You are on page 1of 19

Unidad 4: Diseño lan

conmutado

CCNA Routing and Switching

Introduction to Networks 6.0


4.1 Fundamentos de diseños de
redes

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Cisco Validated Designs  A company with a small network with
one site and a connection to the
The Need to Scale the Network Internet might grow into an enterprise
with a central location with numerous
remote sites across the globe.

 All enterprise networks must:


• Support the exchange of various types
of network traffic
• Support critical applications
• Support converged network traffic
• Support diverse business needs
• Provide centralized administrative
control
 The LAN is the networking
infrastructure that provides access to
network resources for end users over
a single floor or a building.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Expanding the Network  The network designer must develop a
Design for Scalability strategy to enable the network to be
available and scale easily and effectively.

 Use expandable, modular equipment or


clustered devices that can be easily
upgraded to increase capabilities.
 Design a hierarchical network to include
modules that can be added, upgraded, and
modified as needed.

 Create an IPv4 or IPv6 address strategy


that is hierarchical.
 Choose routers or multilayer switches to
limit broadcasts and filter undesirable traffic
from the network.

 Implement redundant links between critical


devices and between access and core
layers.© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
4.2 Modelos y Metodologías

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Converged Networks
Hierarchy in the Borderless Switched Network
 Borderless switched network design
guidelines are based on the following
principles:
• Hierarchical - Facilitates understanding
the role of each device at every tier.
• Modularity - Allows seamless network
expansion and integrated services.
• Resiliency – Provides an always
available network.
• Flexibility - Allows intelligent traffic load
sharing.
 The three tiers of the hierarchical model
are Access, Distribution and Core layers.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Converged Networks
Access, Distribution, and Core Layers
 Access Layer – provides network access
to the user.
 Distribution Layer - interfaces between
the access layer and the core layer.
Provides functions such as:
• aggregating Layer 2 broadcast domains and
Layer 3 routing boundaries.
• providing intelligent switching, routing, and
network access policy functions to access
the rest of the network.
 Core Layer - is the network backbone. It
provides fault isolation and high-speed
backbone connectivity. Smaller networks that do not need a separate
distribution and core layer often use a two-tier campus
or collapsed core network design.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Devices in a Small Network  Regardless of the size, all networks
Device Selection for a Small require planning and design to ensure
that all requirements, cost factors, and
Network deployment options are considered:
• Cost – The cost of a switch or router is
determined by its capacity and
features.
• Speed and Types of Ports/Interfaces –
Choosing the number and types of
ports on a router or switch is an
important decision.
• Expandability – Networking devices
come in both fixed and modular
physical configurations for
expandability and flexibility.
• Operating System Features and
Services – Features and services
should be considered including:
security, QoS, VoIP, Layer 3 switching,
NAT and DHCP.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Devices in a Small Network
 IP addressing space must be planned
IP Addressing for a Small Network when implementing a small network.

 All hosts within an internetwork must have


a unique address.
 Different types of devices will factor into the
IP design including:
• End devices for users
• Servers and peripherals
• Hosts that are accessible from the Internet
• Intermediary devices
 Planning and documenting the IP
addressing scheme helps administrators
track device types. For example, if all
servers are assigned a host address in the
range of 50-100, it will be easier to identify
server traffic by their IP address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Devices in a Small Network  The types of traffic and how they
Traffic Management should be handled should be
considered and prioritized in the
network design.

 Routers and Switches in a small


network should be configured to
support real-time traffic such as voice
and video. For example:
• Voice  High Priority
• Video  High Priority
• SMTP  Medium Priority
• Instant Messaging  Normal Priority
• FTP  Low Priority
 Network traffic should be classified
according to priority in order to
enhance productivity of employees
and minimize network downtime.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Small Network Applications and Protocols  There are two forms of software programs
Common Applications or processes that provide access to the
network:
• Network Applications – The software
programs used to communicate over the
network. Some end-user applications are
network aware, and are able to communicate
directly with the lower layers of the protocol
stack. Examples include email clients and
web browsers.
• Application Layer Services – Other programs
need the assistance of application layer
services to use network resources such as
fire transfer or network print spooling.
 Each application or network service uses
protocols, which define the standards and
data formats to be used to format and direct
data.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Small Network Applications and Protocols  Most network professionals work with
Common Protocols network protocols which support the
applications and services used by
employees in a network.
 The figure on the left lists some common
network protocols that are used in most
networks – including small networks.

 Each of these network protocols define:


• Processes on either end of a communication
session.
• Types of messages
 DNS – Service that provides the IP address of a website
• Syntax of the messages
or domain name so a host can connect to it without
using the numerical IP address. • Meaning of information fields
• How messages are sent and the expected
 DHCP Server – Service that assigns an IP address,
response
subnet mask, default gateway and other information to
clients so they don’t have to enter them manually. • Interaction with the next lower layer

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Scale to Larger Networks
Protocol Analysis  As a network grows, it is very important
to understand the type of traffic that is
crossing the network as well as the
traffic flow.

 A protocol analyzer is the primary tool


used for this. It can also help identify
any unknown traffic and its source.

 To determine traffic flow patterns:


• Capture traffic during peak utilization
times.
• Perform the capture on different network
segments since some traffic will be local
to particular segments.
 The analysis of traffic patterns can be
used to help make decisions on how to
manage the traffic for efficiency.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Scale to Larger Networks
 In addition to understanding changing
Employee Network Utilization traffic trends, a network administrator
must also be aware of how network use is
 Examples of processes running in the Windows changing.
operating system  A network administrator has the ability to
obtain in-person IT “snapshots” of
employee application utilization over time.
This information can help the network
administrator adjust network resources as
necessary. These snapshots typically
include:
• OS and OS Version
• Non-Network Applications
• Network Applications
• CPU Utilization
• Drive Utilization
• RAM Utilization
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
4.3 Diseño de redes lógicas: IP,
subredes y VLSM

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Structured Design
Network Address Planning

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Structured Design
Planning to Address the Network
 Each host in an internetwork must have
a unique address.

 Need proper planning & documentation.

 Must provide & control access to servers


from internal hosts and external hosts.

 Layer 3 STATIC address assigned to a


server can be used to control access to
that server.

 Monitoring security and performance of


hosts means network traffic is examined
for source IP addresses that are
generating or receiving excessive
packets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Structured Design
Assigning Addresses to Devices
 Devices that require addresses:

• End user clients


• Can be set for DHCP to save time and
manual errors.
• A change in the subnetting scheme requires
reconfiguration of DHCP server. IPv6 clients
use DHCPv6/SLAAC.
• Servers
• Configured with static addresses.
• Private addresses translated to public
addresses if accessible from the Internet.
• Intermediary devices
• Set with static addresses for remote
management.
• Gateway
• Router interface used to exit the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

You might also like