LESSON 1
Introduction to Network Design
Quick Recap
What is a computer network?
• A computer network is a group of computer systems
and other computing hardware devices that are
linked together through communication channels to
facilitate communication and resource-sharing
among a wide range of users.
Types of networks
based on their geographic extension.
• A personal area network (PAN) is a computer
network used for communication among
computers and different information technological
devices close to one person. Some examples of
devices that are used in a PAN are personal
computers, printers, fax machines & telephones.
Types of networks
Classification based on their geographic
extension
LAN
• Scale – occupy the space of a room or a building.
• Elements: Clients, server, switches, access points, printers
and router to exit the LAN.
• Typical speed: 100mbps to 1gbps – meant for nearby
communication between devices
Types of networks
Classification based on their geographic
extension
Backbone
• In a site you can have multiple buildings.
• Scale: less than a few kilometres
• Elements: LANs, high speed switches or routers, high speed circuits (on
fiber optic cable) to interconnect LANs on different buildings.
• Typical speed: from 1 gbps to 40 gbps
• A backbone is a part of computer network that tie together diverse
networks in the same building, in different buildings in a campus
environment, or over wide areas.
Types of networks
Classification based on their geographic
extension
• Metropolitan Area Network (MAN)
• Broader extension covering a town, a city or a region.
• (eg a firm having multiple branch offices in multiple locations within a region or city)
• Scale: more than a few kilometres
• Elements: LANs, Backbone Networks, Circuits are normally leased to Network providers (eg
cable companies). It is less expensive to lease than to privately lay down fiber optic cables
over long distances.
• The alternative is to have a point to point connections through microwaves – this requires a
straight line of sight for it to work. This is generally expensive.
• A cheaper alternative would be the use of VPN tunnels as a way to communicate between
one branch office and another.
• Typical speeds: from 64 kbps to 10 gbps
• Note: 64kbps is the lowest rate to have VOIP conversation.
Types of networks
based on who can access the network.
• Campus area network (CAN)
- is a set of LAN segments and building networks in an area
that is generally less than a mile in diameter.
• A home area network (HAN) is a residential LAN used
for communication between digital devices typically
deployed in the home, usually a small number of
personal computers and accessories, such as printers
and mobile computing devices.
• A storage area network (SAN) is a dedicated network
that provides access to consolidated, block level data
storage & used to make storage devices, such as disk
arrays and tape libraries.
Types of networks
Classification based on their geographic
extension
Wide Area Network (WAN)
• Extends MANs to a much bigger scale.
• WANs are used to interconnect multiple operations across the
globe for a single firm.
• Scale: more than tens or hundreds of kilometres, usually
international.
• Elements: same as MANs, but a greater distance
• Typical speeds: from 64Kbps to 10Gbps
Types of Wide Area Networks (Cont’d)
WANs can be further classified into two categories:
• Enterprise WANs. An enterprise WAN is a WAN that
connects the widely separated computer resources of a
single organization. An organization with computer
operations at several distant sites can employ an enterprise
WAN to interconnect the sites. An enterprise WAN can use a
combination of private and commercial network services but
is dedicated to the needs of a particular organization.
9
Types of Wide Area Networks
A global WAN interconnects networks of
several corporations or organizations. An
example of a global WAN is the Internet.
10
Types of networks
based on who can access the network.
• Intranet: is only accessible by internal members of the
organization.
• The employees can collaborate using a central
information system (e.g ERP through an intranet)
• The employees can collaborate on a LAN or WAN
• The employees on the move can access sensible data
from a re,mote location through a VPN
Types of networks
based on who can access the network.
• Extranet – this is a network that is accessible for
people or entities external to the organization.
• E.g. clients and providers logging into an
inventory system over the extranet.
• Public e-commerce websites
• WIFI network for customers
What is Network Design
• Network design refers to the planning of the
implementation of a computer network infrastructure.
• Network design involves evaluating, understanding and
scoping the network to be implemented. The whole
network design is usually represented as a network
diagram that serves as the blueprint for implementing
the network physically.
• **Analogy of building a house
Network Design
• Typically, network design includes the following:
• Logical map (displays how information flows through a network) of
the network to be designed. To achieve this, you need to have
gathered information about network devices, routing protocols
and subnets.
• Cabling structure
• Quantity, type and location of network devices (routers, switches,
servers, Clients etc)
• IP addressing structure
• Network security architecture and overall network security
processes
• Network design is generally performed by network designers,
network engineers, network administrators and other related
staff.
• NOTE: Network design is done before the implementation of a
network infrastructure.
Network Infrastructure explained
• Network infrastructure refers to the
hardware and software resources of an
entire network.
• A typical network infrastructure includes:
• Networking Hardware:
– Routers
– Switches
– LAN cards
– Cables
– Access points
……….
Network Infrastructure explained
• Networking Software:
– Network operations and management/NOC from where network monitoring
and control is exercised over a computer.
• Operating systems: e.g Debian , Ubuntu, Windows server
– Firewall: e.g samba firewall
– Network security applications/Tools e.g. Intrusion detection and
prevention system, Anti-malware etc
•
• Network Services:
– T-1 Line – a dedicated transmission connection between a service
provider and client
– Digital subscriber line (DSL) – used to transmit digital data over telephone
lines.
– Satellite
– Wireless protocols
– IP addressing
Types of Network Design
• New network design
• Re-engineering a network design
• Network expansion design
17
New Network Design
• Actually starting from scratch
• No legacy networks to accommodate
• Major driver is the budget, no compatibility
issues to worry about
• Getting harder to find these situations
18
Re-engineering a Network Design
• Modifications to an existing network to
compensate for original design problems
• Sometimes required when network users
change existing applications or
functionality
• More of the type of problems seen today
19
Network Expansion Design
• Network designs that expand network
capacity
• Technology upgrades
• Adding more users or networked
equipment
20
Compare and contrast the top-down and bottom-up design approaches
• Choosing the design approach that best fits your needs will
result in a stronger network.
