Professional Documents
Culture Documents
1
Top-Down Network Designing and
Design, 3rd Edition Supporting Computer
Networks (CCNA)
Priscilla Oppenheimer
2
Four phases in the top-down network
design methodology
3
PART 1
IDENTIFYING YOUR
CUSTOMER’S NEEDS
AND GOALS
6
STRUCTURED NETWORK DESIGN
Availability
Security
Manageability
7
STRUCTURED NETWORK DESIGN
Core Layer: connects Distribution Layer devices
Distribution Layer: interconnects smaller LANs
8
START FROM THE TOP
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
11
TOP-DOWN NETWORK DESIGN STEPS
systems
Analyze
development life
requirements
cycle (SDLC).
Implement Develop
and test physical
network design
Test, optimize,
and document
design
12
THE PDIOO NETWORK LIFE CYCLE
Plan
Design Plan
Implement
Operate Design
Optimize
Retire
Optimize
Implement
Operate
13
NETWORK DESIGN STEPS
14
NETWORK DESIGN STEPS
15
NETWORK DESIGN STEPS
16
NETWORK DESIGN STEPS
Phase
4 – Testing, Optimizing, and
Documenting the Network Design
Test the network design
Optimize the network design
Document the network design
17
BUSINESS GOALS
Increase revenue
Reduce operating costs
Improve communications
Security
19
BUSINESS CONSTRAINTS
Budget
Staffing
Schedule
20
COLLECT INFORMATION BEFORE THE
FIRST MEETING
21
MEET WITH THE CUSTOMER
Try to get
A concise statement of the goals of the
project
What problem are they trying to solve?
How will new technology help them be more
22
MEET WITH THE CUSTOMER
Get a copy of the organization chart
This will show the general structure of the organization
It will suggest users to account for
23
MEET WITH THE CUSTOMER
Get a copy of the security policy
How does the policy affect the new design?
How does the new design affect the policy?
24
THE SCOPE OF THE DESIGN PROJECT
Small in scope?
Allow sales people to access network via a VPN
Large in scope?
An entire redesign of an enterprise network
Use the OSI model to clarify the scope
New financial reporting application versus new routing
protocol versus new data link (wireless, for example)
Doesthe scope fit the budget, capabilities of staff
and consultants, schedule?
25
GATHER MORE DETAILED INFORMATION
Applications
Now and after the project is completed
Include both productivity applications and
system management applications
User communities
Data stores
Protocols
Current logical and physical architecture
Current performance
26
SUMMARY
Systematic approach
Focus first on business requirements and
constraints, and applications
Gain an understanding of the customer’s
corporate structure
Gain an understanding of the customer’s
business style
27
REVIEW QUESTIONS
29
Availability
Performance
Affordability
30
SCALABILITY
Scalability
refers to the ability to grow
Some technologies are more scalable
Flat network designs, for example, don’t scale
well
Try to learn
Number of sites to be added
What will be needed at each of these sites
How many users will be added
How many more servers will be added
31
32
33
AVAILABILITY
Availability
can be expressed as a percent
uptime per year, month, week, day, or hour,
compared to the total time in that period
For example:
24/7 operation
Network is up for 165 hours in the 168-hour week
Availability is 98.21%
35
AVAILABILITY
DOWNTIME IN MINUTES
Enterprise
38
39
40
BENEFITS OF CREATING A SERVER FARM
1. Network traffic enters and leaves the server farm at a
defined point. This arrangement makes it easier to
secure, filter and prioritise traffic.
2. Redundant, high-capacity links can be installed to the
servers and between the server farm network and the
main LAN. This configuration is more cost-effective
than attempting to provide a similar level of connectivity
to servers distributed throughout the network.
3. Load balancing and failover can be provided between
servers and between networking devices.
4. The number of high-capacity switches and security
devices is reduced, helping to lower the cost of providing
41
services.
