1 / 43

Introducing Network Design Concepts

Introducing Network Design Concepts. Designing and Supporting Computer Networks – Chapter 1. Objectives. Explain how a hierarchical network design creates a stable, reliable, scalable network

azura
Download Presentation

Introducing Network Design Concepts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introducing Network Design Concepts Designing and Supporting Computer Networks – Chapter 1

  2. Objectives • Explain how a hierarchical network design creates a stable, reliable, scalable network • Explain what factors need to be considered when the Core Layer of a network is designed and implemented • Explain which factors need to be considered when the Distribution Layer of a network is designed and implemented • Explain which factors need to be considered when the Access Layer of a network is designed and implemented • Describe the benefits and security implications of creating server farms • Describe the considerations of an implementation of a wireless network design • Describe the factors that affect the implementation of VPNs, including how remote workers can be supported

  3. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network Network requirements: • Ease of management • Fast recovery • Application response time • Fast troubleshooting

  4. NETWORK DESIGN OVERVIEW • Internet-based economy • Demands around-the-clock customer service • 100% availability • Must automatically protect against security unexpected incidents • Must be able to adjust to changing traffic loads

  5. NETWORK DESIGN OVERVIEW • Business Network requirement • Always available, even when there is equipment failure or overload conditions • Reasonable response times • Be sure, protect both data transmitted and stored • Easy to modify to adapt to network growth and general business changes • Troubleshooting should be easy • When you look at these carefully, this translates into 4 fundamental network design goals Scalability Availability Security manageability

  6. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network Four fundamental network design goals • Scalability—network is able to grow to include new user groups and remote sites • Availability—delivers consistent, reliable performance 24-7 and failures of equipment don’t significantly impact network performance • Security—planning the location of security devices, filters and firewalls to safeguard network resources • Manageability—the network must be simple enough that the network staff must be able to manage and support the network

  7. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network • Core Layer: connects Distribution Layer devices • Distribution Layer: interconnects smaller LANs • Access Layer: provides connections for hosts and end devices

  8. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network • Hierarchical network • Local traffic remains local • Only traffic destined for other networks is moved to a higher layer • Can filter broadcasts • Can filter undesirable traffic

  9. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network Subdividing the three-layer model into modular areas: • Enterprise campus—Contains the network elements required for independent operation within a single campus or branch location • Server farm—data center server farm protects the server resources and provides redundant, reliable high-speed connectivity • Enterprise edge—Firewall area, filters traffic from the external resources and routes it into the enterprise network.

  10. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network • Creates a deterministic network with clearly defined boundaries between modules. • clear demarcation points so that the network designer knows exactly where the traffic originates and where it flows. • Eases the design task by making each module independent. • designer can focus on the needs of each area separately. • Provides scalability by allowing enterprises to add modules easily. • As network complexity grows, the designer can add new functional modules. • Enables the designer to add services and solutions without changing the underlying network design.

  11. Explain How a Hierarchical Network Design Creates a Stable, Reliable, Scalable Network Steps in network design projects: • Identify the network requirements • Business goals focus on how the network can make the business more successful • Technical requirements focus on how the network implements the technology • Characterize the existing network • Compare functionality of existing network with defined goals of the new project • What equipment can be reused? • Design the network topology and solutions • Top Down Approach—Identify applications and service requirements and design the network to support them • Prototype (small scale) is performed to ensure new design functions as expected before implementation

  12. Network Requirements Impacting the Entire Network • Adding new network applications and making major changes to existing applications • such as database or DNS structure changes • Improving the efficiency of network addressing or routing protocol changes • Integrating new security measures • Adding new network services, such as voice traffic, content networking, and storage networking • Relocating servers to a data center server farm

  13. Network Requirements Impacting the a Portion of the Network • Improving Internet connectivity and adding bandwidth • Updating Access Layer LAN cabling • Providing redundancy for key services • Supporting wireless access in defined areas • Upgrading WAN bandwidth These requirements may not affect many users or require many changes to the installed equipment. You should integrate design changes into the network without disrupting normal network operations for the majority of your users. This method reduces the costs associated with downtime and speeds the implementation of the network upgrade.

