You are on page 1of 3

Table of Contents

Introduction................................................................................................................................4
Assumption................................................................................................................................5
Enterprise Network Design........................................................................................................6
Logical Design...........................................................................................................................7
Physical Design..........................................................................................................................8
Campus Network Design Methodologies..................................................................................9
Prototype Development Procedure..........................................................................................10
Network Documentation Procedure.........................................................................................11
Network Topologies.................................................................................................................12
Three Layer Model ( Access Layer, Distribution Layer and Core Layer )..............................13
Hierarchical Network Design...................................................................................................13
Access Layer........................................................................................................................14
Distribution Layer................................................................................................................15
Core Layer............................................................................................................................16
ISP............................................................................................................................................17
Recommended Equipment Device...........................................................................................18
Switching and Routing Protocols.............................................................................................19
Interior and Exterior Routing Protocols...................................................................................19
Open Short Path First (OSPF)..............................................................................................19
Load Balancing....................................................................................................................19
Logical Network.......................................................................................................................20
Network Security Strategies.....................................................................................................20
Threats and Risk...................................................................................................................21
Threat: Reconnaissance Attack........................................................................................23
Threat: Gaining Unauthorized Access to System.............................................................23
Threat DOS......................................................................................................................23
Risk: Integrity Violations and Confidentiality Breaches..................................................23
Network Security Policy and Procedures.............................................................................24
Need for Security Policy..................................................................................................24
Risk Assessment and Management..................................................................................24
Risk Index........................................................................................................................24

Network Security Policy Process.....................................................................................24


Cisco Self-Defending Network............................................................................................24
Trust and Identity Management.......................................................................................24
Threat Defence.................................................................................................................24
Secure Connectivity.........................................................................................................24
Network Management Strategies.............................................................................................26
Fault Management................................................................................................................26
Configuration Management.................................................................................................26
Accounting Management.....................................................................................................27
Performance Management...................................................................................................27
Security Management...........................................................................................................28
Service Level............................................................................................................................29
Service Level Agreement (SLA)..........................................................................................29
Service Level Contract.........................................................................................................29
Service Level Management (SLM)......................................................................................29
Network Strategies...................................................................................................................30
General and Departmental Business Goals and Constraint......................................................31
Head Quarters Management Department Business Goals...................................................31
Accounting and Finance Department Business Goals.........................................................31
Sales and Marketing Business Goals...................................................................................32
Manufacturing and Production Department Business Goals...............................................32
Technical Goals........................................................................................................................33
Scalability.............................................................................................................................33
Performance.........................................................................................................................33
Security................................................................................................................................33
Manageability.......................................................................................................................33
Adaptability..........................................................................................................................33
Affordability.........................................................................................................................33
Design Requirements...............................................................................................................34
Affordability and Reduce Cost.............................................................................................34
Increase Productivity............................................................................................................34
Improve Customer Support..................................................................................................34
Conclusion................................................................................................................................35

References................................................................................................................................36
Gantt Chart...............................................................................................................................37
Workload Matrix......................................................................................................................38

You might also like