Top-Rated Free Essay
Preview

Logical & Physical Design of Network

Satisfactory Essays
644 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Logical & Physical Design of Network
Logical and Physical Design of a Network

NTC410

Why is it useful to use both a physical and a logical network design? A physical layout of the network shows the physical location of and the connections between devices participating on the network. In such diagrams, workstations are usually represented with small computer icons, servers with full tower cases, and switches. The Logical Design is the IP structure of your network depending on the services that will be provided to clients, you might need to analyze the possible traffic patterns that might result from your plan. Locate potential bottlenecks and, where possible, alleviate them by providing multiple paths to resources or by putting up servers that provide replicas of important data so that load balancing can be provided. The following are other factors to consider:
• Who are the clients? What are their actual needs? How have you determined these needs from user complaints or from help-desk statistics? Is this data reliable?
• What kinds of services will you provide on the network? Are they limited in scope? Will any involve configuring a firewall between LANs? And if so, that still doesn't account for configuring a firewall to enable access to the Internet.
• Will you need to allow an Internet connection for just your internal network's users, or will use you need to allow outside vendors access to your network? One example that comes to mind is the Internet Printing Protocol .
• What will it cost to evaluate what kind of services user groups need to access from the Internet?
• Will you need to allow all users to use email within the internal network and through the firewall on the Internet? The same goes for what sites users will be allowed to access using a network browser and other network applications.
• Will you have users who work from home and require dial-in or VPN access through the Internet? How important it is to let all users have unlimited access to the Internet. If users need to exchange email with vendors, outside consultants, or customers, for example, then you should be sure to send this traffic through a content filter or firewall, and use virus-protection software to detect and prevent malicious code or virus-infected attachment Applications such as FTP allow users to send or receive files from remote systems. Can you trust each employee to use this application without abusing it? From a security point of view, it is usually considered very improper to allow any new application to be loaded on any computer desktop or server without first submitting the application to testing to ensure that is necessary and is not a security risk. Don't leave any backdoors into or out of your network. Below is an example of a WAN logical network diagram. The Physical design will be the topology being used after you've decided on the network protocols and the services you need to offer on the network, identified potential bottlenecks, and evaluated the security problems associated with your network needs, you can then design the physical aspects of the network. There are tools you can use, such as Visio, to draw a physical network diagram. Tools can be expensive but make a better presentation to management than hand drawn network layouts. Whichever tool you decide to use to create the actual network drawings, be sure that the drawings are clear and concise. Looking back at your network application requirements, bandwidth requirements, you can then start designing the physical network, deciding where to place important servers and devices. Below is an example of a physical network diagram. After you have determined your network requirements, you must identify and then select the specific capability that fits your computing environment.

References

http://www.more.net/technical/netserv/diagrams/wanlogical.html
http://www.more.net/technical/netserv/diagrams/documenting/index.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Yes, because it is still critical to protect the LAN-WAN edge. However, network firewalls now must also keep communications between internal network segments in check so that internal employees cannot access network and data resources that corporate policy…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Yes, because it is still critical to protect the LAN-WAN edge. However, network firewalls now must also keep communications between internal network segments in check so that internal employees cannot access network and data resources that corporate policy…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a de-militarized zone (DMZ). We need to have a network firewall between our DMZ and our internal network, between the outside world and our internal network, and between our DMZ and the outside world.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For this network, I initially projected that one server would be sufficient to perform all the tasks, however, in order to make the network work more efficiently and reduce occasions for system downtime it would be more conducive to use multiple servers. I recommend that we use 3 servers. The main server would be the DHCP server. The second would be the email server, and the third for file sharing and printing.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    3. At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access (POP, IXP, NAP)?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT 240 Week 1

    • 317 Words
    • 1 Page

    1) The type of network I would use in this particular situation. I would first start off with recommending a high speed broadband provider such as in my area Either EPB or Comcast for connectivity. I would also start with a wireless router to allow wireless connectivity at the office itself. Depending on the type of business and what they would do production wise I would also recommend a VPN to allow offsite business with access to the files based off of needs of the individual employee. For this business a simple LAN would suffice their needs with simple usage. I would build the Client/Server network for this company. I would also recommend Windows 7 for the office computers. This would allow each user to have their own set of permissions with higher level employees having for instance editing access to certain documents pertinent to their job.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In the LAN-to-WAN domain the internal network is connect to a wide area network. This domain contains routers, firewalls, email content filters, and other similar devices. Routers will route the traffic leaving and coming into the network strict security ACLs will be applied to these devices. Hardware firewalls will be implemented into the network for further packet filtering. Intrusion prevention/detection systems will be on the network to protect against attacks to our network. The email is subject to scanning and filtering to prevent spam, malware, and viruses. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    On-Time Package Delivery

    • 349 Words
    • 2 Pages

    understanding of the competition and also constant updates on what new services are available to clients…

    • 349 Words
    • 2 Pages
    Satisfactory Essays