  14. Explain what Factors Need to be Considered when Designing the Network Core Layer • Core Layer is sometimes called the Network backbone • Connects multiple buildings or multiple sites • Goals of the Core Layer • Provide 100% uptime • Maximize throughput • Facilitate network growth

  15. Explain what Factors Need to be Considered when Designing the Network Core Layer • Combining routing and switching in the same device (either Routers or multilayer switches) • Redundancy and load balancing • High-speed and aggregate links • Quick convergence routing protocols • EIGRP and OSPF

  16. Explain what Factors Need to be Considered when Designing the Network Core Layer • Full mesh topology—every device has a connection to every other device • Partial mesh topology—each device is connected to at least two others, creating sufficient redundancy without complexity of full-mesh

  17. Explain what Factors Need to be Considered when Designing the Network Core Layer • Preventing Failures • Network Administrator must strive to provide a network resistant to failures so they can recover quickly. These routers and switches can contain • Dual power supplies and fans • Modular chassis-based design • Additional management modules • Hot swappable components (don’t have to turn off to exchange) • UPS devices to reduce minor power outages • Reducing human error • Caused by poorly planned or untested updates or additions of new equipment • Always test in a lab environment before putting into production • Have written policies and procedures in place to govern how changes are approved, tested, installed and documented • Plan a back-out strategy to return the network to its previous state if changes are not successful start here

  18. Designing the NETWORK CORE LAYER • Network Convergence • Occurs when all routers have complete and accurate information about the network • The faster the convergence time, the quicker a network can react to a change in topology • Factors that affect convergence time include • the speed at which the routing updates reach all of the routers in the network • The time it takes each router to perform the calcucation to determine the best paths • Select a routing protocol • To offer acceptable convergence times in small networks • You might need to use EIGRP or OSPF if network is large • Design Considerations • Combination of both dynamic and static routes • Consider the number of routes required to ensure that all destinations in the network are reachable • Remember large routing tables cause longer convergence • Might want to incorporate summarization strategies in all layers

  19. Designing the NETWORK DISTRIBUTION LAYER • Represents a routing boundary between Access and Core Layers • Serves as connection point between remote sites and the Core Layer • Built using Routers or Multilayer Switches

  20. Explain which Factors Need to be Considered when Designing the Distribution Layer of a Network • Goals of the Distribution Layer • Filtering and managing traffic flows • Enforcing access control policies • Summarizing routes before advertising the routes to the core • Isolating the Core from Access Layer failures or disruptions • Routing between Access Layer VLANs • Used to manage queues and prioritize traffic before transmission through the campus core

  21. Explain which Factors Need to be Considered when Designing the Distribution Layer of a Network • Trunk Links are used between Access and Distribution to carry traffic of multiple VLANs • Redundant links load balance the traffic across the links, which increases the available bandwidth • Usually wired in a Partial Mesh Topology to provide redundant paths to be sure the network can survive a link or device failure • This improves network reliability and stability

  22. Building a Redundant Network • Devices at the Distribution Layer have redundant connections to switches at the Access and Core Layers • If a link or device fails, these connections provide alternate paths • Providing multiple connections to Layer 2 switches can cause unstable behavior in a network unless STP is enabled • RSTP (Rapid Spanning Tree Protocol) provides rapid convergence of the spanning tree • Recalculations of STP cause servers to be down, losing transactions • Most common cause of frequent STP recalculations is a faulty power supply or power feed to a switch

  23. Explain which Factors Need to be Considered when Designing the Distribution Layer of a Network • ACLs can be used at the Distribution Layer to limit access and to prevent unwanted traffic from entering the Core • Routers examine each packet and forwards or discards based on the conditions

  24. Explain which Factors Need to be Considered when Designing the Distribution Layer of a Network • Standard ACLs filter on Source Address ONLY • Extended ACLs filter on • Source and Destination address • Protocols, Port numbers or applications • Whether the packet is part of an established TCP stream • Complex ACLs • Dynamic • User telnets to connect and authenticate (called lock and key) • Reflexive • Allows outbound traffic and then limits inbound traffic to only responses to those permitted request • Time-basd ACL—permitted and denied on time of day • Placement of ACLS • Standard close to destination (because you can’t filter on Destination) • Extended close to source (to limit traffic on the network)

  25. Routing Protocols the Distribution Layer of a Network • Route summarization (route aggregation or supernetting) • One route in the routing table represents many other routes • creates smaller routing tables • Less routing update traffic on the network • Lower overhead on the router • Manual or automatic • Classless protocols (RIPv2, EIGRP, OSPF) support route summarization based on subnet addresses on any boundary • Classful routing protocols (RIPv1) automatically summarize routes on the classful network but can’t support on other boundaries

