Fixed Access Networking

The IT has defined a hierarchical design model which uses layered approach for designing LANs. In a hierarchical design, the capacity, features, and functionality of a specific device are optimized for its position in the network and the role that it plays. This promotes scalability and stability. The building block components are the access layer, the distribution layer, and the core (backbone) layer.

The building blocks of modular networks are easy to replicate, redesign, and expand. There should be no need to redesign the whole network each time a module is added or removed. Distinct building blocks can be put in-service and taken out-of-service without impacting the rest of the network. This capability facilitates troubleshooting, problem isolation, and network management.

The access layer is the first point of entry into the network for edge devices, end stations, and IP phones. One of the most vulnerable points of the network is the access edge. The access layer is where end users connect to the network. The access layer provides the first line of security defense for the network, provide service differentiation based upon management policies and, providing power to support the deployment of specialized devices.

The access layer is where your client’s network devices directly connect to your network. You want their connection to be as efficient, simple, and secure as possible. This involves controlling who accesses the network and for what services. Controlling access may be as simple as blocking access, or it may involve a redirection or quarantining action.

Securing the access layer should be divided corresponding to the type of access to the media because of the specifics of securing wireless as opposed to securing fixed access networks. Radio waves travel through ceilings, floors and walls and access to the media is easier than fixed access network. This network security segment discusses security of wired networks. This includes security segments like access switches Layer 2 security, device access security, preventing unauthorized access and data interception at the LAN point of entry.