Professional Documents
Culture Documents
Introduction................................................................................................................................4
Assumption................................................................................................................................5
Enterprise Network Design........................................................................................................6
Logical Design...........................................................................................................................7
Physical Design..........................................................................................................................8
Campus Network Design Methodologies..................................................................................9
Prototype Development Procedure..........................................................................................10
Network Documentation Procedure.........................................................................................11
Network Topologies.................................................................................................................12
Three Layer Model ( Access Layer, Distribution Layer and Core Layer )..............................13
Hierarchical Network Design...................................................................................................13
Access Layer........................................................................................................................14
Distribution Layer................................................................................................................15
Core Layer............................................................................................................................16
ISP............................................................................................................................................17
Recommended Equipment Device...........................................................................................18
Switching and Routing Protocols.............................................................................................19
Interior and Exterior Routing Protocols...................................................................................19
Open Short Path First (OSPF)..............................................................................................19
Load Balancing....................................................................................................................19
Logical Network.......................................................................................................................20
Network Security Strategies.....................................................................................................20
Threats and Risk...................................................................................................................21
Threat: Reconnaissance Attack........................................................................................23
Threat: Gaining Unauthorized Access to System.............................................................23
Threat DOS......................................................................................................................23
Risk: Integrity Violations and Confidentiality Breaches..................................................23
Network Security Policy and Procedures.............................................................................24
Need for Security Policy..................................................................................................24
Risk Assessment and Management..................................................................................24
Risk Index........................................................................................................................24
References................................................................................................................................36
Gantt Chart...............................................................................................................................37
Workload Matrix......................................................................................................................38