NTK Design Chapter 1
NTK Design Chapter 1
Computer network
A computer network is a system of interconnected computers and devices that communicate with
each other to share resources, information, and services. Networks can range from small local
networks within a single building to vast global networks like the internet.
Network design
Network design involves the planning, implementation, and maintenance of these interconnected
systems to ensure they operate efficiently, securely, and reliably. Network design involves
planning and implementing network infrastructure, including hardware, software, and protocols.
It encompasses both the physical layout of network components and the logical design of protocols
and services. It encompasses various elements such as:
Topology: The physical or logical layout of the network, including how devices are
connected to each other. Common topologies include star, bus, ring, mesh, and hybrid
configurations.
Hardware : The physical components of the network, such as routers, switches, hubs,
cables, and wireless access points.
Software : The programs and protocols that enable communication and data transfer within
the network, such as TCP/IP, DNS, DHCP, and routing protocols.
Security: Measures to protect the network from unauthorized access, data breaches,
malware, and other cyber threats. This includes firewalls, encryption, access control, and
intrusion detection/prevention systems.
Scalability: The network's ability to accommodate growth in terms of users, devices, and
traffic volume without significant performance degradation.
Reliability: Ensuring that the network remains operational and accessible to users, often
through redundant components, failover mechanisms, and backup systems.
Performance : Optimizing the network's speed and efficiency to meet the requirements of
its users, applications, and services. This involves factors like bandwidth manageme nt,
Quality of Service (QoS), and traffic prioritization.
Management: Tools and processes for monitoring, configuring, and troubleshooting the
network, including network management systems (NMS), monitoring protocols like
SNMP, and configuration management tools.
Before designing a network, it's essential to understand the organizatio n's requirements, includ ing
2. Topology Selection
Choose an appropriate network topology based on the organization's needs and constraints.
Common topologies include star, bus, ring, mesh, and hybrid configurations. The chosen topology
should support efficient communication and scalability.
3. Network Segmentation
Divide the network into smaller segments or subnets to improve performance, security, and
manageability. It is the act or practice of splitting a computer network into subnetworks, each being
a network segment. Segmentation helps control traffic flow, isolate network issues, and apply
security policies more effectively.
Assign IP addresses and domain names to network devices and services in a logical and organized
manner. Proper addressing and naming conventions simplify network manageme nt,
troubleshooting, and scalability.
Incorporate redundancy and resilience into the network design to minimize downtime and ensure
high availability. This includes redundant links, devices, power supplies, and data centers, as well
as failover mechanisms and disaster recovery plans.
Design the network to accommodate future growth and scalability requirements. Use modular and
scalable hardware/software solutions, implement flexible addressing schemes, and plan for easy
expansion without major disruptions.
Understanding and adhering to these protocols and standards are essential for designing,
implementing, and maintaining modern computer networks, ensuring seamless communica tio n
and compatibility across diverse network environments.
This approach begins with high-level requirements and objectives, such as business goals and user
needs. It then gradually drills down into more detailed design considerations, such as network
topology, hardware selection, and configuration. The top-down approach ensures that the network
design aligns closely with the organization's overall strategic objectives. Starting with high- le ve l
requirements and working down to specific details.
2. bottom-up approach
In contrast to the top-down approach, the bottom-up approach starts with the technical details, such
as hardware capabilities and protocol specifications. Designers then build up to higher- le ve l
requirements, such as performance goals and user needs. This method allows for a more granular
understanding of the network components but may risk losing sight of the broader business
objectives.
3. Hybrid Approach
Combining elements of both top-down and bottom-up methods.
Network design process
Network design process (requirements gathering, planning, design, implementation, testing,
maintenance)
1. Requirements Gathering:
In this phase, the focus is on understanding the needs and objectives of the organization in
deploying a new network or upgrading an existing one.
Conduct interviews with stakeholders to identify business goals, technical requireme nts,
budget constraints, and any regulatory compliance considerations.
Gather information about the current network infrastructure, including hardware, software ,
and configurations.
Document requirements comprehensively to serve as the foundation for subsequent design
and implementation phases.
2. Planning:
Develop a detailed project plan that outlines the scope, timeline, resources, and deliverab les
of the network design project.
Identify key milestones and dependencies, allocate roles and responsibilities to team
members, and establish communication channels.
Conduct risk assessment and mitigation planning to anticipate and address potential
challenges or obstacles.
