Network Design Module 2022 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Republic of the Philippines

NUEVA VIZCAYA STATE UNIVERSITY


Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

COLLEGE: INDUSTRIAL TECHNOLOGY


CAMPUS: Bambang Campus

DEGREE Bachelor of Science in COURSE


ITPEC2
PROGRAM INTE NO.
Network Management COURSE Network Design and
SPECIALIZATION
System TITLE Management
TIME 3 WK IM
YEAR LEVEL 3 2 1
FRAME HRS NO. NO.

I. UNIT TITLE
Introduction

II. LESSON TITLE


Analysis of Goals:
Analyzing business & technical goals
Characterizing a Network

III. LESSON OVERVIEW

This chapter covered typical network design business goals and constraints. It
also talked about the top-down process for gathering information on goals, and
the importance of using systematic methods for network design. Using
systematic methods will help you keep pace with changing technologies and
customer requirements. The next chapter covers analyzing technical goals and
constraints.

IV. DESIRED LEARNING OUTCOMES

At the end of this module, you should be able to:


1. analyze a computer network requirements;
2. analyze business goals and constraint; and
3. understand and apply the Top-Down Network Design Methodology.

V. LESSON

ANALYZING BUSINESS GOAL & CONSTRAINTS


Top-Down Network Design
• Network design should be a complete process that matches business needs to
available technology to deliver a system that will maximize an organization’s
success
• Following a formal design process increases your chances of success. Also
decrease the following:

1. Failure to meet requirements


2. Creeping requirements- Specification addition and changes can
disastrously increase the amount of time, effort and money. All change
requests must be clearly documented, communicated and evaluated.
3. Missed deadlines and budget overruns
4. Dissatisfied end users
5. Dissatisfied management

NVSU-FR-ICD-05-00 (081220) Page 1 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

Layers of the OSI Model

Structured Design

• A focus is placed on understanding :


• data flow, data types, and processes that access or change the data.
• the location and needs of user communities that access or change data and
processes.

• Several techniques and models can be used to characterize the existing system, new user
requirements, and a structure for the future system.

• A logical model is developed before the physical model.


• The logical model represents
• the basic building blocks, divided by function, and the structure of the system.
• The physical model represents
• devices and specific technologies and implementations.
Systems Development Life Cycles

• SDLC: Does it mean Synchronous Data Link


Control or Systems Development Life Cycle?

• Typical systems are developed and continue to exist over a period of time, often called a
systems development life cycle (SDLC)

• The process of creating a new system or changing an existing system


is called a life cycle

• Life cycle: A new network is => Planned -> Designed -> Implemented -
> Maintained

NVSU-FR-ICD-05-00 (081220) Page 2 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

Top-Down Network Design Steps

Network Design Steps

Phase 1&2 – Analyze Requirements


• Analyze business goals and constraints
• Revenue, profit, policy, politics, corporate structure
• Analyze users need
• Analyze application needs
• Analyze technical goals and tradeoffs
• No downtime, access data anywhere
• Characterize the existing network
• Characterize network traffic

Phase 2 – Logical Network Design


• Design a network topology
• Design models for addressing and naming
• Select switching and routing protocols
• Develop network security strategies
• Develop network management strategies

Phase 3 – Physical Network Design


• Select technologies and devices
• for campus networks
• for enterprise networks

Phase 4 – Testing, Optimizing, and Documenting the Network Design


• Test the network design
• Optimize the network design
• Document the network design

NVSU-FR-ICD-05-00 (081220) Page 3 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

The Network Life Cycle

Business Goals
• Increase revenue
• Reduce operating costs
• Improve communications
• Shorten product development cycle
• Expand into worldwide markets
• Build partnerships with other companies
• Offer better customer support or new customer services

Recent Business Priorities


• Mobility
• Security
• Resiliency (fault tolerance)
• Business continuity after a disaster
• Network projects must be prioritized based on fiscal goals
• Networks must offer the low delay required for real-time
• applications such as VoIP

Business Constraints
• Budget
• Staffing
• Schedule
• Politics and policies

The Scope of the Design Project

• Small in scope?
o Allow sales people to access network via a VPN
• Large in scope?
o An entire redesign of an enterprise network
• Use the OSI model to clarify the scope
o New financial reporting application versus new routing protocol versus new data
link
o (wireless, for example)
• Does the scope fit the budget, capabilities of staff and consultants, schedule?

NVSU-FR-ICD-05-00 (081220) Page 4 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

Gather More Detailed Information

• Applications
o Now and after the project is completed
o Include both productivity applications and system management applications
• User communities
• Data stores
• Protocols
• Current logical and physical architecture
• Current performance

SUMMARY
• Systematic approach
• Focus first on business requirements and constraints, and applications
• Gain an understanding of the customer’s corporate structure
• Gain an understanding of the customer’s business style
• Top-Down Network Design
• i.e. analysing your customer’s business goal
• Business Goal
The capability to run network applications to meet business objectives and
within business constraints(budgets, limited personnel, tight timeframes)

Analyzing TechnicalGoals and Tradeoffs

Analyzing a customer’s technical goals for a new network design or network upgrade.
➢ Analyzing your customer’s technical goals can help you confidently
recommend technologies that will perform to your customer’s
expectations.
➢ Typical technical goals include,
• Scalability
• Availability
• Network Performance
• Security
• Manageability
• Usability
• Adaptability, and affordability.
➢ Of course, there are tradeoffs associated with these goals.
• For example, meeting strict requirements for performance can make it hard to
meet a goal of affordability.

NVSU-FR-ICD-05-00 (081220) Page 5 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

DIFFERENT TECHNICAL GOALS:

• SCALABILITY
refers to how much growth a network design must support.
o For many enterprise network design customers, scalability is a primary goal.
▪ Many large companies add users, applications, additional sites, and
external network connections at a rapid rate.
▪ The network design you propose to a customer should be able to adapt the
future usage and expansion.

