Lesson 1 Network Design
Introduction to Network • A Good Network Design • Design Principles • Network Designing
Tasks • Modular Network Design
Hierarchical Network Design: Access Layer, Distribution Layer, Core Layer
Cisco Enterprise Composite Network Model: Enterprise Campus, Enterprise Edge, Service Provider Edge
Enterprise Campus: i. Campus Infrastructure module ii. Management module iii. Server module iv. Edge
Distribution module
Lesson 2 SWITCHING DESIGN
Switching- Introduction • Switching Types • Spanning Tree Protocol • VLAN
The switching types are 1. Layer 2 switching 2. Layer 3 Switching
SPANNING TREE PROTOCOL, Redundancy Issues,
STP Operation, STP Terminology, STP in LAN, STP States, STP Options, Rapid STP, VLAN- A Glance, VLAN
Membership, VLAN Trunk, VLAN and STP, PVST, MISTP
Lesson 3 Switching Design - Part 2
• Virtual Trunking Protocol • Multilayer Switching • Cisco Express Forwarding • Switching Security •
Switching Design consideration
VLAN Trunking Protocol-VTP, Switches in VTP : Server Mode Client Mode transparent Mode.
VTP pruning, Inter VLAN Routing: I. By using multiple physical interfaces, II. By using single physical
interfaces
Multilayer Switching: Multilayer switching and Cisco Express Forwarding.
MLS Components: MLS Route Processor (MLS-RP), MLS Switching Engine (MLS-SE), Multilayer Switching
Protocol (MLSP)
MLS Operation, Cisco Express Forwarding, CEF-Components, FIB, Adjacency Table
Switching Security: The two type of Switch securities are i. Catalyst native security , ii. Catalyst hardware
security
Catalyst native security: Catalyst native security-Built in Security, Catalyst switches – PVLAN, Catalyst
Hardware security, Switching Design Considerations, Cisco current campus design recommendations.
Lesson 4 Switching Design - Part 2
Virtual Trunking Protocol
• Multilayer Switching
• Cisco Express Forwarding
• Switching Security
• Switching Design consideration
VLAN Trunking Protocol-VTP, Switches in VTP: Server Mode Client Mode transparent Mode.
VTP pruning, Inter VLAN Routing: i. By using multiple physical interfaces, II. By using single physical
interfaces
Multilayer Switching: Multilayer switching and Cisco Express Forwarding.
MLS Components: MLS Route Processor (MLS-RP), MLS Switching Engine (MLS-SE), Multilayer Switching
Protocol (MLSP)
Cisco Express Forwarding (CEF) Components: The Forwarding Information Base, Adjacency table, FIB,
Adjacency Table
Switching Security: i. Catalyst native security , ii. Catalyst hardware security
Catalyst switches – PVLAN, Catalyst Hardware security, Switching Design Considerations, Cisco current
campus design recommendations.
Lesson 5 IPv4 ROUTING DESIGN- IP Addressing
IP Addressing Introduction
• IPv4 Address Design
– Determining the required number of IP Addresses
– Private and Public IP Address
– Subnet Mask for Routing
– Hierarchical IP address design.
• IP Multicast
IP Address Classes, IP Address - A Glance, VLSM, Importance of IP Addressing,
IPv4 Address Design: – Determining the required number of IP Addresses – Private and Public IP Address
• Private IP and Public IP- Meaning. • NAT – Subnet Mask for Routing • How routers use subnet mask •
Determining the subnet mask to use – Hierarchical IP address design
NAT Configuration, NAT Table, NAT-One to one Translation, NAT- Address Overloading, Subnet Mask for
Routing, Determining the Subnet Mask to Use- In class practice, In class practice – Answer
Hierarchical IP Address Design and Summarization, IP Address Summarization, Route summarization,
Not Summarizing the Routes, Summarizing the Routes, Route Summarization on a Nonoctet Boundary,
Calculating Summary Route- Nonoctet Boundary, IP Multicast, IGMP and CGMP and PIM
Lecture 6
IPv4 ROUTING DESIGN- IP Routing Protocols
• Classification of Routing Protocols
• Routing Protocols
• Routing Protocol Metrics
• Convergence Time
• Routing Protocol Comparison
• Routing Protocol Selection
• Virtual Routing
Interior and Exterior Routing Protocols, Distance Vector Routing Protocol, Link-State and Hybrid Routing
Protocols, Distance Vector, Link-State, and Hybrid Routing Protocols, Routing loops, Flat and Hierarchical
Routing Protocols, Classful and Classless Routing Protocols, Classful Routing Protocol - Design
Implications
Routing Protocol Metrics factors:- Load, Reliability.
Convergence Time, Convergence in Routing Protocols., Route Summarization with Routing Protocols.
