Networking Unit IV
Networking Unit IV
Network Design
Essentials
BASICS OF A NETWORK LAYOUT AND
STANDARD NETWORK TOPOLOGIES
07 March, 2025
Network Layout
Determine How many users Types of Required Identify needed Outline financial
network purposes or devices will applications bandwidth, low security limits and future
(e.g., file sharing, be supported? (e.g., cloud latency, and high measures expansion plans.
internet access, services, reliability. (firewalls,
VoIP, video collaboration encryption,
conferencing). tools). access controls).
Existing Infrastructure
Current
Bottlenecks Compatibility
Setup
Consider Evaluate how Look at how the Assess if the Determine the Consider the
equipment, easily additional topology network meets potential complexity of
cabling, and devices can be handles failures your speed and vulnerabilities troubleshooting
installation added as your and whether bandwidth and how easily and managing
expenses, along network grows. backup paths requirements for the network can the network
with future are available. current and be secured. day-to-day.
upgrade costs. future use.
NETWORKING
TECHNOLOGIES
START!
WIRED VS. WIRELESS
WIRELESS WIRED
TCP/IP The foundation of the internet. HTTP, FTP, SMTP, DNS, Telnet, SSH, and VoIP
HUB
A network hub is a node that broadcasts data to every
computer or Ethernet-based device connected to it.
HUB
A hub is less sophisticated than
a switch, which can isolate data
transmissions to specific devices.
Network hubs are best suited for
small, simple local area network
environments. Hubs can't provide
routing capabilities or other
advanced network services.
The “DUMB SWITCHES”
Network hubs are far less
common today
FEATURES OF HUBS
It supports half-duplex transmission
It works with shared bandwidth and broadcasting.
The hub can provide a high data transmission rate to different devices.
It can detect collisions in the network and send the jamming signal to each
port.
Hub does not support Virtual Lan and spanning tree protocol.
It is unable to filter the data and hence transmit or broadcast it to each port.
It cannot find the best route/ shortest path to send any data, which makes it
an inefficient device.
HOW IT WORKS?
Active hubs repeat and strengthen incoming transmissions. They are also
sometimes known as repeaters.
PASSIVE HUBS
INTELLIGENT HUBS
DISADVANTAGES OF HUBS
It cannot find the best/ shortest path of the network.
No mechanism for traffic detection.
No mechanism for data filtration.
Not capable of connecting to different network topologies like token ring,
ethernet, etc.
02
SWITCH
The Switch is a network device that is used to segment
the networks into different subnetworks called subnets or
LAN segments.
SWITCH
It is responsible for filtering and
forwarding the packets between
LAN segments based on MAC
address.
Switches have many ports, and
when data arrives at any port,
the destination address is
examined first and some checks
are also done and then it is
processed to the devices.
Supports different types of
communications
FEATURES OF SWITCH
It operates in the Data Link Layer in the OSI Model.
It performs error checking before forwarding data.
It transfers the data only to the device that has been addressed.
It operates in full duplex mode.
It allocates each LAN segment to a limited bandwidth.
It uses Unicast (one-to-one), multicast (one-to-many), and broadcast (one-to-
all) transmission modes.
Packet-switching techniques are used to transfer data packets from source to
destination.
Switches have a more significant number of ports.
HOW IT WORKS?
ROUTING SWITCHES
These are the switches that are used to connect LANs.They also have the work of
performing functions in the Network Layer of the OSI Model.
UNMANAGED SWITCHES
Unmanaged Switches are the devices that are used to enable Ethernet devices that
help in automatic data passing. These are generally used for home networks and
small businesses.
TYPES OF SWITCH
MANAGED SWITCHES
Managed Switches are switches having more complex networks. SNMP (Simple
Network Management Protocol) can be used for configuring managed switches.
LAN SWITCHES
LAN (Local Area Network) Switches are also called ethernet switches or data
switches.
STACKABLE SWITCHES
Stackable switches are connected through a backplane to combine two logical
switches into a single switch.
MODULAR SWITCHES
These types of switches help in accommodating two or more cards. Modular
switches help in providing better flexibility.
