How do you determine the right network (WAN) architecture for a computer network?
One of the most complicated decisions to make for an IT department about the architecture of a multi-site voice / data network. If the network is based on simple point-to-the bandwidth of T1 circuits? How about bandwidth burstable DS3 or maybe just one cloud band OC3? No matter the bandwidth chosen …. the most efficient design should be based on a backbone of communication configuration MPLS (Multi-Protocol Label Switching).
To get there, first of allin deciding about the architecture of any WAN communications network organization is necessary to determine ….
– How many points you want to connect?
– Architecture – hub and spoke or mesh architecture?
– What applications will run on the network …. Voice, Video, Data, all of the above?
– Exactly which applications will run in the event of data?
– What will each take the% of your QoS, the total of all three should be100%?
– Voice is the premium level of QoS and therefore the most expensive as it is a real-time communication, followed by the video and then.
– How many people are just using the network at any given point of time in each location?
– What will be the competition factor? If you are looking for competition 100% or you can do with less competition?
– What is the scope of scalability in every home and place hub?
– Internet access alsobe given to users?
– Internet in a central location, can help implement and enforce various security policies of your organization.
– Do you want to access network resources to a mobile user?
The answer to all these questions will help to achieve the bandwidth required for each MPLS hub and spoke about the position.
Honestly, no organization should ideally try to do this calculation yourself. Instead they can hire a consultant or atelecommunications service provider to do this activity because they are experts in designing this solution. With their help you can easily decide the bandwidth for each location, select suitable router, make plans to dismiss, the routing of traffic on the routes of the Atlantic or Pacific, blah blah.
To help walking through the analysis …. and determine the best solution …. take advantage of free help to DS3-Bandwidth.com.
Ideally I would also recommend that you give freedom to provide and managethe router at each location of service provider Telecom. Then it becomes a managed solution and the service provider can easily monitor the network in case of interruption. They then log into the router remotely and manage the complete network and giving greater uptime SLA.
At the end …. take a deep breath and work through the steps above. Following this simple game plan will take the right decision for the network of organizationsarchitecture.
Elements of network architecture

Image : http://www.flickr.com
There are four basic elements of network architecture, a network must be like in design. Each of them must be planned for the development of the network. These elements are presented below:
Before fault tolerance: the average fault tolerance is to ensure that the network operates, although it occurred. This can not happen, or in many different places within the network, such as cables, routers, switches,Server.
The key idea in the fault tolerance components for the duplication of work make up, I know When error occurred Than the case, it is a functional and an alternate network will still be. This is an important component in the design of the Internet.
According Scalability importance of ensuring the scalability that the proposed network of the future, grow, without the extension. Thus, the network administrator can add more usersthe network or add an entire sub-network without modification of the original network. This element is very important on the Internet, because anyone can see that the Internet continues to grow and more users are added every day.
Third Quality of Service (QoS): QoS is also an important aspect of any network, particularly via the Internet. QoS allows the administrator to lower classified network performance of the higher. SoNetwork will vary from user to user, according to the transmitting or the nature of the users.
Some users of transmitting voice over the network when making a call, while others regularly sends data as files and email. Each of these services requires a different network, or a class that uses the service. Voice and video must be the highest priority, files and emails have the lowest priority. This is because voice and video delaysensitive and must be sent soon.
Safety Fourth: to transmit sensitive data over any network like the Internet, security is often an important aspect to consider. This is because the data can be transmitted to be sensitive or private. This is data encryption, so nobody can read the data other than the target fixed. In an Internet protocol called Secure Hypertext Transfer Protocol is used for this purpose.
Thesensitive data, passwords or credit card numbers that must be protected. are also in the account on a server, user credentials are first defined on the server. This is called authentication and is a further element of security. The two aspects are very important, which are used in Internet protocols. Note that the Internet is an open and security is very important as part of its architecture.