• Recognizing the pros and cons of each approach can help
you build the case for the appropriate choice, giving you the
opportunity to build a network that will meet the needs of
the project or organization — and improve network
performance.
Bottom up approach begins with the physical layer of the
OSI model and works its way up. New, higher bandwidth
links might be purchased, as well as new routers, switches,
firewalls, etc. Designing a network with a bottom-up
approach enables you to get your network set up much faster.
• Top-down approach is a methodology for designing networks
that begins at the upper layers of the OSI reference model
before moving to the lower layers.
• This means that it focuses on applications, sessions, and data
transport before the selection of routers, switches, and media
that operate at the lower layers (layer 3, layer 2 and layer 1
respectively)
• The application layer is the starting point, and the applications
and services that are desperately needed are analyzed for their
specific requirements first.
• Top-down network design also is iterative (repeated cycle of
operations). A process for arriving at the desired results by
repeating rounds of analysis. **differentiate between a waterfall
life cycle and a spiral life cycle)
• Determine what applications will run on the network and how
those applications behave on a network.
Waterfall life cycle
• The waterfall life cycle is defined by distinct stages.
• Different waterfall-based processes have different names for the
stages, but they all tend to follow these five general steps, in
order: 1. Analyze 2. Design 3. Build 4. Test 5. Deploy
• This life cycle is called a waterfall, because work “flows down”
from one stage into the next.
• After the system is deployed, the life cycle begins again for the
next update.
Spiral cycle
• The spiral cycle is a variation of the waterfall cycle.
• It meant to overcome some of the limitations of the waterfall cycle. This cycle is
often used in multiple-version software development projects; however, some of
its principles can be applied to network development as well.
• The guiding principle behind the spiral cycle is change management. Unlike the
waterfall cycle, the spiral cycle can adapt quickly to new requirements.
• This is accomplished by looping through all stages several times, producing a
limited version of the project each time
Recall
Layers of the OSI /TCP/IP Model
PROTOCOLS AND THE TCP/IP LAYERS
• Application layer –
• HTTP - The Hypertext Transfer Protocol
• FTP - File Transfer Protocol
• POP3 - Post Office Protocol 3
• HTTPS - Hyper Text Transfer Protocol Secure
• SMTP - Simple Mail Transfer Protocol
• SNMP - Simple Network Management Protocol
• SSH - Secure Shell
• TELNET
• DNS - domain name system
27
PROTOCOLS AND THE TCP/IP LAYERS (Cont’d)
• TRANSPORT layer protocols:
• Transmission Control Protocol (TCP) –
guarantees end to end delivery of data
• User Datagram Protocol (UDP)
• Internet protocol (IP)
• Internet Control Message Protocol (ICMP)
• Address Resolution Protocol (ARP)
28
Network Access Layer Protocol
• Microwave
• Ethernet
• T1
• EIA/TIA 568A/B
• ATM
• ISDN
• FRAME RELAY
• TOKEN RING
• BNC
• FIBER OPTIC
• COPPER CABLES
• WIFI
• X.25
• RJ – 45
• CSMA/CD
29
PDU (Protocol Data Units)
• This is a generic term used to describe
layer’s information
• Each TCP/IP layer has a PDU associated
with it.
30
PDU SUMMARY
• APPLICATION LAYER = DATA
• TRANSPORT LAYER = SEGMENTS OR
DATAGRAMS
• INTERNET LAYER = PACKETS
• NETWORK ACCESS LAYER = FRAMES
AND BITS
31
LAYER ADDRESSING
• Each layer has an address which is a
scheme to identify services
• E.g source address and destination
address
32
DEVICES SUMMARY
• Application layer = application Layer Gateway (ALG)
– data
• Transport layer = firewalls make decisions based on
the port number.
• Internet/network layer = routers and layer 3 switches
examine the packets and make decisions based on
the IP address – to forward or not to forward the
packets
• Data link layer = Bridges and switches – make
decisions based on the physical address of the
source or destination address – to forward or not to
forward a frame
• Physical layer = repeaters (transceivers) and hubs -
Bits 33
Focus of study in this course will
be
TOP DOWN NETWORK DESIGN
• Case study/Scenario 1
• Informatics is a private College that provides part-time and full time
courses in IT. It is planning to move to a new site and is considering the
networking that should be installed. The site consists of three buildings.
The Grace Building contains a dedicated computer room with a
number of high performance dedicated servers. The servers provide
services to students and staff who may access them either over the
Internet or over the College’s own internal network. The Maurice
Building contains the staff offices, for both Lecturers and administrative
staff. They have desktop computers on fixed desks, from which they
need access to the Internet and to other College servers.
• Case study/Scenario 1 (Continued)
• The Grace Building and the Maurice Building are 360 feet apart and
are linked by an underground duct. The Alan Building contains a
reception desk, lecture rooms and a café and is 200feet from Grace
Building. There is no duct linking it to the other buildings and installing
one is not possible. The lecture rooms have a desktop computer at the
front for use by the lecturers, but some lecturer’s prefer to use their
own laptop or Tablet computer. All the students use Laptop and Tablet
computers to take notes and keep in touch with their friends.
Required:
1. Name the type of Ethernet network that should be deployed in the Grace
Building and hardware equipment that should be installed.
2. Name the type of Ethernet network that should be deployed in the Maurice
Building and hardware equipment that should be installed?
3. Name the type of network that should be deployed in the Alan Building and
hardware equipment that should be installed?
4. Name the type of network connections that should be used to link the buildings
together and where and how the College’s Internet connection should be made.