  26. Routing Protocols the Distribution Layer of a Network

  27. Explain which Factors Need to be Considered when Designing the Access Layer of a Network • Physical location of equipment • Copper Ethernet limited by distance • Can also be wireless • Wiring closets • Actual closets or small rooms that act as the termination point for cabling within buildings or floors of buildings • Provides IP phones and wireless access points • Converged networking • Many devices can connect to an IP network such as IP telephones, Video cameras and video conferencing systems • Availability • People want 100%

  28. Explain which Factors Need to be Considered when Designing the Access Layer of a Network • Access Layer needs to be concerned with: • Naming structures • VLAN architecture • Traffic patterns • Prioritization strategies • Ensuring the network isn’t too complex • Allowing easy troubleshooting • Making it easier to add new features and services in the future

  29. Explain which Factors Need to be Considered when Designing the Access Layer of a Network Star topologies • Advantages • Easy installation • Minimal configuration • Disadvantages • Central device is a single point of failure • Capabilities of the central device can limit overall performance for access to the network • Topology does not recover in the event of a failure when there are no redundant links

  30. Explain which Factors Need to be Considered when Designing the Access Layer of a Network Functions of VLANs: • Separate and classify traffic streams • Control broadcast traffic within a single wiring closet or building • Contain VLANs within a single wiring closet, when possible

  31. Explain which Factors Need to be Considered when Designing the Access Layer of a Network Providing QoS (Quality of Service) to the Network Applications • Classification of applications based on specific delivery requirements at or near the source so it can be assigned the appropriate priority as it moves through the entire network. • Assigned priority based on the type of info it is, such as Voice over IP is assigned the highest priority

  32. Explain which Factors Need to be Considered when Designing the Access Layer of a Network Security risks at the network edge: • Limited Access to Authenticated Devices • Apply Wireless Security Measures that follow recommended practices

  33. Explain which Factors Need to be Considered when Designing the Access Layer of a Network Security measures at the Access Layer: • Physical security—this is where intruders gain access, have wiring closets locked and restrict access • Strong passwords • SSH • Disabling unused ports • Security policy

  34. Describe the Benefits and Security Implications of Creating Server Farms • Defined entry and exit points for network traffic • Makes it easier to secure, filter, and prioritize traffic • Redundant, high-capacity links installed to the servers • Load balancing and failover provided between servers and between networking devices • Lower cost of providing services

  35. Protecting Server Farms Against Attack • Firewalls • LAN switch security features • Intrusion and prevention systems • Load balancers • Network analysis and management devices • DMZs • Protecting against Internal Attacks (actually more common than external attacks)

  36. Describe the Benefits and Security Implications of Creating Server Farms • Building in redundancy for high availability • Virtualization • Separate logical servers can be located on one physical server • Reduces the cost of providing redundant services, load balancing and failover for critical network services

  37. Describe the Considerations of an Implementation of a Wireless Network Design Customer requirements: • Will wireless Roaming be required? • What Authentication for users is needed? • Open Access (hotspots) for guests? • What services and applications are available to wireless users? • What Encryption Technique? • Coverage and number of users?

  38. Describe the Considerations of an Implementation of a Wireless Network Design • Physical WLAN design focusing on physical coverage areas • Site survey done to determine coverage areas • Logical WLAN design • Open guest access vs. secured employee access • Separate WLAN infrastructure for employees that guests can’t access • IP phone connectivity

  39. Describe the Factors that Affect the Implementation of VPNs at the Enterprise Edge • Cost of bandwidth • QoS • Security is critical • Remote access

  40. Describe the Factors that Affect the Implementation of VPNs Interconnection options: • Traditional WAN technologies • Leased lines • Circuit-switched networks • Packet-switched networks • Cell-switched networks • Newer WAN technologies • DSL • Metro Ethernet • Cable modem • Long-range wireless

  41. Describe the Factors that Affect the Implementation of VPNs

  42. Summary • The four fundamental technical requirements of network design are scalability, availability, security and manageability. • Network projects involve identifying the requirements, characterizing the existing network, and designing the network topology and solutions. • Redundancy at the Core Layer keeps the network functioning even when a device or link fails. • Routing efficiency at the Distribution Layer isolates the Core from Access Layer failures. • Using VLANs and IP subnets is the most common way to segregate user groups and traffic within the Access Layer.

More Related