Data Communication Networks: A Comprehensive Overview
VerifiedAdded on 2025/05/08
|3
|1264
|105
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Network system design
Introduction
Network design is generally a part of the system design that works on the mechanism of data
transformation. This uses the different stages for analysis like in the generation of requirements,
implementation, and result. Its main aim is to provide satisfying communication details by minimizing its
expensive. Analysis of network can be performing on the three levels, i.e., departmental level,
organizational level, and inter-organizational level. Internetwork connection is built with the combining the
two o more than two organizations. A departmental network can be designed with the help of the
enterprise network which connects the simple organization in the department from. Technology type is
shown by the distance within the physical connections, which commonly used for the transmission of
data. It usually performed with the help of the engineers, designers and related staff. The entire network
design is represented with the help of the network diagram which also having the blueprints relate with all
the designs. Mainly, network designs include some factors like a logical map for the desired network,
structures of cabling, the structure of IP address, types, location and quantity related to the design of the
network, architecture of network security and the entire process of security for the network.
Summary of network design:
The design of the network basically depends on the size and requirements factor. For designing of any
type of network, the basic step is to divide the process into three parts, i.e.,
Small-size network: it generates the service facility for a minimum of 200 devices.
Medium-size network: it provides the facility for the 200 to 1000 devices.
Large-size network: it provides the services for more than 1000 devices.
The design of the network includes the switches, routers and the security criteria. Network switches are
the devices that are used to connect the networks to transmitting and receiving the data. It referred to a
bridge of multiple networks that are used in the process of addressing the hardware and transmits the
data to the layer of a data link. There are so many networks that are used to transmit the data up-to-the
network layer by taking help from the routing functionality. Network switches are more powerful than the
Ethernet hub. The switch can be identified with the help of a network address that is connecting to the
network device.
Network routers are used to transmit the data packets to the network of computers or any other system. A
router is used to connect the data lines to several networks. The router reads the address of the network
during the transmission of a packet online and then sends the information to the destination level. It also
forwards that packet to the next destination. It is used for interfacing the several layers of physical
connections. The router uses the routing protocol to transmit the information up-to-the destination. A
router uses the two types of components of a network for organized the several planes, i.e., control plane
which is used for maintaining the routing list for forwarding the data and another one is forwarding plane
used for transmitting the data packets between the connections of an introvert and extrovert interface.
Network security plays a key role in designing the network. It focuses to save the infrastructure from any
hacking and any type of misuse. It is a combination of hardware and software both of which is used to
prevent the data from the faults, destruction, disclosure, tampering, unofficial access, etc. Sometimes, the
company provides cloud security which means the security function can be provided by the person or
Introduction
Network design is generally a part of the system design that works on the mechanism of data
transformation. This uses the different stages for analysis like in the generation of requirements,
implementation, and result. Its main aim is to provide satisfying communication details by minimizing its
expensive. Analysis of network can be performing on the three levels, i.e., departmental level,
organizational level, and inter-organizational level. Internetwork connection is built with the combining the
two o more than two organizations. A departmental network can be designed with the help of the
enterprise network which connects the simple organization in the department from. Technology type is
shown by the distance within the physical connections, which commonly used for the transmission of
data. It usually performed with the help of the engineers, designers and related staff. The entire network
design is represented with the help of the network diagram which also having the blueprints relate with all
the designs. Mainly, network designs include some factors like a logical map for the desired network,
structures of cabling, the structure of IP address, types, location and quantity related to the design of the
network, architecture of network security and the entire process of security for the network.
Summary of network design:
The design of the network basically depends on the size and requirements factor. For designing of any
type of network, the basic step is to divide the process into three parts, i.e.,
Small-size network: it generates the service facility for a minimum of 200 devices.
Medium-size network: it provides the facility for the 200 to 1000 devices.
Large-size network: it provides the services for more than 1000 devices.
The design of the network includes the switches, routers and the security criteria. Network switches are
the devices that are used to connect the networks to transmitting and receiving the data. It referred to a
bridge of multiple networks that are used in the process of addressing the hardware and transmits the
data to the layer of a data link. There are so many networks that are used to transmit the data up-to-the
network layer by taking help from the routing functionality. Network switches are more powerful than the
Ethernet hub. The switch can be identified with the help of a network address that is connecting to the
network device.