Routing Information Protocol, Versions 1 and 2, Interior Gateway Routing Protocol and Enhanced IGRP,
Open Shortest Path First, Integrated Intermediate System-to-Intermediate System, link-state classless, S-
IS Network, Border Gateway Protocol Version 4, Routing Protocol Comparison,
Routing Protocol Selection- Choosing Your Routing Protocol: Core Layer, Distribution layer, The access
layer
Redistribution, Filtering, and Administrative Distance
Virtual Routing
Lecture 7
Wireless LAN Design
Wireless Technology- Overview
• Wireless Security • Wireless Management • Wireless Design Consideration
Wireless Standards, Wireless Components: i. Wireless Access Points, ii. Wireless Client Devices
User Workstations and Laptops: Ad-Hoc Network, PDAs, Wireless IP Phones
Wireless Security: Wireless Security Issues
Wireless Threat Mitigation: Basic Wireless Security: i. SSIDs, ii. Wired Equivalent Privacy (WEP), iii. Media
Access Control (MAC) address verification
Enhanced Wireless Security: 802.1x, Wi-Fi Protected Access, 802.11i
Wireless Intrusion Detection, Wireless Management: • RF management services • Interference
detection • Assisted site survey • RF scanning and monitoring
Cisco Integrated Wireless Network
Wireless Design Considerations: 1. Site Survey, 2. WLAN Roaming, 3. Point-to-Point Bridging
Design Considerations for Wireless IP Phones
Lecture 8
QoS Design and Network Management
Qos Design • Introduction • QoS Requirements • QoS Models • QoS Tools
Network Management • Introduction • Network Management protocols and Tools • SLC and SLA
Network Delay
QoS Requirements for Voice, Data, Video, and Other Traffic
QoS Models: IntServ and DiffServ.
QoS Tools
The following sections explore these QoS tools: • Classification and Marking • Policing and Shaping •
Congestion Avoidance • Congestion Management • Link-Specific Tools • AutoQoS
Network Management Protocols and
Tools
• Simple Network Management Protocol (SNMP)
• Management Information Base (MIB)
• Remote Monitoring (RMON)
• Cisco NetFlow
• Syslog
• CiscoWor
Network Management Terminology
Lecture 9
Voice Transport Design- Part 1
Voice Transport- Introduction
VoIP Components
IP Telephony Components
Voice Coding and Compression Techniques,
Voice communication – Advantages, Digitization
Digitization: 1. VoIP, 2. Using IP phones to digitize and packetize the voice., VoIP and IP Telephony
Conversation and Control Traffic
QoS, VoIP Components, IP Telephony Components, IP infrastructure, IP Phones, Video Telephony, Call
Processing, Applications, Voice Gateway, Voice Coding and Compression Techniques, Voice Activity
Detection, Compressed Real-Time Transport Protocol.
Lecture 10
Voice Transport Design- Part 2
Overview
• Bandwidth Requirements
• IP Telephony Design
– Single-Site IP Telephony Design
– Multisite Centralized IP Telephony Design
• Voice Security
– Security Concerns
– Mitigation
Grade of service (GoS), Erlangs, Centum call seconds (CCSs), Busy-hour traffic (BHT), Trunk Capacity
Calculation of Trunk Capacity or Bandwidth: Trunk capacity = Number of simultaneous calls to be
supported * Bandwidth required per call.
Voice packet size = Layer 2 header size + IP/UDP/RTP header size +Voice payload size
Voice packets per second (pps) = Codec bit rate / Voice payload size
Bandwidth per call = Voice packet size (bits) * Voice pps.
Signalling Traffic Bandwidth
IP Telephony Design: Single-Site IP Telephony Design, Multisite Centralized IP Telephony Design
Multisite Distributed IP Telephony Design, Voice Security
IP Telephony Network Security Concerns: • Access attacks • Denial-of-service attacks
Mitigating to Protect IP Telephony: Threat defense, Secure communication, Trust and identity
Lecture 11
Designing a network
Overview
Case Study_ Collecting Data
– Case study - Analyzing Background Information and Context.
– Case study - Understanding Network Requirements.
Case Study_ Solution
– Design Model
– Switching
– Security
– IP Addressing and Routing Protocol
– E-Mail
– QoS and Voice
– Wireless
– Network Management
– Future Considerations
Network Requirements After Acquisitions Are Complete.
SOLUTION
Solution to the case study introduced now includes the following sections:
• Design Model
• Switching
• Security
• IP Addressing and Routing Protocol
• E-Mail
• QoS and Voice
• Wireless
• Network Management
• Future Considerations
Lecture 12
Enabling Technologies
Overview
• Testing and Documenting Network Design
• Cloud Computing
• IPv6
Relative importance for a typical document
Documentation
Layer 3 diagram
Circuit number table
IP address allocation table
Rack layout diagram
Wi-Fi diagram
Cloud Computing
• Deployment Models • Service Models
Service Models are the reference models on which the Cloud
Computing is based. These can be categorized into three
basic service models as listed below:
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)
Cloud Computing – Advantages
• Lower computer costs
• Improved performance:
• Reduced software costs
• Instant software updates
• Improved document format compatibility
• Unlimited storage capacity
• Increased data reliability
• Universal document access
• Latest version availability
• Easier group collaboration
• Device independence
Cloud Computing – Disadvantage
• Requires a constant Internet connection
• Does not work well with low-speed connections
• Features might be limited
• Can be slow
• Stored data can be lost
• Stored data might not be secure
Why IPv6?
• Deficiency of IPv4
• Address space exhaustion
• New types of service → Integration
– Multicast
– Quality of Service
– Security
– Mobility (MIPv6)
• Header and format limitations
Advantages of IPv6 over IPv4
• Larger address space
• Better header format
• New options
• Allowance for extension
• Support for resource allocation
• Support for more security
• Support for mobility
Traffic Class
IPv6 Flow Label
• Related sequence of packets
• Needing special handling
• Identified by src & dest addr + flow label
• Router treats flow as sharing attributes
– E.g. path, resource allocation, discard requirements,
accounting, security
• May treat flows differently
– Buffer sizes, different forwarding precedence, different
quality of service
• Alternative to including all information in every header.
Payload Length
IPv6 Packet (PDU) Structure
IPv6 Header Format