Define the criteria for evaluating design alternatives and selecting appropriate solutio ns
that align with the organization's goals and requirements.
3. Design:
Based on the requirements gathered in the previous phase, design the network architecture
and topology to meet the specified objectives.
Define the logical and physical components of the network, including routers, switches,
firewalls, servers, and endpoints.
Develop an IP addressing scheme, sub-netting plan, and naming conventions for network
devices and services.
Design security measures such as access controls, encryption, authentication mechanis ms,
and intrusion detection/prevention systems.
Create detailed network diagrams, configuration templates, and documentation to guide
implementation and maintenance activities.
4. Implementation:
Execute the network design plan by deploying hardware, installing software, and
configuring network devices according to the design specifications.
Follow best practices and vendor guidelines for device installation, cabling, and
configuration to ensure reliability and performance.
Test connectivity and functionality as each component is installed to identify and address
any issues promptly.
Coordinate with other IT teams and stakeholders to minimize disruptions and ensure
smooth integration with existing systems and services.
5. Testing:
Conduct comprehensive testing to validate the functionality, performance, and security of
the newly deployed network.
Perform connectivity tests, bandwidth tests, and Quality of Service (QoS) tests to verify
that the network meets performance requirements.
Test security mechanisms and protocols to identify vulnerabilities and ensure compliance
with organizational policies and regulatory requirements.
Conduct user acceptance testing (UAT) to solicit feedback from end-users and stakeholders
and address any usability or functionality issues.
6. Maintenance:
Establish proactive maintenance procedures to monitor and manage the health and
performance of the network infrastructure.
Implement network monitoring tools to track traffic patterns, device status, and security
events in real-time.
Regularly update firmware, patches, and configurations to address security vulnerabilities
and optimize performance.
Document changes, incidents, and resolutions to maintain an accurate record of network
activities and facilitate troubleshooting and future upgrades.
Network Architecture
Network architecture is a logistical and structural layout that shows how network devices are
connected and the rules that regulate data transfer between them. Its specific design depends on
the size and purpose of the network, so there are many ways to build it.
Types of Networks
1. Local Area Network (LAN):
A LAN is a network that covers a small geographical area, typically within a single building
or campus.
It allows devices such as computers, printers, and servers to communicate with each other
and share resources, such as files and printers.
LANs are commonly used in homes, offices, schools, and small businesses.
A WAN is a network that spans a large geographical area, such as multiple cities, countries,
or continents.
It connects multiple LANs and other types of networks over long distances, typically using
leased lines, fiber optic cables, or satellite links.
WANs enable organizations to establish communication between remote locations and
centralize resources and services.
3. Metropolitan Area Network (MAN):
A MAN is a network that covers a larger geographical area than a LAN but smaller than a
WAN, typically spanning a city or metropolitan area.
It provides high-speed connectivity between multiple locations within the same
geographical region, often using fiber optic cables or wireless technologies.
MANs are used by organizations, government agencies, and service providers to connect
buildings, campuses, and data centers across a city.
4. Wireless LAN (WLAN):
A WLAN is a type of LAN that uses wireless communication technologies, such as Wi-Fi,
to connect devices within a limited area.
It eliminates the need for physical cables and allows users to connect to the network using
laptops, smartphones, tablets, and other wireless devices.
WLANs are commonly deployed in homes, offices, public spaces, and campuses to provide
flexible and mobile connectivity.
5. Campus Area Network (CAN):
A CAN is a type of network that connects multiple LANs within a limited geographica l
area, such as a university campus, business park, or military base.
It provides high-speed connectivity between buildings and facilities, enabling seamless
communication and resource sharing among different departments or organizations.
6. Storage Area Network (SAN):
Network topology
Network topology refers to the physical or logical layout of a network, including how devices and
nodes are interconnected. There are several types of network topologies, each with its own
advantages and disadvantages. Here are some common types:
1. Star Topology:
Description: In a star topology, all devices are connected to a central hub or switch. The
hub acts as a central point of communication.
Advantages: Easy to install, easy to add or remove devices, failure of one device doesn't
affect others directly.
Disadvantages: Dependency on the central hub; if it fails, the entire network may go down.
2. Bus Topology:
Description: In a bus topology, all devices are connected to a single backbone cable. Data
is transmitted along the cable, and each device listens for its own address.
Advantages: Simple to set up and understand, requires less cabling than other topologies.
Disadvantages: Susceptible to cable failures; if the backbone cable breaks, the entire
network may be affected.