Network routers are used to transmit the data packets to the network of computers or any other system. A
router is used to connect the data lines to several networks. The router reads the address of the network
during the transmission of a packet online and then sends the information to the destination level. It also
forwards that packet to the next destination. It is used for interfacing the several layers of physical
connections. The router uses the routing protocol to transmit the information up-to-the destination. A
router uses the two types of components of a network for organized the several planes, i.e., control plane
which is used for maintaining the routing list for forwarding the data and another one is forwarding plane
used for transmitting the data packets between the connections of an introvert and extrovert interface.
Network security plays a key role in designing the network. It focuses to save the infrastructure from any
hacking and any type of misuse. It is a combination of hardware and software both of which is used to
prevent the data from the faults, destruction, disclosure, tampering, unofficial access, etc. Sometimes, the
company provides cloud security which means the security function can be provided by the person or
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

third party. It is used to prevent the data from various points like theft of identity, attacks through hackers,
attacks of zero-day, service attacks, interception of data, theft of data, etc. All these can be categorized
by two types that are structured and unstructured. Structure attack is that attack which is held by the
person with extra-skilled who knows the target. The unsaturated attack is that in which the person not
knowing whom to attack, he only uses the tools for attacking.
WAN stands for the wide area network that exists for the geographical area. It is used to connect the
different LAN networks and smaller networks to make a huge network for a geographical manner. It
ensures to provide the facility to communicate one computer with several computers. It is like a banking
sector due to the presence of the different branches of cables or network which shares the generalized
data to the destination.
Network addressing
Type of Address Address Owner
Address location of Private IPv4 10.100.0.0/19 MegaCon
Address location for IPv6 2001.1.10::/52 MegaCon
Address location of Public IPv4 200.200.0.0/28 Must be allocated across Cam1
and Cam2
Point-to-point Cam 1 link for IPv4
ISP
90.1.1.0/30 ISP
Point-to-point Cam 1 link for IPv6
ISP
2001:60:1:1::/64 ISP
Point-to-point Cam 2 link for IPv4
ISP
90.1.2.0/30 ISP
Point-to-point Cam 2 link for IPv6
ISP
2001:60:1:2::/64 ISP
ISP Lo1 for IPv4 5.5.5.5/32 ISP
ISP Lo1 for IPv6 2001:5.5.5.5::5/128 ISP
ISP Lo2 for IPv4 6.6.6.6/32 ISP
ISP Lo2 for IPv6 2001:6:6:6::6/128 ISP
Conclusion
Network designing plays a key role to make sure about the objectives and its need. The network is
nothing but it's a collection or the combination of the devices and servers used for the communication or
transmission of data. Firewalls and software are unsure about the security of the network. A challenging
task is to choose the software elements for installing it in the system. Various approaches are used in the
increment of the availability for the design of the network and it makes the conclusion that link
aggregation is used for increasing the capacity of bandwidth, a popular strategy is the combination of the
VRRP and IPMP. OSPF is used to generate the best failure detection. Routing tables are also calculating
with the help of OSPF but it does not support the routing protocol due to some issues of security and
performance. Network services are dependent entities and used to delivers the services to the network. It
includes functions, applications, and devices.
attacks of zero-day, service attacks, interception of data, theft of data, etc. All these can be categorized
by two types that are structured and unstructured. Structure attack is that attack which is held by the
person with extra-skilled who knows the target. The unsaturated attack is that in which the person not
knowing whom to attack, he only uses the tools for attacking.
WAN stands for the wide area network that exists for the geographical area. It is used to connect the
different LAN networks and smaller networks to make a huge network for a geographical manner. It
ensures to provide the facility to communicate one computer with several computers. It is like a banking
sector due to the presence of the different branches of cables or network which shares the generalized
data to the destination.
Network addressing
Type of Address Address Owner
Address location of Private IPv4 10.100.0.0/19 MegaCon
Address location for IPv6 2001.1.10::/52 MegaCon
Address location of Public IPv4 200.200.0.0/28 Must be allocated across Cam1
and Cam2
Point-to-point Cam 1 link for IPv4
ISP
90.1.1.0/30 ISP
Point-to-point Cam 1 link for IPv6
ISP
2001:60:1:1::/64 ISP
Point-to-point Cam 2 link for IPv4
ISP
90.1.2.0/30 ISP
Point-to-point Cam 2 link for IPv6
ISP
2001:60:1:2::/64 ISP
ISP Lo1 for IPv4 5.5.5.5/32 ISP
ISP Lo1 for IPv6 2001:5.5.5.5::5/128 ISP
ISP Lo2 for IPv4 6.6.6.6/32 ISP
ISP Lo2 for IPv6 2001:6:6:6::6/128 ISP
Conclusion
Network designing plays a key role to make sure about the objectives and its need. The network is
nothing but it's a collection or the combination of the devices and servers used for the communication or
transmission of data. Firewalls and software are unsure about the security of the network. A challenging
task is to choose the software elements for installing it in the system. Various approaches are used in the
increment of the availability for the design of the network and it makes the conclusion that link
aggregation is used for increasing the capacity of bandwidth, a popular strategy is the combination of the
VRRP and IPMP. OSPF is used to generate the best failure detection. Routing tables are also calculating
with the help of OSPF but it does not support the routing protocol due to some issues of security and
performance. Network services are dependent entities and used to delivers the services to the network. It
includes functions, applications, and devices.

