Enterprise network design
The enterprise network system is made up of a set of local area networks interlinked through a wide area network. Such a network system is made up of several networking devices such as routers, gateways and switches. An enterprise network is always managed by the organization
Enterprise Network Design Model
The network design model is particularly crucial when it comes to analysis of enterprise network that are large and complex. When designing a local area network that meets the organization’s requirements hierarchical model always the most prevalent model. With the hierarchical model, there are high possibilities of building a successful enterprise network system. The management and scalability of a network system designed using the hierarchical model are easy. The most appropriate network design model for an enterprise network system is a hierarchical model. The hierarchical model consists of different tiers. It provides the guideline and rules (Teare & Hutton, 2011).
Hierarchical network model entails the splitting the network into layers that are discrete. The layers defined functions and roles of each specific part in the network. By splitting the different functions that are handled by the network system, a modular design is produced. The modular design provides high performance and scalability. The traditional hierarchical design model is split into three layers. These are:
• Access layer
The access layer is the points where the network interfaces with end devices such as computers and printers. It facilitates the communication between the end devices and other devices in the network system. Some network devices that fall under access layer is switches, hubs, routers wireless access points and hubs. The fundamental purpose of the access layer is to facilitate a means of linking devices to the network system and regulating communication between various network devices.
• Distribution layer
This layer analyze and filter the data that come from the access layer before it is sent to the main layer for transmission to the target destination. The layer uses policies to regulate how the network traffic flows and performs routing functions between VLANs that are defined in the previous layer to delineate the broadcast domain (Oppenheimer, 2004). The virtual local area network enables one to divide the traffic on a router into various subnetworks. For instance, the network traffic in a business organization can be separated according to departments, sections and regions. The switches used in the distributed layer are devices with high performance to guarantee availability and redundancy.
• Core layer
The hierarchical design core layer is the backbone for internet with extremely high speed. This layer is crucial for interlinking the devices to provide high availability. This is also the point where the internet connection occurs. In addition, the layer controls the and regulates the traffic that originates from all devices in the distributed layer. As such, the speed of the core should be exceedingly high for it to accommodate the workload. In some small networks, the layer is combined.
Benefits of the hierarchical model
An organization that implements a hierarchical network model will derive massive benefits that are associated with the model. These include:
• Scalability- the model has an exceptionally high scalability. It allows the user to produce a replication of the design components when the network expands. Since consistency is maintained in each and every network module, the planning and implementation is quite easy.
• Redundancy- the availability of the network is an extremely critical feature as the network system increases. One can immensely raise the...
References: Bachmann, V., & Stern, M. (2010). NT Enterprise network design. Sybex, Network Press.
Mahood, C. (2009). Data center design & enterprise networking. Rochester Institute of Technology.
Malik, S. (2003). Advanced network security architectures: CCIE professional development series. Cisco Press.
Oppenheimer, P. (2004). Top-down network design. Cisco Press.
Stewart, M. (2010). Network security, firewalls, and VPNs. Jones & Bartlett Publishers.
Teare, D., & Hutton, K. (2011). Designing Cisco network service architectures (ARCH):. Cisco Press.
Please join StudyMode to read the full document