured Design
 A focus isplacedon understandingdataflow,datatypes,and processes that access or change
the data.
 A focus is placed on understanding the location and needs of user communities that access or
change data and processes.
 Several techniques and models can be used to characterize the existingsystem,newuser
requirements,andastructurefor the future system.
 A logical model is developed before the physical model.
 The logical model represents the basic building blocks, divided by function, and the
structure of the system.
 The physical model represents devices and specific technologies and implementations.
Network Design and Implementation Cycle
Typical systems are developed and continue to exist over a period of time, often called a systems
development life cycle (SDLC).
SDLC is a standardized process that IT, systems, and software engineering industries use to
build and test network. It entails a step-by-step development process with the goal of creating
high-quality network that meets or exceeds customer expectations.
Here are a few benefits SDLC can bring:
 Offers better visibility of a project plan
 Mitigates project risks and errors

4
 Allows team members to track the progress of their project
 Ensures all requirements and objectives are achieved
Phase 1 – Analyze Requirements
 Analyze business goals and constraints
 Analyze technical goals and tradeoffs
 Characterize the existing network
 Characterize network traffic
Phase 2 – Logical Network Design
 Design a network topology
 Design models for addressing and naming
 Select switching and routing protocols
 Develop network security strategies
 Develop network management strategies
Phase 3 – Physical Network Design
 Select technologies and devices for campus networks
 Select technologies and devices for enterprise networks
Phase 4 –Testing, Optimizing, and Documenting the Network Design
 Test the network design
 Optimize the networkdesign
 Document the networkdesign
Phase 5 – Implementation and Test network
Phase 6 – Monitor and optimize network performance

Business Goals for designing a good network


 Increase revenue
 Reduce operating costs
 Improve communications
 Shorten product development cycle
 Expand into worldwidemarkets
 Build partnerships with other companies
 Offer better customer support or new customer services

5
RecentBusinessPriorities designing a good network
 Mobility
 Security
 Resiliency (fault tolerance)
 Business continuity after adisaster
 Network projects must be prioritized based on fiscal goals
 Networks must offer the low delay required for real-time applications such asVoIP
Business Constraints for designing a good network
• Budget
• Staffing
• Schedule
• Politics and policies
Network management and administration refers to the processes, tools and applications used
to administer, operate and maintain a network infrastructure.
Performance management and fault analysis are also included in network management.

The network management model that defines five functional areas of network management is
the FCAPS model. FCAPS stands for Fault Management, Configuration Management, Accounting
Management, Performance Management, and Security Management. Each functional area
focuses on specific aspects of managing and maintaining a computer network. Let's briefly
explore each area:
1. Fault Management:
o Fault management deals with the detection, isolation, and resolution of network
faults or issues.
o It involves monitoring the network infrastructure to identify faults, generating
alerts or notifications when issues occur, and initiating appropriate actions for
troubleshooting and resolving the faults.
o Fault management aims to minimize network downtime and ensure that
network services and resources are available and reliable.
2. Configuration Management:
o Configuration management involves managing and maintaining the configuration
of network devices, software, and settings.
o It includes tasks such as device inventory management, configuration backup
and restoration, software version control, and change management.
o Configuration management ensures that network devices are correctly and
consistently configured, which contributes to network stability and reduces the
risk of misconfigurations causing issues.
3. Accounting Management:
o Accounting management, also known as accounting and billing management,
focuses on tracking and managing the network resource usage and associated
costs.

6
o It involves collecting data on network usage, such as bandwidth consumption
and resource utilization, and generating reports for billing, capacity planning,
and cost allocation.
o Accounting management helps organizations understand and control their
network expenses, allocate resources effectively, and optimize network
performance.
4. Performance Management:
o Performance management involves monitoring and optimizing network
performance to ensure efficient and reliable operation.
o It includes activities like monitoring network performance metrics, analyzing
performance data, identifying performance bottlenecks or degradation, and
taking appropriate actions to enhance network performance.
o Performance management helps optimize network resources, identify capacity
constraints, and ensure that the network meets performance objectives and
service level agreements.
5. Security Management:
o Security management focuses on protecting the network infrastructure, data,
and resources from unauthorized access, threats, and vulnerabilities.
o It involves tasks such as network access control, authentication and
authorization, vulnerability management, intrusion detection and prevention,
and security policy enforcement.
o Security management aims to ensure the confidentiality, integrity, and
availability of network resources, prevent security breaches, and respond
effectively to security incidents.
The FCAPS model provides a structured framework for organizing and implementing network
management activities. By addressing each functional area, organizations can effectively
monitor, configure, account for, optimize performance, and secure their network
infrastructure.