References
Takahashi, R., Tashiro, K. and Hikihara, T., 2015. Router for power packet distribution network: Design
and experimental verification. IEEE Transactions on Smart Grid, 6(2), pp.618-626.
Kwon, J.S., Everetts, N.J., Wang, X., Wang, W., Della Croce, K., Xing, J. and Yao, G., 2017. Controlling
depth of cellular quiescence by an Rb-E2F network switch. Cell Reports, 20(13), pp.3223-3235.
Eskandarpour, M., Dejax, P., Miemczyk, J. and Péton, O., 2015. Sustainable supply chain network
design: an optimization-oriented review. Omega, 54, pp.11-32.
Green, A.L., Maypa, A.P., Almany, G.R., Rhodes, K.L., Weeks, R., Abesamis, R.A., Gleason, M.G.,
Mumby, P.J. and White, A.T., 2015. Larval dispersal and movement patterns of coral reef fishes, and
implications for marine reserve network design. Biological Reviews, 90(4), pp.1215-1247.
Green, A.L., Maypa, A.P., Almany, G.R., Rhodes, K.L., Weeks, R., Abesamis, R.A., Gleason, M.G.,
Mumby, P.J. and White, A.T., 2015. Larval dispersal and movement patterns of coral reef fishes, and
implications for marine reserve network design. Biological Reviews, 90(4), pp.1215-1247.
Eskandarpour, M., Dejax, P. and Péton, O., 2017. A large neighborhood search heuristic for supply chain
network design. Computers & Operations Research, 80, pp.23-37.
Alomar, S.A., Nickel, S., Saldanha-da-Gama, F. and Seçerdin, Y., 2016. Multi-period hub network design
problems with modular capacities. Annals of Operations Research, 246(1-2), pp.289-312.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding 5G
wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4),
pp.20-27.
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks
security. Mobile Networks and Applications, 21(5), pp.729-743.
Takahashi, R., Tashiro, K. and Hikihara, T., 2015. Router for power packet distribution network: Design
and experimental verification. IEEE Transactions on Smart Grid, 6(2), pp.618-626.
Kwon, J.S., Everetts, N.J., Wang, X., Wang, W., Della Croce, K., Xing, J. and Yao, G., 2017. Controlling
depth of cellular quiescence by an Rb-E2F network switch. Cell Reports, 20(13), pp.3223-3235.
Eskandarpour, M., Dejax, P., Miemczyk, J. and Péton, O., 2015. Sustainable supply chain network
design: an optimization-oriented review. Omega, 54, pp.11-32.
Green, A.L., Maypa, A.P., Almany, G.R., Rhodes, K.L., Weeks, R., Abesamis, R.A., Gleason, M.G.,
Mumby, P.J. and White, A.T., 2015. Larval dispersal and movement patterns of coral reef fishes, and
implications for marine reserve network design. Biological Reviews, 90(4), pp.1215-1247.
Green, A.L., Maypa, A.P., Almany, G.R., Rhodes, K.L., Weeks, R., Abesamis, R.A., Gleason, M.G.,
Mumby, P.J. and White, A.T., 2015. Larval dispersal and movement patterns of coral reef fishes, and
implications for marine reserve network design. Biological Reviews, 90(4), pp.1215-1247.
Eskandarpour, M., Dejax, P. and Péton, O., 2017. A large neighborhood search heuristic for supply chain
network design. Computers & Operations Research, 80, pp.23-37.
Alomar, S.A., Nickel, S., Saldanha-da-Gama, F. and Seçerdin, Y., 2016. Multi-period hub network design
problems with modular capacities. Annals of Operations Research, 246(1-2), pp.289-312.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding 5G
wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4),
pp.20-27.
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks
security. Mobile Networks and Applications, 21(5), pp.729-743.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 3
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.