It is imperative to note that network design is planning the implementation of a given computer network infrastructure. The design process is usually performed by computer experts such as engineers, information technology administrators, network designers, among other related staff (Robertazzi, 2017). Notably, designing a computer network is done before the implementation of a network infrastructure. The whole process involves understanding, evaluating, as well as scoping the system to be implemented. Network design is always represented as a network diagram and therefore serving as the blueprint for the physical implementation of that given network. A network design includes cabling structure, internet protocol addressing structure, type, quantity and location of network devices, logical map of the network, and finally, the security architecture of that network and overall network security processes (Robertazzi, 2017). The aim of this paper is to illustrate some of the possible problems that can occur in a computer network if systematic and structured methods of computer design are not used.
It is no secret that a structured network design has enhanced flexibility because it can quickly and easily accommodate new changes, additions, or moves (Robertazzi, 2017). Also, this design minimizes the time taken during installation hence making it easy to relocate to a new office. Because of these many advantages, when this network design is not used, there will be reduced flexibility in the network system hence making relocating to new areas difficult (Robertazzi, 2017). The limited usage will be a more significant disadvantage.
Alternatively, the high bandwidth that a structured network design offers is another important feature. The high bandwidth of this cabling system means that it can be used to support other future applications that may be introduced in the organization without interruption to the current system (Robertazzi, 2017). If not used, such a business cannot introduce other applications such as multimedia or video conferencing because the one used will become outdated.
Understandably, the systematic method of network designing is another method that is widely used (Robertazzi, 2017). One of the main reasons for its wide application is its efficiency, as organizations do not have to re-invent the system every time they are introducing other applications. If systematic network design is not used, such problems like re-inventing new ways of introducing other applications into the network system will occur because of a lack of efficiency (Robertazzi, 2017).
Consistency of this design is another benefit that it has over other methods of networking. Because several steps are followed while designing a systematic network, its consistency during operation is highly reliable (Robertazzi, 2017). A problem will arise when other methods are used, which are inconsistent with the various applications in the business as they will have gaps in their behavior.
Conclusion
In conclusion, the paper has comprehensively discussed structured and systematic methods of designing a network. A discussion on the various problems that can occur in organizations when they are not used has been presented.
References
Robertazzi, T. G. (2017). Introduction to computer networking. Springer. https://books.google.co.ke/bookshl=en&lr=&id=uqI7DgAAQBAJ&oi=fnd&pg=PR8&dqnepage&q
Cite this page
Essay Sample on Network Design: Planning & Implementing Computer Network Infrastructure. (2023, Oct 29). Retrieved from https://proessays.net/essays/essay-sample-on-network-design-planning-implementing-computer-network-infrastructure
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Cyber Security Threats in Banking Essay
- Personal Statement on Technology and Digital Use in the Education Sector
- Health Informatics and Surveillance Paper Example
- Paper Example on Cyber Intrusion Hits US Office of Personnel Management: 2 Attacks Detected
- Essay Example on Secure Data Sharing: Packet Filtering Strategies
- Small Businesses: Protecting Against Cyberattacks & Minimizing Risks - Essay Sample
- Essay Example on Public-Private Partnerships: Financing and Delivering Projects for Public Benefit