Communication Network Design
Communication Network Design
LCD PRESENTATION
By-
Aagam Jain (02411503122)
Tanya Rathore (01311503122)
Abhishek (03611503122)
What is communication network ?
Communication network design is the process
of creating a network infrastructure that enables
communication between different devices and
applications. It involves designing a network
topology, selecting network protocols, and
implementing network security measures to
ensure that the network is secure and reliable.
Why is network design important ?
BUISNESS NEEDS
• When designing a communication network, it is important to consider the business needs of
the organization. This can help ensure that the network design meets the specific
requirements of the business and is aligned with its goals and objectives. For example, if the
organization is a small business, it may require a simple network design that is easy to
manage and maintain. On the other hand, if the organization is a large enterprise, it may
require a more complex network design that can support a large number of users and
applications.
Technical requirements
• When designing a communication network, it is
important to consider the technical requirements
of the organization. This can help ensure that the
network design meets the specific technical needs
of the business and is aligned with its goals and
objectives. For example, if the organization
requires high-speed data transfer, it may require a
network design that can support high bandwidth
and low latency. On the other hand, if the
organization requires high availability, it may
require a network design that can support
redundant links and failover mechanisms.
Network topology
•Routers: A router connects two or more networks. One common use of the
router is to connect a home or office network (LAN) to the internet (WAN). It
generally has a plugged-in internet cable along with cables that connect
computers on the LAN. Alternatively, a LAN connection can also be wireless
(Wi-Fi-enabled), making the network device wireless. These are also referred
to as wireless access points (WAPs).
Network Hardware
•Network interface cards: A network interface card (NIC) is a
hardware unit installed on a computer, which allows it to
connect to a network. It is typically in the form of a circuit
board or chip. In most modern machines, NICs are built into the
motherboards, while in some computers, an extra expansion
card in the form of a small circuit board is added externally.
•Network cables: Cables connect different devices on a network.
Today, most networks have cables over a wireless connection as
they are more secure, i.e., less prone to attacks, and at the same
time carry larger volumes of data per second.
Network software
Network software is an umbrella term used to
describe a wide range of software that streamlines
the operations, design, monitoring, and
implementation of communication networks.
Network software plays a crucial role in managing a
network infrastructure and simplifying IT operations
by facilitating communication, security, content, and
data sharing.
Key Components of Network Software
1) Network storage software
Network storage software allows businesses to utilize
a standard interface that manages countless databases
between users or clients. It serves as a good manager
of access between various departments or essential
communities within an organization. This way,
anybody having access can view or retrieve
information with just a click, and at the same time,
security concerns are also taken care of.
2) Patch management software
As the name suggests, patch management software aids in the smoother
management of updates across numerous devices on the network through the
installation of patches. This makes the process more seamless and enables each
machine to download a patch managed by central software and run updates
automatically. Patch management software is the more hassle-free and effective
way to perform continuous updates across devices and systems in an organization.
3) Security surveillance software
A majority of network software focuses on data storage and linking devices.
However, they do not incorporate protection for a network. This is where security
surveillance software comes into the picture. It monitors and connects the various
security solutions within a network. Specific software is ideal for large networks as
it effortlessly links throughout locations and provides credible browser-based live
and recorded footage to an organization.
Network security measures
What exactly is network security? Put simply,
it’s the system used to secure data and
resources against potential threats and
unauthorized access. There are several ways to
ensure network security, and the most
successful network security systems utilize a
variety of components to create a well-
rounded overall strategy.
1) Firewalls
A firewall is a barrier or filter between a given
network and the outside world or the internet at
large. It is responsible for screening the information
that enters or exits a network and tracking that
information. Firewalls serve as the front-line defense
for any network security system, keeping out
unauthorized entities seeking to access the system’s
data. A fine-tuned, updated, and responsive firewall
is one of the most important components of a
network security system.
2) Access control
Access control refers to the systems and protocols an organization has
in place to make sure that only authorized users can enter the network
and access the data and information stored there. The most common
tool for access control is identity and access management (IAM), which
is standard in all network security protection systems.
IAM is a comprehensive strategy that covers all of an organization’s
data—both in the cloud and in house—and implements keys and locks
for every person authorized to access it.
3) Intrusion Prevention System
• One of the key trends that will shape the future of communication
networks is the increasing demand for high-speed data transfer. This will
require networks that can support high bandwidth and low latency,
which can be achieved through the use of technologies such as 5G and
fiber optic cables. Another trend is the growing importance of network
security, which will require the development of new security measures to
protect against cyber threats .
https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-network-design.html
https://www.bing.com/search?q=Bing+AI&showconv=1&FORM=undexpand
https://clearinfo.in/blog/what-is-communication-network/
https://www.educba.com/types-of-communication-network/
https://www.spiceworks.com/tech/networking/articles/what-is-network-hardware/
https://www.spiceworks.com/tech/networking/articles/what-is-network-software/
https://www.eccouncil.org/cybersecurity-exchange/network-security/what-is-network-security-types-network-security-measur
es/
THANK YOU