Common questions

Powered by AI

The top-down approach begins with understanding organizational needs, providing a big-picture view prioritizing these needs, while the bottom-up approach starts with selecting technologies. The top-down approach tends to be more business-focused as it aims to align network design with business goals and needs, whereas the bottom-up approach can risk not meeting such requirements due to its technology-centered focus. The top-down approach, though time-consuming, is less likely to miss organizational needs, whereas the bottom-up can overlook such requirements, leading to a higher potential for design failure .

A disaster recovery plan is significant in network design as it prepares for and mitigates the impact of unforeseen disasters, ensuring rapid recovery and continuity of operations. Key elements include backup power provisions, detailed procedures for handling network or server crashes, regular data backup schedules, and secure off-site storage of backup files. The plan should cover various scenarios, from local office disruptions to metropolitan-wide disasters, ensuring critical data is protected and operations can resume swiftly .

Challenges in ensuring network security during design include maintaining data protection while allowing efficient access and accommodating evolving security threats. Mitigation involves integrating security into the design phase with planned security architectures, strategic placement of security devices, and robust access controls. Regular security evaluations and updates are also vital to adapt to new vulnerabilities, ensuring the network remains secure without compromising performance .

Balancing connectivity and security involves ensuring reliable access while maintaining data protection. The document suggests addressing this during network design by considering where data is stored, who accesses it, and which devices are included. Firewalls and access servers must be robust without impeding operations. The aim is to accommodate the increased connectivity demands of mobile and remote access, ensuring company emails and data remain secure while accessible to authorized entities only .

The FCAPS model facilitates comprehensive network management by focusing on five functional areas: Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management. Implementing each component ensures the network is monitored, maintained, and optimized effectively. Fault management minimizes downtime, configuration management ensures consistent setups, accounting management controls expenses, performance management ensures operational efficiency, and security management protects resources. Collectively, they provide a structured approach for robust network operations .

Within the FCAPS model, fault management focuses on detecting, isolating, and resolving network faults to minimize downtime and ensure reliable services. This involves monitoring infrastructure to identify faults, generating alerts, and initiating appropriate troubleshooting actions. By maintaining network availability and performance, fault management ensures resources remain accessible and services reliable, thus contributing significantly to network reliability .

Redundancy is critical in network design to ensure continuity and minimize downtime during equipment failures or maintenance. It involves having backup devices for mission-critical components, such as servers, so one can take over if another fails. Effective implementation includes deploying two identical servers with fail-safes and maintaining spare equipment like switches and routers. Organizations should have redundant components for any part of a network that cannot be down for extended periods, such as having a second internet connection for critical services .

The key phases of the top-down design approach include: Phase 1 - Analyze Requirements, where business goals, constraints, and network traffic are characterized; Phase 2 - Logical Network Design, involving network topology and addressing strategies; Phase 3 - Physical Network Design, selecting technologies and devices; Phase 4 - Testing, Optimizing, and Documenting, ensuring design validity and clarity; Phase 5 - Implementation and Test, where the design is built and validated; and Phase 6 - Monitor and optimize performance. Each phase builds on the last, ensuring the network aligns with business objectives, is robust, and adaptable to future changes .

Standardization of hardware and software helps ensure the network runs smoothly and reduces costs associated with maintenance, updates, and repairs. By conducting a full audit of current computer systems, software, and peripherals, organizations can determine which should be standardized. If most employees use the same notebooks with common software, updates can be implemented more cheaply and efficiently across the organization compared to managing diverse systems .

Scalability is fundamental in network design to accommodate growth such as new user groups, remote sites, and applications without affecting existing service levels. Successful implementation is influenced by designing a flexible infrastructure that supports expansion, incorporating scalable technologies, and anticipating organizational growth trends. Strategic planning and adaptable design elements ensure the network can evolve to meet increasing demands while maintaining performance .

You might also like