Cisco Semester 4
Cisco Semester 4
COURSE OUTLINE
-Principles of network design and architecture
-Ip addresses schemes and subnetting
-Network documentation and drawing tools(CISCO packet Tracert).
-Implementing and Troubleshooting small to meduim size network.
3.1) NETWORK DESIGN GOALS.
A) SCALABILITY
DEFINITION: The ability of a network to grow and accomodate more
users,devices,or app without significant re-design.
IMPORTANCE
_Ensure that the network can handle future demands ,such as increase traffic or
additional branches.
EXAMPLE
{Adding more switches to support new users in an office.
{Upgrading bandwidth to support new applications.e.g VIDEOCONFERENCING
IMPLEMENTATION
__-Use modular hardwares(scacable switch)
__-Design with expandable ip adressing.(.e.g VLSM).
__-Implement scalable routing protocols(e.g OSPF,EIGRP).
B) RELIABILITY
DEFINITION: RELIABILTY ensures minimal down time and fault tolerances by
designing a network that can recover quickly from failures.
IMPORTANCES
_Reliability is critical for bussinesses,thet depend on constant connectivity.eg
MICRO-FINANCE,E-COMMERCE,HEALTHCARE ETC
EXAMPLE~~~~
{Use redundant link btw switches to prevent single points of failure.
{Implementing Backup poer supply(UPS)
IMPLEMENTATION
__-Use redundant hardware ( Dual routers, Dual switches).
__-Implement protocol for fault tolerance(HSRP, VRRP).
__-Regularly test backup systems and disaster recovery plans
C) PERFORMANCE
DEFINITION:It is the optimising of speed, latency and throughput to
ensure efficient data transfer
IMPORTANCE
_Performance ensures a good user experience and support bandwidth intensive
application.
EXAMPLE
{Upgrading to Gigabitethernet cable for fast data transfer.
{Iplemeting quality of Services (QoS) to proiritise VoIP over less critical
traffic.
IMPLEMENTATION
__-Use high performance hardware (switches with high throughput).
__-Optimise routing protocols for faster convergence.
___Monitor networ performance using tools like Netflow,PRTG
D) SECURITY
DEFINITION: It is the protection of data and resources from unauthorised
access,attacks,and breaches.
IMPORTANCE
_Security prevent data loss,Financial damage,and reputational harm
EXAMPLE
{Implementing firewalls to block unauthorised access.
{Using VPNs to encrypt data over public network
IMPLEMETATION
__-Use access control list (ACL) to filter traffic.
__-Enable encryption (eg SSL/TLS,IPSEC).
__-Regularly update firmware and software to patch vulnerabilities.
E) COST EFFECTIVENESS
DEFINITION:THIS ensures balancing performance and budget by
optimising resource allocation
IMPORTANCE
_Ensures that the network delivers value witout overspending.
EXAMPLE
{-Using opensource tools(PFsense).
{-Choosing cost effective hardware that needs perfomance requirements