Preview

Logical Network Design

Good Essays
Open Document
Open Document
719 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Logical Network Design
The Logical and Physical Design of a Network
When a network is being designed, the architect must first think about the logical layout and that should be enforced. When he figures out what devices need to communicate and how, a physical design of the network can be implemented. A logical design is the reasoning of a network, with no particular devices or locations chosen. The physical design of the network is when the devices are picked and their actual location determined.
When the logical design of a network is planned, an engineer will generally map out the logical layout and addressing of the network. This allows the person to picture the topology of the network and the addressing scheme that will be used amongst the network devices. Information must be gathered about several important factors before the logical design of the network is started. For example, depending on the services that will be provided to users, you may need to analyze the possible traffic patterns that might result from your plan. Locate potential bottlenecks and, where possible, alleviate them by providing multiple paths to resources or by putting up servers that provide replicas of important data so that load balancing can be provided. You need to determine who the clients are and what their actual needs will be. Distinguish between novice and power users. The services that will be provided on the network should also be determined during the logical planning stage. They may be limited by a scope, such as a firewall between LANs. And if so, that still doesn't account for configuring a firewall to enable access to the Internet. You may also need to determine if an Internet connection will be needed for \internal network's users and outside vendor. Will all users need to access email—both within the internal network and through the firewall on the Internet? The same goes for what sites users will be allowed to access using a network browser and other network applications. Will you have

You May Also Find These Documents Helpful

  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    The logical topologies are generally determined by network protocols as opposed to being determined by the physical layout of cables, wires, and network devices or by the flow of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely match the logical flow of data, hence the convention of using the terms logical topology and signal topology…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    Construct a diagram of the most effective structure for the organization's WAN connections and justify your choices.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Next, a physical network diagram is a diagram of the way computers are connected and placed across the network. This diagram might also include some basic addressing and the host names of the computers present on the network, making it easy to look at your network at a glance. Similar to the physical network diagram, the logical network diagram displays the layout and configuration of your network devices on an addressing level. This means that it shows their IP addresses, subnets, and other configuration details, like DNS servers, Gateways, and more. This can be extremely useful in the event of a misconfiguration, or a computer not communicating properly on the network. The configuration documentation details the configurations for all of the network’s critical systems. This will give the network administrators a backup in the event that a device crashes and the configuration is lost. Next, the regulations on the network are pretty self-explanatory. These are the guidelines that are the dos and don’ts of the workplace, keeping networks…

    • 518 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The network that I would install is a LAN network. With this network I would have an Operating System, Computers, Ethernet cables, Server, Hub, Printers and Network Adaptors. I will have a server which will be my central computer for all the data. The Hub will be connected to the Server which is where all the Ethernet cables from all the computers will be connected so that everyone has access to the internet as well as to the Operating System. The Network Adaptors will be hooked to all the computers in order to plug the Ethernet cables to all the computers. The computer will have the network adaptor connected and to it will be connected an Ethernet cable. The other end of the Ethernet cable will connect to the hub and then the hub will be connected to another network adaptor which is connected to another Ethernet cable which runs to the server. By having the network set up this way server will be able to set up who has access to what things on their computer by setting levels of security on each…

    • 803 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lan operating systems

    • 404 Words
    • 2 Pages

    Being the network administrator of the company I would install a server-based network because it allows to add more users when needed and each user has their own logon credentials which allows setting up each user with its own security restrictions. It would be setup as a LAN which gives us the ability to communicate with each user and the network administrator knows everything that is going on. The network switch would allow all computers to be linked to each other and share information through the network.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1210 Network Essay

    • 618 Words
    • 3 Pages

    10. Both logical and physical topology show how the network layout looks. With logical you see it theoretically and with physical is shows how exactly the network is really installed.…

    • 618 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Business Case

    • 2402 Words
    • 10 Pages

    Intelligent Imaging Solutions (IIS) is a public corporation that is headquartered in Dallas, TX, that competes in the global market for consumer navigation systems (GPS) and in the military defense industry. Their organization consists of two divisions. The first division produces products for consumers and the second division produces products for the military. For consumer products Intelligent…

    • 2402 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    capstone example

    • 1267 Words
    • 4 Pages

    A router is a piece of equipment that has different functionality. The first functionality that we will need from the router is the actual routing function, which sends the data to the desired workstation or other piece of equipment. The next functionality to look for when choosing a router is a built in firewall, and port forwarding. These two functions go hand in hand with each other, the firewall stops intrusions on ports that are not opened or forwarded and forwarding sends open ports to the computer that runs the server or services for the opened ports. The last functionality to look for is the ability to run a VPN; the VPN is the way in which we will actually connect our wide area network together. There are other functionalities to look for in a router such as DynDns, MAC Address Filtering, and many more. What we have chosen to use in the construction of this network is going to be the now that we have discussed the…

    • 1267 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    Designing and implementing a proper network design is an essential and yet critical step in building a reliable, top notch, network infrastructure. Developing the proper infrastructure can ensure performance at a level needed for growth and for stability all the while providing crucial time savings by minimizing the administrative workload. When designing a network you really want to implement scalability and future growth while ensuring minimal downtime and disruptions. Implementing scalability will ensure the network can grow with the organization. The network design I have implemented for UMUC which is depicted below provides scalability, security, and longevity.…

    • 1898 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Logical Design Pt. 2

    • 641 Words
    • 3 Pages

    Hello sirs, my name is , it has come to my attention that there are some misconceptions about the value in normalizing your database. I wanted to write this correspondence to address any concerns that you may have about flexibility while entering your data into the system. This letter is to assure you and the other members of your executive board that you will have some flexibility within your E-R Model.…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    If you are using the Blackboard Mobile Learn IOS App, please click "View in Browser."…

    • 317 Words
    • 2 Pages
    Satisfactory Essays

Related Topics