2024-12-14

WAN design methodologies should be used when designing enterprise edge networks. Some keys to WAN design are the following processes:

  • Identifying the network requirements: This includes reviewing the types of applications, the traffic volume, and the traffic patterns in the network.
  • Assessing the existing network: This involves reviewing the technologies used and the locations of hosts, servers, network equipment, and other end nodes.
  • Designing the topology: This is based on the availability of technology as well as the projected traffic patterns, technology performance, constraints, and reliability.

When designing the WAN topology, remember that the design should describe the functions that the enterprise modules should perform. The expected service levels provided by each WAN technology should be explained. WAN connections can be characterized by the cost of renting the transmission media from the service provider to connect two or more sites.

New network designs should be flexible and adaptable to future technologies and should not limit the customer’s options going forward. For example, collaboration applications such as VoIP and video are common now, and most enterprise network designs should be able to support them. The customer should not have to undergo major hardware upgrades to implement these types of technologies. The ongoing support and management of the network are other important factors, and the design’s cost-effectiveness is important as well.

Table 9-2 lists key design principles that can help serve as the basis for developing network designs.

Table 9-2 Key Design Principles

Design PrincipleDescription
High availabilityRedundancy through hardware, software, and connectivity
ScalabilityModularity with additional devices, services, and technologies
SecurityMeasures to protect business data
PerformanceEnough capacity and bandwidth for applications
ManageabilityEase of managing and maintaining the infrastructure
Standards and regulationsCompliance with applicable laws, regulations, and standards
CostAppropriate security and technologies given the budget

High availability is what most businesses and organizations strive for in sound network designs. The key components of application availability are response time, throughput, and reliability. Real-time applications such as voice and video are not very tolerant of jitter and delay.

Table 9-3 identifies various application requirements for data, voice, and video traffic.

Table 9-3 Application Requirements for Data, Voice, and Video Traffic

CharacteristicData File TransferInteractive Data ApplicationReal-Time VoiceReal-Time Video
Response timeReasonableWithin a secondOne-way delay less than 150 ms with low delay and jitterMinimum delay and jitter
Throughput and packet loss toleranceHigh/mediumLow/lowLow/lowHigh/medium
Downtime (high reliability = low downtime)ReasonableLowLowMinimum

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © All rights reserved. | Developed by Isaiahs.