Network Design Consultation

Topics: Routing protocol, Virtual private network, Routing Pages: 5 (1565 words) Published: February 28, 2013
Network diagrams are schematic displays of project schedule activities and the interdependencies between these activities. When developed properly, this graphical view of a project’s activities conveys critical schedule characteristics required to effectively analyze and adjust schedules – thus resulting in accurate and feasible schedules. This document addresses what should be considered in the development of a network diagram, how network diagrams are created, and how they may be analyzed to identify necessary corrective actions and ensure optimal schedule definition. Development stage – initial development

Function of routers
The routers in the network provide a gateway between the networks. Router 1 will provide a gateway to the Internet, Router 2 will provide a gateway between the workgroup networks; file server web server and the Isolation LAN, which will connect the administration network and the isolation LAN. The routers will select the best path using a metric which can be calculated on Hop count, bandwidth, delay, reliability and Load. The metric hop count is used by OSPF (Open Shortest Path First) and RIP (Router Information Protocol), hop count is the number of routers the packet has to cross between source and destination. EIGRP (Enhanced Interior Gateway Routing Protocol) uses bandwidth and delay as default metrics but can also be configure to include bandwidth and reliability in this calculation which is a much more precise metric than Hop count. The routers are located in the core layer of the network and provide a gateway to the WAN. Application of routing protocols

Function of routing protocols
The routing protocol main functions are:
Discovers directly connected neighbors
Propagates routing information/ advertising known routes •Update routing table
Prevention of routing loops
The router establishes a connection between neighboring routers and then begins exchanging routing updates about each routers directly connected networks. The router updates all new information into its own routing table. Some protocols send routing updates when a specific timer elapses, or when a topology change occurs. Topology changes include: •Failure of a link

Introduction of a new link
Router malfunction or failing
Link configuration change
The updates that are sent can include the complete routing tables. EIGRP sends bounded updates which are non-periodic and are only sent to router that require that information which will have less impact on the performance of the network. Top of Form

Developing security strategies that can protect all parts of a complicated network while having a limited effect on ease of use and performance is one of the most important and difficult tasks related to network design. Security design is challenged by the complexity and porous nature of modern networks that include public servers for electronic commerce, extranet connections for business partners, and remote-access services for users reaching the network from any ware, customer sites, hotel rooms, Internet cafes, and so on. To help you handle the difficulties inherent in designing network security for complex networks, this will help teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products (Dean, 2010). The goal is to help you work with your network design customers in the development of effective security strategies, and to help you select the right techniques to implement the strategies. The describes steps for developing a security strategy and covers some basic security principles. The presents a modular approaches to security design that will let you apply layered solutions that protect a network in many ways. The final sections methods for securing the components of a typical home network that are most at risk, including Internet connections, remote-access networks, network and user services, and wireless networks. Network design...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Logical and Physical Network Design Essay
  • Logical vs. Physical Network Design Essay
  • Network Design Essay
  • Network design Essay
  • Network Design Essay
  • Design a Campus Network Essay
  • Essay about Network Design
  • Essay about Network Design

Become a StudyMode Member

Sign Up - It's Free