Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 1 : Designing and Supporting Computer Networks - Coggle Diagram
CHAPTER 1 : Designing and Supporting Computer
Networks
4 Network Requirements to Create Stable, Reliable and Scalable Network
Ease of Management
Fast Recovery
Application Response Time
Fast Troubleshooting
4 Fundamental to Create Stable, Reliable and Scalable Network
Scalability
Availability
Security
Manageability
3 Layer in Hierarchical Network
Core Layer
Distribution Layer
Access Layer
3 Fractions of Three-layer Model into Modular Area (Kegunaan Bertempat)
Enterprise Campus
Server Farm
Enterprise Edge
4 Advantages of Modular Framework
Create deterministic network
Ease design tasks
Provide scability
Enable designer to add service and solution
3 Steps in network design project
Identify network requirements
Characterize existing network
Design network topology
Factor Need to be Considered When Designing Core Layer Network
combine routing & switch in the same device
redundancy & load balancing
high speed & aggregrated links
quick convergence
full mesh topology
failure prevention
reducing human error
Factor Need to be Considered When Designing Distributing Layer Network
filtering & managing traffic flow
access control policies
route summarization
isolating core layer from access layer failures
routing between vlans
Factor Need to be Considered When Designing Access Layer Network
physical location of equipment
wiring closets
converged networking
availability
naming structures
vlan architecture
traffic patterns
prioritization strats
star topologies
Function of VLAN
seperate & classify traffic
control broadcast
contain vlan within single wiring closet
Quality of Service at network edge
classification
assigned priority
Security risk at network edge
authentication
wireless security
Security measure at Access Layer
physical security
strong password
SSH (remote access)
disabling unused port
security policy
Benefit & Implication of Creating Server Farm
defined entry & exit point in traffic
redundant, high capacity links
load balancing & failover
lower cost of providing services
Firewalls
intrusion and prevention system
load balancer
network analysis and management device
virtualization
Consideration of an Implementation of a Wireless Network Design
Customer Requirements
roaming
authentication
service and applications
encryption
coverage and number of users
physical WLAN design
site survey
logical WLAN design
open guest access vs secured employee access
Factors that affects Implementation of VPNs
cost of bandwidth
QoS
security
remote access
Interconnections options
traditional WAN technologies
newer WAN technologies