Network design
Network design
INSTITUTE OF TECHNOLOGOY
FACUALTY OFCOMPUTINGANDINFORMATICS
DEPARTEMNT OF INFORMATION TECHNOLOY
Group Members ID
1 Biruk Moges Ru 0063/12
2 ashenafi kifle Ru 2271/12
3 dagmawi mulutseha Ru 0070/12
4 Dawit senaber Ru 1721/12
5 endris asefa Ru 1007/12
6 Tsega tadesse Ru0262/12
7 tsegaye tadesse Ru 1943/12
Campus networking refers to the networking infrastructure that connects all the
buildings on a corporate or educational campus or urban network. It is primarily
concerned with the design and implementation of LAN (Local Area Network)
infrastructure and its connectivity to WAN (Wide Area Network) and cloud-based
services. The enterprise campus design comprises the network topology, protocols,
security layers, redundancy, and the various components that make up a campus
network.
The campus, as a part of the enterprise network, is generally understood as that
portion of the computing infrastructure that provides access to network
communication services and resources to end users and devices spread over a single
geographic location. It might span a single floor, a building, or even a large group of
buildings spread over an extended geographic area. Some networks have a single
campus that also acts as the core or backbone of the network and provides inter
connectivity between other portions of the overall network. The campus core can
often interconnect the campus access, the data center, and WAN portions of the
network. In the largest enterprises, there might be multiple campus sites distributed
worldwide with each providing both end-user access and local backbone connectivity.
Once the network topology has been selected, the next step is to identify the devices
required to support it.
These devices include core switches, edge switches, routers, firewalls, wireless
access points, and load balancers.
It is recommended to choose devices that are scalable, compatible with network-based
applications and services, and meet the performance requirements of the network.
Devices should also be configured for redundancy to avoid a single point of failure
and maintain high network availability.
An effective way to manage network traffic and minimize security risks is to segment
the network into smaller subnets. Each subnet can then be managed independently by
a separate network administrator, reducing the complexity of the network.
segmenting the network into smaller subnets also makes it easier to troubleshoot
network issues. When a problem occurs, network administrators can quickly identify
the affected subnet and isolate the issue. This reduces the time and effort required to
troubleshoot and resolve network issues.
Network segmentation can be done at different layers of the OSI model. It can be
done at layer 2 (Data link layer) using VLANs (Virtual Local Area Networks) or at
layer 3 (Network layer) using IP subnets. Application segmentation involves
segmenting and preventing lateral movement at layer 7 of the OSI model or the
Application Layer.
Step 5: Implement Network Security Measures
Data security is a critical aspect of any network design. It involves implementing
measures such as firewalls, intrusion detection and prevention systems, access control
lists, and virtual private networks (VPNs). These security features help protect the
network from unauthorized access and mitigate the risk of cyber threats.
Q4. Discuss the QoS Considerations in LAN Switches Here are some
of the key considerations:
Traffic Policing and Traffic Shaping: Traffic policing and traffic shaping are used
to control the rate of traffic entering or leaving a network. Traffic policing drops
packets that exceed the configured rate limit, while traffic shaping buffers packets
and sends them at a controlled rate.
Link-level QoS: QoS can be implemented at different layers of the OSI model.
Link-level QoS mechanisms such as IEEE 802.1Q, IEEE 802.1p, and
Differentiated Services Code Point (DSCP) can be used to provide QoS at the
link layer.
QoS policies should be designed from the high-level requirements gathered in the
project planning stage. By following best practices and industry standards, network
designers can create a network that meets the business requirements and goals. When
possible, follow industry standards when deploying QoS policies to align with service
providers and business partners. Mark packets as close to the source as possible to
ensure that the packets are marked correctly. Perform QoS in hardware where there is
no performance impact. If you must perform QoS in software, ensure your devices are
sized appropriately and don’t become a bottleneck.
In conclusion, QoS is an essential consideration when designing LAN switches.
Traffic classification, traffic policing, traffic shaping, congestion management, and
congestion avoidance are the foundations for a network to provide QoS. By following
best practices and industry standards, network designers can create a network that
meets the business requirements and goals.