3. Ring Topology:
Description: In a ring topology, each device is connected to two other devices, forming a
circular structure. Data travels in one direction around the ring.
Advantages: Even data distribution, no collisions, can handle high data volumes.
Disadvantages: Failure of one device or cable can disrupt the entire network, difficult to
troubleshoot.
4. Mesh Topology:
Description: In a mesh topology, each device is connected to every other device in the
network. There can be full mesh or partial mesh configurations.
Advantages: High redundancy, fault tolerance, can handle heavy traffic loads.
Disadvantages: High cost due to extensive cabling and hardware requirements, complex to
set up and manage.
5. Hybrid Topology:
Description: A hybrid topology combines two or more different types of topologies. For
example, a combination of star and bus topologies.
Advantages: Allows customization to meet specific needs, can leverage the advantages of
multiple topologies.
Disadvantages: Increased complexity, may require additional planning and management.
6. Tree Topology:
Description: A tree topology combines multiple star topologies in a hierarchical structure.
It consists of a root node, intermediate nodes, and end nodes.
Advantages: Scalable, allows for segmentation and organization of network resources.
Disadvantages: Dependency on the root node; failure of the root node can disrupt
communication to lower-level nodes.
Network Design
This approach organizes the network into multiple layers, such as core, distribution, and access
layers. Hierarchical network design is a structured approach to organizing computer networks into
distinct layers or tiers, each with its own specific functions and responsibilities. This design
methodology helps in simplifying network management, improving scalability, and enhancing
overall performance. Typically, hierarchical network design consists of three main layers:
I. Core Layer: This layer forms the backbone of the network and is responsible for high-
speed data transport between different parts of the network. It is designed for high
availability, reliability, and minimal latency. Core layer devices typically include high-
speed switches and routers. The primary goal of the core layer is to facilitate fast and
efficient data transmission without unnecessary processing. The core layer provides high-
speed connectivity between distribution layers.
II. Distribution Layer: The distribution layer serves as an intermediary between the core and
access layers. Its primary function is to provide routing, filtering, and policy-based
connectivity. This layer aggregates traffic from multiple access layer devices and forwards
it towards the core. Additionally, it can implement policies to control traffic flow and
enforce security measures. Distribution layer devices often include layer 3 switches and
routers. The distribution layer aggregates traffic from the access layer and impleme nts
policies such as security and QoS. The Distribution Layer is mainly responsible for
collecting/aggregating data from the Switches of the Access Layer and distributing it to
the rest of the network.
It acts as a border as well as a connector to both the Access Layer and the Core
Layer.
It provides policy-based security by using Access Control Lists (ACLs) and
filtering.
The use of routing services (like EIGRP, OSPF. Etc.) Also takes place in this
layer.
It provides Redundancy and Load Balancing.
III. Access Layer: The access layer is the closest to end-user devices such as computers,
printers, and IP phones. Its main purpose is to provide connectivity for these devices to the
rest of the network. Access layer switches typically connect directly to end-user devices
and may include features such as VLAN segmentation, Power over Ethernet (PoE), and
quality of service (QoS) prioritization. The access layer connects end-user devices to the
network. This layer consists of end devices (end-users, local servers, etc.) that have local
access to the network.
The Access Layer (commonly referred to as the network edge) is where the
end-user devices connect to the network.
It provides high-bandwidth connectivity.
It provides Layer 2 Switching capabilities.
Services like Port Security, Quality of Service (QoS), ARP Inspection are
used in this layer.
Discovery and Configuration Services like CDP, LLDP also run in the Access
Layer.
This layer plays a big role in protecting the network and malicious attacks
because of its connection with the endpoints of the network.
By dividing the network into these distinct layers, hierarchical design simplifies network
troubleshooting, enhances scalability, and allows for easier implementation of changes or
upgrades. It also facilitates better resource allocation and management, as each layer can be
optimized independently based on its specific requirements and traffic patterns. Additiona lly,
hierarchical network design supports modular growth, making it easier to scale the network
infrastructure as the organization grows or evolves.
In a flat network design, there are fewer layers, and devices are interconnected without strict
hierarchy. This approach simplifies network management and reduces latency by minimizing the
number of hops between devices. However, flat networks can be more difficult to scale and secure,
especially in large environments.
Flat network design, in contrast to hierarchical network design, is a simpler and more
straightforward approach where all devices within the network are connected to a single broadcast
domain or subnet. In a flat network design, there are no distinct layers of hierarchy, and all devices
communicate with each other directly without any intermediaries.
