300 likes | 448 Views
CHAPTER 5-part 2. Designing a campus network design topology. Campus network. The topologies for campus network should meet a customer’s goal for : Availability Performance How to achieve this? Have small bandwidth domains, small broadcast domain, redundancy, mirrored servers. Continue.
E N D
CHAPTER 5-part 2 Designing a campus network design topology
Campus network • The topologies for campus network should meet a customer’s goal for : • Availability • Performance • How to achieve this? • Have small bandwidth domains, small broadcast domain, redundancy, mirrored servers
Continue.. • Campus network should be design using a hierarchical. Modular approach so network can offer good performance, maintainability and scalability.
Continue.. • Campus consists of • campus access layer • End-user workstations and IP phones connected to switches /wireless access point • Higher-end switches provide uplinks to the distribution layer. • Services offered : network access, broadcast control, protocol filtering and marking of packets for quality of service features.
Continue.. • Campus distribution layer • The task for this layer is to aggregate wiring closets within a building and provide connectivity to the campus core via routers/switches with routing modules. • This module provides: routing, QoS and access control methods for meeting security and performance requirements. • Recommended to have redundancy and load balancing.
Continue.. • Campus core layer • Interconnects the access and distribution modules with the data center, network management and edge modules. • Provides redundant and fast-converging connectivity. • It routes and switches traffic as quickly as possible from one module o another. • Use high-speed router/switches with routing capability and provide Qos and security features.
Spanning tree protocol • The topology of each module and sub module of a campus network design is partially determined by the Spanning Tree protocol (STP). • It is a protocol that ensures a loop- free topology for any bridged /switch Ethernet LAN. • Basic function of STP is to prevent bridge/switch loops and the broadcast radiation that results from them. • STP also allows a network o include spare (redundant) links to provide automatic backup paths if an active links fails without the danger of bridge loops, or the need of manual enabling/disabling of these backup links. (wiki)
Continue.. • Have redundant link between switch A and switch B • This setup creates the possibility of bridging loop. i.e. a broadcast / • multicast packet that transmits from station M and is destined for station N simply continues to circulate between both switches. • Run STP on both switches , then the link will look like this:
Virtual lans • A campus network should be designed using small bandwidth and small broadcast domains. • A bandwidth domain = a set of devices that share bandwidth and compete for access to the bandwidth. • Traditional bus topology or hub=based Ethernet=single bandwidth domain. • A switch divides up bandwidth domain and is often used to connect each device so that the network consists of many extremely small bandwidth domains. • With switch, the bandwidth domain consists of the switch port and the device that connects it. • On network that experience collision (traditional Ethernet), a bandwidth domain= collision domain.
Continue.. • By default, switches do not divide broadcast domain. • The campus access layer should use switches and provide broadcast control. • How? Use VLAN
Vlans..continue.. • What is VLAN? • Is an emulation of a standard LAN that allow data transfer to take place without the traditional physical restraint placed on the network. • It is a set of LAN devices belong to an administrative group. • Group membership is based on configuration parameters and administrative policies rather than physical location. • Member in VLAN communicate with each other as if they were on the same wire or hub , actually there might be located at different physical LAN segment. • Since VLAN are based on logical instead of physical connections, they are extremely flexible.
Continue.. • In modern network: • IP configuration is using DHCP • VLAN has become a method to subdivide physical switch-based LANs into many logical LAN. • VLANs allow a large, flat, switch-based network to be divided into separate broadcast domains. • A VLAN-enabled switch floods a broadcast out only to the ports that are part of the same VLAN as the sending station.
Fundamental VLAN Designs • Figure 5-8 shows two switches , A and B. • Switch A connect station A. • Switch B connect station B. • When station A1 send a broadcast, station A2 and station A3 receive the broadcast. • None of station B receives the broadcast since both switches are not connected.
Continue.. • Figure 5-9 show the same configuration using a single switch. • This allow two VLANs implemented in a single switch rather than 2 separate physical LAN. • The broadcast, multicast and unknown-destination traffic originating with any member of VLAN A is forwarded to all other members of VLAN A. • No packet is forwarded to VLAN B. • The protocol behavior is same as in figure 5.8
Continue.. • VLANs can span multiple switches. • Figure 5.10 shows switches with VLAN A and VLAN B. • In this figure, all frames going from switch A to switch B take the same interconnection path.
