Network Design Consultation
March 13 , 2013
Network Design Consultation
Network diagrams are schematic displays of project schedule activities and the interdependencies between these activities. When developed properly, this graphical view of a project’s activities conveys critical schedule characteristics required to effectively analyze and adjust schedules – thus resulting in ...view middle of the document...
Application of routing protocols
Function of routing protocols
The routing protocol main functions are:
• Discovers directly connected neighbors
• Propagates routing information/ advertising known routes
• Update routing table
• Prevention of routing loops
The router establishes a connection between neighboring routers and then begins exchanging routing updates about each routers directly connected networks. The router updates all new information into its own routing table. Some protocols send routing updates when a specific timer elapses, or when a topology change occurs. Topology changes include:
• Failure of a link
• Introduction of a new link
• Router malfunction or failing
• Link configuration change
The updates that are sent can include the complete routing tables. EIGRP sends bounded updates which are non-periodic and are only sent to router that require that information which will have less impact on the performance of the network.
Top of Form
Developing security strategies that can protect all parts of a complicated network while having a limited effect on ease of use and performance is one of the most important and difficult tasks related to network design. Security design is challenged by the complexity and porous nature of modern networks that include public servers for electronic commerce, extranet connections for business partners, and remote-access services for users reaching the network from any ware, customer sites, hotel rooms, Internet cafes, and so on. To help you handle the difficulties inherent in designing network security for complex networks, this will help teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products (Dean, 2010).
The goal is to help you work with your network design customers in the development of effective security strategies, and to help you select the right techniques to implement the strategies. The describes steps for developing a security strategy and covers some basic security principles. The presents a modular approaches to security design that will let you apply layered solutions that protect a network in many ways. The final sections methods for securing the components of a typical home network that are most at risk, including Internet connections, remote-access networks, network and user services, and wireless networks.
Network design should be a complete process that matches the customers’ needs to available technology to deliver a system that will maximize an organization’s success.
• In the LAN area it is more than just buying a few devices.
• In the WAN area it is more than just calling the phone company.
• A focus is placed on understanding data flow, data types, and processes that access or change the data.
However a focus is placed on understanding the location and needs of user communities that access or change data and processes. Therefore, several techniques and models can be used to characterize the...