• AVAILABILITY
refers to the amount of time a network is available to users and is often a critical goal for
network design customers.
o It is percent uptime per year, month, week, day, or hour, compared to the total
time in that period.
▪ For example, in a network that offers 24-hour, 7-days-a- week service, if
the network is up 165 hours in the 168-hour week, availability is 98.21
percent.
▪ Note: Availability means how much time the network is operational.

A. Availability is also linked to redundancy


Redundancy means adding duplicate links or devices to a network to avoid
downtime.
Redundant network topologies are important for many network
design customers who want to ensure business continuity after a
major fault or disaster.
B. Availability is also associated with resiliency
Resiliency means how much stress a network can handle and how quickly
rebound from problems including,
Security breaches, natural and unnatural disasters, human error,
and catastrophic software or hardware failures.
A network that has good resiliency usually has good availability.

• NETWORK PERFORMANCE

NVSU-FR-ICD-05-00 (081220) Page 6 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

• SECURITY
Security is a key technical goal
Enterprise network require the most up-to-date security rules and technologies.
▪ Network design customers need assurances that a design offers protection
against business data and other assets getting damaged or accessed
inappropriately.
▪ Every company has trade secrets, business operations, and equipment to
protect.
▪ The first task in security design is planning.
• Planning involves identifying network assets that must be protected,
analyzing risks, and developing requirements.

• MANAGEABILITY

• USABILITY
Usability refers to the ease of use with which network users can access the network and
services.
o Whereas manageability focuses on making network managers’ jobs easier,
usability focuses on making network users’ jobs easier.
o Some network design components can have a negative effect on usability.
For example, strict security policies can have a negative effect on usability.
Maximize usability by deploying user-friendly, host-naming
schemes and easy-to-use configuration methods that make use of
dynamic protocols, such as the Dynamic Host Configuration
Protocol (DHCP).
Usability might also include a need for mobility.
o They expect to have network access in conference rooms, at home,
at a customer’s site, and so on.

• ADAPTABILITY
A good network design can adapt to new technologies and changes.
Changes can come in the form of new protocols, new business practices, new fiscal
goals, new legislation, and a many of other possibilities

NVSU-FR-ICD-05-00 (081220) Page 7 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

• AFFORDABILITY
Affordability which is sometimes called cost- effectiveness.
o For a network design to be affordable, it should carry the maximum amount of
traffic for a given financial cost.
o To reduce the cost of operating a WAN, customers often have one or more of the
following technical goals to achieve affordability (next slide)

NVSU-FR-ICD-05-00 (081220) Page 8 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

NETWORK TOPOLOGY
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of
the network. Both logical and physical topologies could be same or different in a same
network.

POINT-TO-POINT
Point-to-point networks contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of
one host is connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if
they are connected directly.

BUS TOPOLOGY

In case of Bus topology, all devices share single communication line or cable.Bus topology
may have problem while multiple hosts sending data at the same time. Therefore, Bus
topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve
the issue. It is one of the simple forms of networking where a failure of a device does not
affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.

Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.

NVSU-FR-ICD-05-00 (081220) Page 9 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

STAR TOPOLOGY

All hosts in Star topology are connected to a central device, known as hub device, using
a point-to-point connection. That is, there exists a point to point connection between hosts
and hub. The hub device can be any of the following:

• Layer-1 device such as hub or repeater


• Layer-2 device such as switch or bridge
• Layer-3 device such as router or gateway

As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts
to all other hosts fails. Every communication between hosts, takes place through only the
hub.Star topology is not expensive as to connect one more host, only one cable is required
and configuration is simple.

RING TOPOLOGY

In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.

Failure of any host results in failure of the whole ring.Thus, every connection in the ring is
a point of failure. There are methods which employ one more backup ring.

NVSU-FR-ICD-05-00 (081220) Page 10 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

MESH TOPOLOGY

In this type of topology, a host is connected to one or multiple hosts. This topology has
hosts in point-to-point connection with every other host or may also have hosts which are
in point-to-point connection to few hosts only.

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-
to-point links. Mesh technology comes into two types:

• Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides the
most reliable network structure among all network topologies.
• Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hosts connect to each other in some arbitrarily fashion. This topology exists where
we need to provide reliability to some hosts out of all.

TREE TOPOLOGY

Also known as Hierarchical Topology, this is the most common form of network topology
in use presently.This topology imitates as extended Star topology and inherits properties
of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs,
a network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which
works as mediator between upper layer and lower layer. The highest layer is known as
core layer, and is central point of the network, i.e. root of the tree from which all nodes
fork.

NVSU-FR-ICD-05-00 (081220) Page 11 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya
INSTRUCTIONAL MODULE

All neighboring hosts have point-to-point connection between them.Similar to the Bus
topology, if the root goes down, then the entire network suffers even.though it is not the
single point of failure. Every connection serves as point of failure, failing of which divides
the network into unreachable segment.

DAISY CHAIN

This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts
are connected to two hosts only, except the end hosts.Means, if the end hosts in daisy
chain are connected then it represents Ring topology.

Each link in daisy chain topology represents single point of failure. Every link failure splits
the network into two segments.Every intermediate host works as relay for its immediate
hosts.

HYBRID TOPOLOGY

A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.

The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are
connected by means of Dual-Ring topology and networks connected to them are mostly
Star topology networks. Internet is the best example of largest Hybrid topology.

NVSU-FR-ICD-05-00 (081220) Page 12 of 12


In accordance with section 185. Fair Use of a Copyrighted Work of Republic Act 8293, the copyrighted works included in this material may be reproduced
for educational purposes only and not for commercial distribution.

You might also like