Why is it useful to use both a physical and a logical network design?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Before we take a look at why physical and logical network designs are important, let's clarify exactly what they are.
A physical layout of the network shows the physical location of and the connections between devices participating on the network. In such diagrams, workstations are usually represented with small computer icons, servers with full tower cases, and switches and other similar devices are displayed as small rectangular boxes with their RJ-45 ports in the front (sometimes, switches are displayed without ports, depending on the angle at which we are viewing the network on the page).
A logical layout shows all logical aspects of the network. This includes logical networks, assigned IP addresses to various hosts and devices, routing tables and a lot more. In logical diagrams, there is very little interest in the actual interfaces and physical cables, so these details are usually omitted.
So why do we need all the above? Simple - for security, troubleshooting and management reasons. When a problem arises, I.E. a link is down, by simply looking at the physical layout, we are able to quickly identify where the problem is located, allowing us to quickly resolve it.
Having a visual view of a logical and physical network also helps identify possible security problems. When an unwanted visitor tries to obtain access to highly sensitive information, in most cases he or she will create a map of the network to better understand where each security checkpoint (firewall or similar device) is installed and what access can be obtained.
The above reason is also why these 'maps' are restricted to Administrators and Engineers who are responsible for the network. If they fall into the hands of 'enemy,' they can prove to be the most effective weapon against you!
Related Q&A from Chris Partsenidis
Expert Chris Partsenidis offers guidelines for a smooth and successful PSTN to VoIP migration.continue reading
What SIP trunking basics should you know before you deploy? SIP trunking guru Chris Partsenidis explains what you need to know about SIP trunking ...continue reading
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.