Single Broadcast Domain: All devices within the network share the same broadcast
domain, meaning that broadcast traffic (e.g., ARP, DHCP) is forwarded to all devices on
the network segment.
Simplicity: Flat network designs are generally easier to set up and manage compared to
hierarchical designs because there are fewer devices and network segments to configure
and maintain.
Limited Scalability: While flat networks can be suitable for small to medium-s ized
environments, they may encounter scalability issues as the number of devices and traffic
volume increases. Broadcast storms and network congestion can become more common in
larger flat networks.
Increased Broadcast Traffic: Since all devices are in the same broadcast domain,
broadcast traffic can propagate across the entire network, leading to increased network
congestion and potential performance issues.
Reduced Security Control: With all devices in the same broadcast domain, it can be more
challenging to implement granular security policies and segmentation. This lack of
segmentation increases the potential attack surface and makes it harder to isolate and
contain security threats.
Flat network designs are typically found in smaller networks or environments with limited
complexity and scalability requirements, such as small offices, home networks, or some IoT
(Internet of Things) deployments. However, as the network grows in size or complexity, a
hierarchical network design is often preferred due to its scalability, performance, and manageme nt
benefits.
C. Mesh Network Design:
A mesh network consists of interconnected devices where each device can communicate directly with other
devices. This approach provides redundancy and fault tolerance, as traffic can take multiple paths between
devices. Mesh networks are often used in wireless networks and in scenarios where reliability is critical.
Enterprise Network
Enterprise network refers to the physical, virtual, or logical connectivity of the organizatio n’s
users, devices, systems, and applications. Enterprise networking refers to the interconnected
system of devices, services, and technologies that enable communication, collaboration, and
resource sharing within large organizations. The enterprise network, also known as the corporate
network, is the foundation and chief support of all communications in an organization. It facilitates
seamless file and resource sharing between different departments and teams in an organization.
The Cisco Enterprise Architecture Model (EAM) is a framework developed by Cisco Systems to
guide the design, implementation, and management of enterprise networks. It provides a structured
approach for organizing and integrating various Cisco technologies and solutions to address the
complex requirements of modern business networks.
The Cisco EAM consists of several architectural layers, each focusing on different aspects of
network functionality and management:
i. Enterprise Campus
The Enterprise Campus layer focuses on the network infrastructure within an organization's main
campus or headquarters. It includes components such as switches, routers, access points, and
servers. The goal is to provide high-speed connectivity, scalability, and flexibility to support
diverse applications and services.
The Enterprise Edge layer connects the enterprise network to external entities, such as the internet,
branch offices, remote users, and partner networks. It includes components such as routers,
firewalls, VPN concentrators, and WAN optimization devices. The Enterprise Edge provides
security, performance optimization, and connectivity to external resources.
iii. Service Provider Edge
The Service Provider Edge layer interfaces with service providers and external networks to enable
connectivity beyond the enterprise boundaries. It includes components such as border routers,
MPLS (Multiprotocol Label Switching) devices, and Internet peering connections. The Service
Provider Edge facilitates high-speed, reliable connectivity to external services and resources.
The Data Center layer hosts the organization's servers, storage systems, and applications in a
centralized facility. It includes components such as data center switches, servers, storage arrays,
and virtualization technologies. The Data Center layer provides high availability, scalability, and
performance for mission-critical applications and services.
v. Branch Office
The Branch Office layer extends the enterprise network to remote branch offices and locations. It
includes components such as routers, switches, WAN optimization devices, and security
appliances. The Branch Office layer provides connectivity, security, and performance optimiza tio n
for branch office users and applications.
vi. Teleworker
The Teleworker layer supports remote users who work from home or other remote locations. It
includes components such as VPN clients, security appliances, and collaboration tools. The
Teleworker layer ensures secure, reliable connectivity for remote users to access enterprise
resources and services.
vii. Internet/Home
The Internet/Home layer represents the connectivity to the internet and home networks. It includes
components such as broadband routers, modems, and wireless access points. The Internet/Ho me
layer provides connectivity and security for personal devices and home networks accessing the
internet.
The Cisco EAM serves as a comprehensive framework for designing end-to-end network
architectures that align with business requirements, technological advancements, and industry best
practices. It enables organizations to build scalable, resilient, and secure networks that support
their evolving needs and enable digital transformation initiatives.