ADVANTAGES OF SWITCH
Prevents traffic overloading in a network by segmenting the network into
smaller subnets.
Increases the bandwidth of the network.
Less frame collision as the switch creates the collision domain for each
connection.
DISADVANTAGES OF SWITCH
It can not stop traffic destined for a different LAN segment from traveling to
all other LAN segments.
Switches are more expensive.
03
ROUTER
A Router is a networking device that forwards data
packets between computer networks.
ROUTER
One or more packet-switched
using a router.
By sending data packets to their
intended IP Addresses, it
manages traffic between different
networks and permits several
devices to share an Internet
Connection
A router has several interfaces
by which it can connect to
several host systems. Routers
are the devices that are operated
on the Network Layer of the OSI
Model, these are the most
common devices used in
networking.
HOW IT WORKS?
WIRELESS ROUTER
These routers are used to create a wireless signal in your office or home.
WIRED ROUTER
Wired Router is used to connects multiple wired devices using a Ethernet cable, It
takes the transmission data from the modem and distribute it to a further network, it
is widely used in schools and small offices.
TYPES OF ROUTER
EDGE ROUTER
These are located at the edges usually connected to an Internet Service Provider,
and distribute packets across multiple packets.
CORE ROUTER
Core routers distribute packets within the same network. The main task is to carry
heavy data transfers.
TYPES OF ROUTER
VIRTUAL ROUTER
They are implemented using a software on the virtual machine , and they are more
flexible and scalable.
PORTABLE ROUTER
They are used to create private Wi-Fi and hence designed for easy portability.
FUNCTIONS OF A ROUTER
FORWARDING
The router receives the packets from its input ports, checks its header, performs
some basic functions like checking checksum, and then looks up to the routing
table to find the appropriate output port to dump the packets onto, and forwards
the packets onto that output port.
ROUTING
Routing is the process by which the router ascertains what is the best path for the
packet to reach the destination
SECURITY
Routers can be configured with firewalls and other security features to protect the
network from unauthorized access, malware, and other threats.
QUALITY
outers can prioritize network traffic based on the type of data being transmitted.
BANDWIDTH MANAGEMENT
Routers can be used to manage network bandwidth by controlling the amount of
data that is allowed to flow through the network.
DISADVANTAGES OF ROUTER
Slower
High Cost
Need for Configuration
Quality Issues
Bandwidth Shortages
Host A Host C
04 Hub 1
Bridge
Hub 2
Host B Host D
BRIDGE
ABOUT US
A bridge connects two or more network segments at Layer 2
(Data Link Layer) to make them function as a single network.
What is a MAC
Address?
Host A Host C
Source
Transparent Translational
Routing
Bridge Bridge
Bridge
Works invisibly, Converts and transmits
forwarding or blocking Used in token ring data between different
data based on MAC networks, it embeds network types, such as
addresses. It does not the entire route in data Token Ring and
require network frames. The source Ethernet. It enables
reconfiguration when station defines the communication between
devices are added or exact path the data incompatible networking
removed. must follow. systems.
ADVANTAGES AND BRIDGE
DISADVATAGES
Advantages Disadvantages
Improve bandwidth with separate collision Slower due to additional processing of MAC
domains. addresses.
Support different MAC protocols with Cannot filter individual data in high broadcast
buffering. traffic.
Easy to install with high reliability and Susceptible to broadcast storms in large
maintainability. networks.
Local Network
Local
05 Gateway
Network
Server
Local Network
GATEWAY
ABOUT US
A gateway connects two different networks with different
communication protocols (operates at multiple OSI layers).
OSI MODEL
Physical Layer – Deals with the physical connection of devices and the transmission
1
of raw bits (0s and 1s) over cables, radio waves, or fiber optics.
Data Link Layer – Manages the transfer of data frames between two devices on the
2
same network and handles error detection (e.g., MAC addresses).
Network Layer – Responsible for routing data between different networks using IP
3
addresses (e.g., routers).
Transport Layer – Ensures reliable data transfer, error correction, and proper
4
sequencing (e.g., TCP, UDP).
Session Layer – Establishes, maintains, and terminates communication sessions
5
between devices.