NETWORK PERFORMANCE
Common performance factors include
Bandwidth
Throughput
Bandwidth utilization
Offered load
Accuracy
Efficiency
Delay (latency) and delay variation
Response time
42
BANDWIDTH VS. THROUGHPUT
Bandwidth and throughput are not the
same
Bandwidth is the data carrying capacity of a
circuit, fixed.
Usually specified in bits per second-bps
Throughput is the quantity of error free
data transmitted per unit of time
Measured in bps, Bps, or packets per second (pps)
Depend on offered load, access method and error rate
Offered Load
OTHER FACTORS THAT AFFECT THROUGHPUT
46
PERFORMANCE (CONTINUED)
Efficiency
How much overhead is required to deliver an
amount of data?
How large can packets be?
Larger better for efficiency (and goodput)
But too large means too much data is lost if a packet is
damaged
How many packets can be sent in one bunch without an
acknowledgment?
47
EFFICIENCY
Small Frames (Less Efficient)
48
DELAY FROM THE USER’S POINT OF
VIEW
Response Time
A function of the
application and the
equipment the
application is
running on, not just
the network
Most users expect to
see something on the
screen in 100 to 200
milliseconds
49
DELAY FROM THE ENGINEER’S POINT
OF VIEW
Propagation delay
A signal travels in a cable at about 2/3 the speed
of light in a vacuum (3×108 m/s)
Transmission delay (also known as
serialization delay)
Time to put digital data onto a transmission line
For example, it takes about 5 ms to output a 1,024 byte
packet on a 1.544 Mbps T1 line
Packet-switching delay
Queuing delay
50
QUEUING DELAY AND BANDWIDTH UTILIZATION
15
Average Queue Depth
12
9
6
3
0
0.5 0.6 0.7 0.8 0.9 1
Average Utilization
52
SECURITY
53
MANAGEABILITY
Fault management
Configuration management
Accounting management
Performance management
Security management
54
USABILITY
55
ADAPTABILITY
Avoid incorporating any design elements
that would make it hard to implement new
technologies in the future
Change can come in the form of new
protocols, new business practices, new fiscal
goals, new legislation
A flexible design can adapt to changing
traffic patterns and Quality of Service (QoS)
requirements
56
AFFORDABILITY
A network should carry the maximum
amount of traffic possible for a given
financial cost
Affordability is especially important in
campus network designs
WANs are expected to cost more, but costs
can be reduced with the proper use of
technology
Quiet routing protocols, for example
57
MAKING TRADEOFFS (EXAMPLE)
Scalability 20
Availability 30
Network performance 15
Security 5
Manageability 5
Usability 5
Adaptability 5
Affordability 15
Total (must add up to 100) 100
58
SUMMARY
59
REVIEW QUESTIONS
60
CHAPTER THREE
CHARACTERIZING THE
EXISTING INTERNETWORK
61
62
WHERE ARE WE?
