Please enable JavaScript.
Coggle requires JavaScript to display documents.
DESIGNING AND SUPPORTING COMPUTER NETWORKS - Coggle Diagram
DESIGNING AND SUPPORTING COMPUTER NETWORKS
network requirements
application response time
Ease of management
Fast recovery
Fast troubleshooting
fundamental goals
Availability
Security
-Scalability
Manageableility
Advantages Modular
Framework
it ease the design task
provides scalability
create deterministic network with clearly defined boundaries between modules
add services and solution without changing the underlying network design
scalable network
distribution layer
access layer
core layer
3 layer model
server farm
enterprise edge
enterprise campus
Steps
Characterize the existing network
Design the network topology and solution
Identify the network requiments
Designing the Network Core Layer
Combining routing and switching in the same device
Redundancy and load balancing
High-speed and aggregate links
Quick convergence
Full mesh topology
Partial mesh topology
Failure prevention
Reducing human error
Goals of the Core Layer
Network backbone
Designing the Distribution Layer of a Network
Filtering and managing traffic flow
Access control policies
Route summarization
Isolating Core Layer from Access Layer failures
Routing between VLANs
Designing the Access Layer of a Network
Physical location of equipment
Wiring closets
Converged networking
Availability
Naming structures
VLAN architecture
Traffic patterns
Prioritization strategies
Star topologies
Functions of VLANs:
Separate and classify traffic
Control broadcasts
Contain VLANs within a single wiring closet
QoS at the network edge:
Classification
Assigned priority
Security risks at the network edge:
Authentication
Wireless security
Security measures at the Access Layer
Physical security
Strong passwords
SSH
Disabling unused ports
Security policy
Benefits and Security Implications of Creating Server Farms
Defined entry and exit points for network traffic
Redundant, high-capacity links
Load balancing and failover
Lower cost of providing services
Firewalls
LAN switch security features
Intrusion and prevention systems
Load balancers
Network analysis and management devices
DMZs
Building in redundancy for high availability
Virtualization
Describe the Considerations of an Implementation of a Wireless Network Design
Customer requirements:
Roaming
Authentication
Services and applications
Encryption
Coverage and number of users
Physical WLAN design
Site survey
Logical WLAN design
Open guest access vs. secured employee access
Factors that Affect the Implementation of VPNs
Cost of bandwidth
QoS
Security
Remote access
Interconnection options:
Traditional WAN technologies
Newer WAN technologies