Presentation Layer – Translates data formats, encrypts/decrypts data, and
6
compresses information for applications (e.g., JPEG, SSL/TLS encryption).
Application Layer – Provides network services directly to users, such as web
7
browsing (HTTP), email (SMTP), and file transfer (FTP).
HOW GATEWAY WORKS
(Based on Functionaliy)
TYPES OF GATEWAYS
(Based on the Direction of the flow of data)
Unidirectional Bidirectional
Gateways Gateways
Network Gateway
Used in enterprise networks, ISPs, and homes to connect different
networks with different protocols.
TYPES OF GATEWAYS
(Based on Functionaliy)
MODEM
ABOUT US
A modem (MOdulator-DEModulator) converts digital signals to
analog for transmission over telephone lines and vice versa.
HOW MODEM WORKS
DIAL-UP MODEM
Uses telephone lines, slow speeds (up to 56 Kbps)
TYPES OF MODEM
DSL MODEM
Uses telephone lines but allows internet and voice
simultaneously.
TYPES OF MODEM
CABLE MODEM
Uses coaxial cables for high-speed internet.
TYPES OF MODEM
WIRELESS MODEM
Uses cellular networks (4G/5G) for internet access.
ADVANTAGES AND MODEM
DISADVATAGES
Advantages Disadvantages
Converts digital signals into analog for Limited number of network devices can
communication. connect.
REPEATER
ABOUT US
EXTENSION INTRICACY
It regenerates signals. It adds complexity in
the network.
RELIABLE COST
It reduces error and Repeater needs
loss of data. power.
TYPES OF REPEATERS
Analog
Repeater
Digital
Repeater
Wired
Repeater
Wireless
Repeater
Local
Repeater
Remote
Repeater
Optical Telephone
Repeater Repeater
01 02 03 04
Microwave Radio
Repeater Repeater
In microwave repeaters high It transmits all the received
power transmitters and data into radio signals.
sensitive receivers are used.
ADVANTAGES
EXTENDS
$20 $22 $28
BETTER ENHANCED
THE
PERFORMANCE SIGNALS
NETWORK
for better transmission for better reliability for long distances
of data
DISADVANTAGES
ABOUT
ACCESSUS POINT
It provides other locations to connect.
ACCESS
POINT
An access point (AP) is a term
used for a network device that
bridges wired and wireless
networks.
TYPES OF ACCESS POINT
According to According to
Application Frequency Band
According to According to
Installation Method Controller Needed
Application
Commercial
AP
Enterprise-level
AP
In-wall
AP
Ceiling
AP
Single-Frequency
AP
Dual-Frequency
AP
Single- Controller-
AP Needed AP
IP Allocate IP addresses
Addressing efficiently.
Develop an IP addressing
scheme that is scalable and Subnetting
efficient.
01 02 03 04
Firewalls VPNs
Implement firewalls to control Provide secure remote access.
network traffic and prevent
unauthorized access.
NETWORK SECURITY
Encryption
05 06 07
Security User
Audits Authentication
Regularly check the network for Implement strong password
vulnerabilities. policies, and multi factor
authentication.
NETWORK PERFORMANCE AND
RELIABILITY
Bandwidth Monitoring
Planning and
Estimate bandwidth Management
requirements and ensure Use network monitoring tools
sufficient capacity. to track performance and
identify potential problems.
Redundancy Quality of
Service
Implement redundant links (QoS)
and devices to prevent single
Prioritize traffic based on
points of failure.
application needs.
08
Performing Basic
ABOUT US
Network Services
Introduction
Topic #4 Documentation
Benefits
Security Considerations
1 4
Done
5
3
Topic #2 Folder Redirection
Benefits
Security Considerations
1 2
Topic #3 Remote Desktop Configuration
Benefits
Security Considerations
Enable Network Level Authentication (NLA) to require authentication before connecting.
Use strong passwords and enable two-factor authentication (2FA).
Restrict RDP access to trusted devices and IP addresses using firewall rules.
Change the default RDP port (3389) to a non-standard port for added security.
Monitor RDP logs to detect unauthorized access attempts.
Topic #3 Steps to Configure Remote Desktop
1 2 3 4
5 6 7 8
Topic #4 Documentation