The following assignment discusses the topic Network design and Implementation of a secure corporate network. The assignment focuses on the three principles for successful architecture of network that is modularity, hierarchy, and resiliency. The assignment further discusses the hierarchy and its three layers. Those are the access layer, distribution layer and the core layer respectively. The assignment finally discusses ways for the successful network design and implantation that includes security.
The network technology has helped the business to increase their productivity and helped to gain the competitive advantage in the market. Since the time the internet has been invented the network system had evolved and become the key element in business network infrastructure . There are three categories of the network known as the LAN(local area network) used in a premises or a organization, MAN(metropolitan area network) used in geographic area mainly a city, WAN(wide area network) used to various LANs if they are in different cities. The organization generally prefers LAN over others.
For the efficient and continuous exchange of data between the departments of the company it requires a design a successful architecture of the network, to obtain a successful architecture it requires a perfect design theory and related principles . The architecture design overview and the related principles depend on the four engineering and architectural principles, which are: modularity, hierarchy, and resiliency.
Hierarchy is the principle key for the successful architecture of a company network. Hierarchy means to rank the particular set of the systems according to its rank or authority. Through hierarchy the complex design models of the network is fragmented into the simpler and the more efficient network into different levels . Each level is then assigned for specific function. The benefit of this process is it allows network designers flexibility in the network system and allows to select the right equipment be it a hardware or software that has the ability performing specific tasks in each of the network layers. The fundamental network design that is the hierarchical design is made of three layers. These are: access layer, distribution layer and the core layer respectively.
It is the critical layer of the hierarchical model as it is concerned with the high speed and effective redundant forwarding of the data so that the data packets can move fast and efficiently between the distribution layers. The example of the core layer is the “10 Gigabit Ethernet”.
The distribution layer of the hierarchical model is considered to be the smart layer as it is concerns with filtering, routing and the “Quality of the services” policies . The other function of the distribution layer is that it manages the WAN connection of the different branch of the organization.
The access layer of the hierarchical model connects the companies through their servers and the end stations. The main focus of the access layer is to minimize the investment that the company takes for each provisioned Ethernet port which is known as "cost-per-port", it connects the client nodes and therefore it is also called the desktop layer.
After applying the hierarchical model to build network architecture the next principle is modularity. Modularity means to apply a module on the basis of design. Huge network architecture projects are made of various modules and fileds . All the individual areas requires to be planned in a top-down manner following the redundancy and hierarchy in a systematic manner. Using modular design architecture it provides the option of network flexibility that provides more options for the changing business needs . The result of the network flexibility in the modular layer provides modification and up gradations that will be applied in a more organised way.
The last principle of efficient network design is the resiliency. Resiliency means to recover quickly from the difficulty. The two principles modularity, hierarchy are the important part of the successful network design but these two principles are still not enough to provide the flexibility and scalability to the network. Hence to complete the requirement resiliency is also needed in network architecture. A fundamental feature of the resiliency principle is the ability to perform in both normal and abnormal conditions . The abnormal conditions may include the failure of hardware and software, huge traffic loads, unusual traffic problems, denial-of-service (Does) or any such events whether done intentional or unintentional or any unplanned event.
Ways for the successful network design and implantation
Following are the simple steps which can be implemented to make the network stable, secure and last enough to implement the new services .
The foremost and important factor of establishing a better network is the best security for its data. The company should install a powerful firewall for it network in order to protect its confidential data .
Routing where Needed
Router is an important part of the network design where it helps to solve the connectivity problems. However, it may increase the problems than its reduction. In addition, the way it increases the network speed that is not measurable at many times. This complex distribution of routing leads towards the problems regarding its security and the way it is managed.
From this assignment it can be concluded that to design an efficient architecture of the network of the company for continuous exchange of data between the departments of the company, three principles must be followed which are modularity, resiliency and hierarchy. The modularity and hierarchy are concerned with fragmenting of the network into the simpler and the more efficient form and providing these network flexibility and scalability. The resilience part of the network is concerned with functionality of the network in both normal and abnormal condition. The assignment further concludes that for the network to be last long and function successfully it should also focus on the network security.
- Ramamurthy B. Design of optical WDM networks: LAN, MAN and WAN architectures. Springer Science & Business Media; 2012 Dec 6.
- Reymann AC, Boujemaa-Paterski R, Martiel JL, Gu?rin C, Cao W, Chin HF, Enrique M, Th?ry M, Blanchoin L. Actin network architecture can determine myosin motor activity. Science. 2012 Jun 8;336(6086):1310-4.
- Wolf T, Griffioen J, Calvert KL, Dutta R, Rouskas GN, Baldine I, Nagurney A. Choice as a principle in network architecture. ACM SIGCOMM Computer Communication Review. 2012 Sep 24;42(4):105-6.
- Jin J, Gubbi J, Luo T, Palaniswami M. Network architecture and QoS issues in the internet of things for a smart city. InCommunications and Information Technologies (ISCIT), 2012 International Symposium on 2012 Oct 2 (pp. 956-961). IEEE.
- Luo J, Baldwin CY, Whitney DE, Magee CL. The architecture of transaction networks: a comparative analysis of hierarchy in two sectors. Industrial and Corporate Change. 2012 Mar 15;21(6):1307-35.
- Sterbenz JP, ?etinkaya EK, Hameed MA, Jabbar A, Qian S, Rohrer JP. Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation. Telecommunication systems. 2013 Feb 1;52(2):705-36.
- Mincher RW, Butler DG, Young RD, Mader TB, inventors; Amazon Technologies, Inc., assignee. Secure wireless network credential sharing. United States patent US 9,301,141. 2016 Mar 29.
- John P, inventor; VMware, Inc., assignee. Secure enterprise network. United States patent US 8,166,554. 2012 Apr 24.