Network Design Module 2022 2023
Network Design Module 2022 2023
Network Design Module 2022 2023
I. UNIT TITLE
Introduction
This chapter covered typical network design business goals and constraints. It
also talked about the top-down process for gathering information on goals, and
the importance of using systematic methods for network design. Using
systematic methods will help you keep pace with changing technologies and
customer requirements. The next chapter covers analyzing technical goals and
constraints.
V. LESSON
Structured Design
• Several techniques and models can be used to characterize the existing system, new user
requirements, and a structure for the future system.
• Typical systems are developed and continue to exist over a period of time, often called a
systems development life cycle (SDLC)
• Life cycle: A new network is => Planned -> Designed -> Implemented -
> Maintained
Business Goals
• Increase revenue
• Reduce operating costs
• Improve communications
• Shorten product development cycle
• Expand into worldwide markets
• Build partnerships with other companies
• Offer better customer support or new customer services
Business Constraints
• Budget
• Staffing
• Schedule
• Politics and policies
• Small in scope?
o Allow sales people to access network via a VPN
• Large in scope?
o An entire redesign of an enterprise network
• Use the OSI model to clarify the scope
o New financial reporting application versus new routing protocol versus new data
link
o (wireless, for example)
• Does the scope fit the budget, capabilities of staff and consultants, schedule?
• Applications
o Now and after the project is completed
o Include both productivity applications and system management applications
• User communities
• Data stores
• Protocols
• Current logical and physical architecture
• Current performance
SUMMARY
• Systematic approach
• Focus first on business requirements and constraints, and applications
• Gain an understanding of the customer’s corporate structure
• Gain an understanding of the customer’s business style
• Top-Down Network Design
• i.e. analysing your customer’s business goal
• Business Goal
The capability to run network applications to meet business objectives and
within business constraints(budgets, limited personnel, tight timeframes)
Analyzing a customer’s technical goals for a new network design or network upgrade.
➢ Analyzing your customer’s technical goals can help you confidently
recommend technologies that will perform to your customer’s
expectations.
➢ Typical technical goals include,
• Scalability
• Availability
• Network Performance
• Security
• Manageability
• Usability
• Adaptability, and affordability.
➢ Of course, there are tradeoffs associated with these goals.
• For example, meeting strict requirements for performance can make it hard to
meet a goal of affordability.
• SCALABILITY
refers to how much growth a network design must support.
o For many enterprise network design customers, scalability is a primary goal.
▪ Many large companies add users, applications, additional sites, and
external network connections at a rapid rate.
▪ The network design you propose to a customer should be able to adapt the
future usage and expansion.
• AVAILABILITY
refers to the amount of time a network is available to users and is often a critical goal for
network design customers.
o It is percent uptime per year, month, week, day, or hour, compared to the total
time in that period.
▪ For example, in a network that offers 24-hour, 7-days-a- week service, if
the network is up 165 hours in the 168-hour week, availability is 98.21
percent.
▪ Note: Availability means how much time the network is operational.
• NETWORK PERFORMANCE
• SECURITY
Security is a key technical goal
Enterprise network require the most up-to-date security rules and technologies.
▪ Network design customers need assurances that a design offers protection
against business data and other assets getting damaged or accessed
inappropriately.
▪ Every company has trade secrets, business operations, and equipment to
protect.
▪ The first task in security design is planning.
• Planning involves identifying network assets that must be protected,
analyzing risks, and developing requirements.
• MANAGEABILITY
• USABILITY
Usability refers to the ease of use with which network users can access the network and
services.
o Whereas manageability focuses on making network managers’ jobs easier,
usability focuses on making network users’ jobs easier.
o Some network design components can have a negative effect on usability.
For example, strict security policies can have a negative effect on usability.
Maximize usability by deploying user-friendly, host-naming
schemes and easy-to-use configuration methods that make use of
dynamic protocols, such as the Dynamic Host Configuration
Protocol (DHCP).
Usability might also include a need for mobility.
o They expect to have network access in conference rooms, at home,
at a customer’s site, and so on.
• ADAPTABILITY
A good network design can adapt to new technologies and changes.
Changes can come in the form of new protocols, new business practices, new fiscal
goals, new legislation, and a many of other possibilities
• AFFORDABILITY
Affordability which is sometimes called cost- effectiveness.
o For a network design to be affordable, it should carry the maximum amount of
traffic for a given financial cost.
o To reduce the cost of operating a WAN, customers often have one or more of the
following technical goals to achieve affordability (next slide)
NETWORK TOPOLOGY
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of
the network. Both logical and physical topologies could be same or different in a same
network.
POINT-TO-POINT
Point-to-point networks contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of
one host is connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if
they are connected directly.
BUS TOPOLOGY
In case of Bus topology, all devices share single communication line or cable.Bus topology
may have problem while multiple hosts sending data at the same time. Therefore, Bus
topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve
the issue. It is one of the simple forms of networking where a failure of a device does not
affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
STAR TOPOLOGY
All hosts in Star topology are connected to a central device, known as hub device, using
a point-to-point connection. That is, there exists a point to point connection between hosts
and hub. The hub device can be any of the following:
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts
to all other hosts fails. Every communication between hosts, takes place through only the
hub.Star topology is not expensive as to connect one more host, only one cable is required
and configuration is simple.
RING TOPOLOGY
In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring.Thus, every connection in the ring is
a point of failure. There are methods which employ one more backup ring.
MESH TOPOLOGY
In this type of topology, a host is connected to one or multiple hosts. This topology has
hosts in point-to-point connection with every other host or may also have hosts which are
in point-to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-
to-point links. Mesh technology comes into two types:
• Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides the
most reliable network structure among all network topologies.
• Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hosts connect to each other in some arbitrarily fashion. This topology exists where
we need to provide reliability to some hosts out of all.
TREE TOPOLOGY
Also known as Hierarchical Topology, this is the most common form of network topology
in use presently.This topology imitates as extended Star topology and inherits properties
of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs,
a network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which
works as mediator between upper layer and lower layer. The highest layer is known as
core layer, and is central point of the network, i.e. root of the tree from which all nodes
fork.
All neighboring hosts have point-to-point connection between them.Similar to the Bus
topology, if the root goes down, then the entire network suffers even.though it is not the
single point of failure. Every connection serves as point of failure, failing of which divides
the network into unreachable segment.
DAISY CHAIN
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts
are connected to two hosts only, except the end hosts.Means, if the end hosts in daisy
chain are connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits
the network into two segments.Every intermediate host works as relay for its immediate
hosts.
HYBRID TOPOLOGY
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are
connected by means of Dual-Ring topology and networks connected to them are mostly
Star topology networks. Internet is the best example of largest Hybrid topology.