VLAN A VLAN A Station A1 Station A2 Station A3 Station A4 Station A5 Station A6 Switch A Switch B Station B1 Station B2 Station B3 Station B4 Station B5 Station B6 VLAN B VLAN B VLANs Span Switches Figure 5.10 AAB-2013
Continue.. • How to recognize the destination of the packet? • Have VLAN tag – a special header , contains a VLAN identifier that specifies to which VLAN the frame belongs. • Since both switches have been configured to recognize VLAN A and VLAN B, they can exchange frames across the interconnection link. • The recipient switch can determine the VLAN into which those frames should be sent by examining the VLAN tag. • The link between the switches is called a trunk link/a trunk. • A major design consideration is determine the scope and how many switches it should span. • Most designer will keep the scope small, since VLAN is a broadcast domain. • A single broadcast domain should be limited to a few hundred workstations. • Another design consideration is trunk capacity. • 10 Mbps is sufficient to support small network/lab network for learning and testing purpose.
Wireless LAns • User mobility become an important goal for many enterprises. • In a campus design network, one/more wireless LANs (WLAN) meet this goal by offering intranet and internet access in open areas on the campus. • Can be applied at office for cost effective. • A WLAN has an access point (AP) that communicate using radio frequency (RF) with wireless clients. • The area that a single access point can cover is known as a wireless cell.
Continue.. • Designing a WLAN topology : • Designer need to determine the coverage area of each wireless cell • To decide how many cells will be required to meet total coverage needs. • Factors that affect the coverage of a single AP? • Data rate, power level, antenna choice, antenna positioning.
Secure network design topologies • Discuss network security in relation to network topologies. • Planning for physical security. • When design the logical topology , start thinking of where to put the equipments. • Critical equipment must stored in a secured place where have protection from unauthorized access, theft, vandalism and natural disasters.
Meeting security goal with firewall topology • Firewall= a system/combination of systems that enforces a boundary between two/more networks. • Firewall can be : • A router with ACLs • A dedicated hardware box • A software running on a PC or UNIX system.
Continue.. • Put firewall in network topology so that all traffic from outside the protected network must pass through the firewall. • A security policy specifies which traffic is allowed to entered the network. • Firewall important at boundary between the enterprise network and the Internet. • A basic firewall topology = simply a router with a WAN connection to the Internet, a LAN connection to the enterprise network and software that has security features. • This is suitable for simple security policy which can be implemented on the router with ACLs. • The router can also use NAT to hide internal addresses from Internet hackers.
Security Topologies Internet Firewall DMZ Enterprise Network Figure 5.16: DMZ Topology Web, File, DNS, Mail Servers AAB-2013
Continue.. • For customer that need to publish data and protect private data: • the firewall topology can include a public LAN that hosts web, FTP,DNS and SMTP servers. • Public LAN=demilitarized zone (DMZ). • A host in DMZ is referred as a bastion host= a secure system that supports a limited number of applications for use by outsiders. • Web pages
Continue.. • For a large customer- use dedicated firewall in addition to a router between the internet and the enterprise network. • To maximize security – run security features on the router and on the dedicated firewall ( this will minimize the performance…why???) • An alternate topology is to use two routers as the firewalls and place the DMZ between them. • Fig 5.17
Security Topologies DMZ Enterprise Network Internet Web, File, DNS, Mail Servers Figure 5.17 AAB-2013
Continue.. • This topology is known as a three-part firewall topology. • Disadvantage: • The configuration on the routers might be complex, have many ACLs to control traffic in and out of the private network and the DMZ. • Traffic for the enterprise network flows through the DMZ. The DMZ connect public servers that can be compromise and act as a launching pad for attacks into the enterprise network.
Continue.. • How to strengthen this topology? • Use router with simple ACLs either at end of DMZ • Include firewall at either end that are configured with more complex ACLs. • The bastion hosts inside DMZ run firewall software and can be configured for a limited set of services.
Summary • Use a systematic, top-down approach • Plan the logical design before the physical design • Topology design should feature hierarchy, redundancy, modularity, and security AAB-2013
Review Questions • Why are hierarchy and modularity important for network designs? • What are the three layers of Cisco’s hierarchical network design? • What are the major components of Cisco’s enterprise composite network model? • What are the advantages and disadvantages of the various options for multihoming an Internet connection? AAB-2013