Skip to main content

LAN design methodology

LAN design methodology 
5.1.3 For a LAN to be effective and serve the needs of its users, it should be designed and implemented based on a planned series of systematic steps. This page will describe the following steps:
  • Gather requirements and expectations
  • Analyze requirements and data
  • Design the Layer 1, 2, and 3 LAN structure, or topology 
  • Document the logical and physical network implementation
The process to gather information helps to clarify and identify any current network problems. This information includes the history of the organization and current status, their projected growth, operation policies and management procedures, office systems and procedures, and the viewpoints of the people who will use the LAN.
The following questions should be asked to gather information:
  • Who are the people that will use the network?
  • What is the skill level of these people?
  • What are their attitudes toward computers and computer applications?
  • How developed are the organizational documented policies?
  • Has some data been declared mission critical?
  • Have some operations been declared mission critical?
  • What protocols are allowed on the network?
  • Are only certain desktop hosts supported?
  • Who is responsible for LAN addresses, naming, topology design, and configuration?
  • What are the organizational human, hardware, and software resources?
  • How are these resources currently linked and shared?
  • What financial resources does the organization have available?
Documentation of the requirements allow for an informed estimate of costs and timelines for projected LAN design implementation. It is important to understand performance issues of any network.
Availability measures the usefulness of the network. The following are a few of the many things that affect availability:
  • Throughput
  • Response time
  • Access to resources
Every customer has a different definition of availability. For example, there may be a need to transport voice and video over the network. These services may require more bandwidth than is available on the network or backbone. To increase availability, more resources can be added, but that increases the cost of the network. Network designs should provide the greatest availability for the least cost.
The next step in the network design is to analyze the requirements of the network and its users. Network user needs constantly change. As more voice and video-based network applications become available, the necessity to increase network bandwidth grows too.
A LAN that is not able to provide prompt and accurate information to its users is useless. Steps must be taken to ensure that the information requirements of the organization and its workers are met.
The next step is to decide on an overall LAN topology that will satisfy the user requirements.   In this curriculum, concentration will be on the star topology and extended star topology. The star topology and extended star topology use Ethernet 802.3 CSMA/CD technology. CSMA/CD star topology is the dominant configuration in the industry.
LAN topology design can be broken into the following three unique categories of the OSI reference model:
  • Network layer
  • Data link layer
  • Physical layer
The final step in LAN design methodology is to document the physical and logical topology of the network. The physical topology of the network refers to the way in which various LAN components are connected together. The logical design of the network refers to the flow of data in a network. It also refers to the name and address schemes used in the implementation of the LAN design solution.
The following are important LAN design documentation:
  • OSI layer topology map
  • LAN logical map
  • LAN physical map
  • Cut sheets
  • VLAN logical map
  • Layer 3 logical map
  • Address maps
The next page will discuss Layer 1 design issues.

Comments

Popular posts from this blog

OSI layers / Peer-to-peer communications / TCP/IP model

OSI layers 2.3.4 This page discusses the seven layers of the OSI model. The OSI reference model is a framework that is used to understand how information travels throughout a network. The OSI reference model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. - Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network components to allow multiple vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting other layers. • It divides network communication into smaller parts to make learning it easier to understand. In the foll...

Advantages and disadvantages of link-state routing

Advantages and disadvantages of link-state routing 2.1.5  This page lists the advantages and disadvantages of link-state routing protocols. The following are advantages of link-state routing protocols:  Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths. Link-state protocols use triggered updates and LSA floods to immediately report changes in the network topology to all routers in the network. This leads to fast convergence times. Each router has a complete and synchronized picture of the network. Therefore, it is very difficult for routing loops to occur. Routers use the latest information to make the best routing decisions. The link-state database sizes can be minimized with careful network design. This leads to smaller Dijkstra calculations and faster convergence. Every router, at the very least, maps the topology of it...

Ports for services

Ports for services 10.2.2  Services running on hosts must have a port number assigned to them so communication can occur. A remote host attempting to connect to a service expects that service to use specific transport layer protocols and ports. Some ports, which are defined in RFC 1700, are known as the well-known ports. These ports are reserved in both TCP and UDP.  These well-known ports define applications that run above the transport layer protocols. For example, a server that runs FTP will use ports 20 and 21 to forward TCP connections from clients to its FTP application. This allows the server to determine which service a client requests. TCP and UDP use port numbers to determine the correct service to which requests are forwarded. The next page will discuss ports in greater detail.