Advertisment

Key design considerations in enterprise networks

author-image
CIOL Bureau
Updated On
New Update

BANGALORE, INDIA: The concept of networking initially started with peer-to-peer networking where the basic objective was to connect two desktop users so that they can share their resources viz. file, folder, printers, etc.

Advertisment

Today by the virtue of client server architecture being primarily used in all organization the networks have grown, the numbers of applications being used by various departments within the organization have increased and will keep on adding. This makes the designing of network for present and future requirement very important.

Today enterprise network forms the backbone for running the business of any organizations. Considering the uninterrupted application access requirement through the network, some of the networks are able to attain the requirement through implementing various protocols providing the high availability and meeting stringent uptime requirement.

Typically, the enterprise network consists of data, voice, and video including various applications viz, ERP, SAP, Email Exchange, Blackberry services, domain authentication, wireless user authentication, VoIP, IP telephony, voice & video conferencing, IP surveillance, building management systems, remote support management, end-pointsecurity, antivirus, webcasting, etc.

Advertisment

Implementing various client-server based applications for business requires converged IP based enterprise network. Thus, while designing Multilayer Network architecture should be always considered.

While designing Enterprise Network following considerations needs to be taken into account

1. Number of users per department defines VLAN requirement.

2. Number of applications for various business requirement.

3. Restriction of users for specific applications recommended by organization business strategies.

4. Uptime commitment for Enterprise LAN and WAN.

5. Uptime commitment requirement on various business critical applications.

6. Uptime commitment for application being used by senior management.

Most of the time uptime requirement on LAN, WAN, end to end user performance experience is 99.999 per cent. Expectation on uptime requirement must be considered during sizing, Architecting the network and application deployment in enterprise network and data centres.

Advertisment

Important points to be considered on the network design and uptime front.

1. Bandwidth on Enterprise LAN Backbone viz. 100 Mbps, 1Gig, 10Gig or further higher.

2. User connectivity to LAN requirement whether Ethernet/Fast Ethernet/1G.

3. Bandwidth between Central DC and every spoke locations.

4. Selection of various services provides for WAN connectivity.

5. Minimum selection of two WAN service provides for every spoke connecting to DC, DR.

6. Availability of multiple service providers at DC and DR.

7. Security appliance sizing considering the simultaneous number of users passing the firewall accessing the business applications.

8. Sizing the Core Switching components.

9. Sizing the network aggregation and access connectivity components.

10. Implementation of various open standard protocols viz. on Layer 2 STP, RSTP, MST, logical link bundling, port based security, trunk links, access-links.

11. Implementation of various open standard protocols viz. on Layer 3 open standard routing protocols.

12. Implementation of traditional High Availability protocol requirement viz. VRRP or similar.

13. Implementation of state-of-art protocols on Core viz. ACTIV-ACTIVE Stacking solutions.

14. Implementation of state-of-art solution on using Ethernet protection Switching ring on Campus or building floor network.

15. Avoiding the Customized products and protocols which can make the scope of Enterprise Customer open for future requirements and implementations, making the solution competitive and economical.

Important points to be considered on network performance

1. Implementation of QOS for business critical applications.

2. Harding the OS on desktops.

3. Harding the OS and applications on the various servers.

4. Limiting the per user bandwidth on LAN and WAN by implementing the User Group policies in the Domain.

5. Restricting the access to required users for accessing specific applications.

6. Restrict and log the internet usage.

7. Blocking the folder sharing.

The author is country manager, India & SAARC at Allied Telesis.

tech-news