63
DIAGRAM A PHYSICAL NETWORK AND
DOCUMENT THE EXISTING NETWORK
Network documentation:
Logical and physical diagrams
Floor plans
IBM
Mainframe
T1
Web/FTP server
Eugene
Ethernet T1 Internet 65
20 users
DIAGRAM A PHYSICAL NETWORK AND
DOCUMENT THE EXISTING NETWORK
68
DISCONTINUOUS SUBNETS – make
problems for some routing protocols
Area 0
Network
192.168.49.0
Router A Router B
Area 1 Area 2
Subnets 10.108.16.0 - Subnets 10.108.32.0 -
10.108.31.0 10.108.47.0
69
CHARACTERIZE THE WIRING AND MEDIA
Single-mode fiber
Multi-mode fiber
Shielded twisted pair (STP) copper
Unshielded-twisted-pair (UTP) copper
Coaxial cable
Microwave
Laser
Radio
Infra-red
70
ARCHITECTURAL CONSTRAINTS
71
ARCHITECTURAL CONSTRAINTS
72
73
CHECK THE HEALTH OF THE
EXISTING INTERNETWORK
Performance
Availability
Bandwidth utilization
Accuracy
Efficiency
Response time
Status of major routers, switches, and
firewalls
74
CHARACTERIZE AVAILABILITY
Enterprise
Segment 1
Segment 2
Segment n
16:40:00
16:43:00
16:46:00
16:49:00
16:52:00
Time
16:55:00 Series1
16:58:00
17:01:00
17:04:00
17:07:00
17:10:00
0 1 2 3 4 5 6 7
Utilization 76
NETWORK UTILIZATION IN HOUR
INTERVALS
Network Utilization
13:00:00
14:00:00
Time
15:00:00 Series1
16:00:00
17:00:00
77
BANDWIDTH UTILIZATION BY
PROTOCOL
Protocol 1
Protocol 2
Protocol 3
Protocol n
78
CHARACTERIZE PACKET SIZES
79
CHARACTERIZE RESPONSE TIME
X
Node A
X
Node B
Node C X
Node D X
80
CHECK THE STATUS OF MAJOR ROUTERS,
SWITCHES, AND FIREWALLS
show buffers
show environment
show interfaces
Use Cisco
show memory IOS show
show processes command
show running-config
show version
81
TOOLS
Protocolanalyzers
Multi Router Traffic Grapher (MRTG)
CiscoWorks
82
SUMMARY
83
REVIEW QUESTIONS
What factors will help you decide if the
existing internetwork is in good enough shape
to support new enhancements?
When considering protocol behavior, what is
the difference between relative network
utilization and absolute network utilization?
Why should you characterize the logical
structure of an internetwork and not just the
physical structure?
What architectural and environmental factors
should you consider for a new wireless 84
installation?
CHAPTER FOUR
CHARACTERIZING NETWORK
TRAFFIC
85
Traffic flow
Location of traffic sources and data stores
Traffic load
Traffic behavior
86
USER COMMUNITIES, a set of worker who use
a particular application or set of applications.
87
DATA STORES (SINKS), an area in a network
where application layer data resides. Server, or any
device where large quantities of data are stored.
88
TRAFFIC FLOW, involves identifying and
characterizing individual traffic flows between
traffic source and stores.
Source 1
Source 2
Source 3
Source n
89
Library and Computing Center
TRAFFIC FLOW 30 Library Patrons (PCs) 10-Mbps Metro
50 PCs 25 Macs
50 PCs
Business and
Social Sciences
TYPES OF TRAFFIC FLOW
Terminal/host
Client/server
Thin client
Peer-to-peer
Server/server
Distributed computing
91
TRAFFIC FLOW FOR VOICE OVER IP
Redundancy
Security
NETWORK APPLICATIONS
TRAFFIC CHARACTERISTICS
95
TRAFFIC LOAD
To calculate whether capacity is sufficient,
you should know:
The number of stations
The average time that a station is idle between
sending frames
The time required to transmit a message once
medium access is gained
That level of detailed information can be
hard to gather, however
96
SIZE OF OBJECTS ON NETWORKS
97
TRAFFIC BEHAVIOR
Broadcasts
All ones data-link layer destination address
FF: FF: FF: FF: FF: FF
Doesn’t necessarily use huge amounts of bandwidth
But does disturb every CPU in the broadcast domain
Multicasts
First bit sent is a one
01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
Should just disturb NICs that have registered to
receive it
Requires multicast routing protocol on internetworks
98
NETWORK EFFICIENCY
Frame size
Protocol interaction
Error-recovery mechanisms
99
QOS REQUIREMENTS
100
QOS REQUIREMENTS PER IETF
(Internet Engineering Task Force, develops and
promotes Internet standards, It is an open
standards organization, with no formal
membership or membership requirements.)
102
HOW QUALITY OF SERVICE IS
IMPLEMENTED ON THE LAN/WAN
Where QoS can be implemented to affect
traffic flow:
Layer 2 devices
Layer 3 devices
DOCUMENT THE NETWORK
REQUIREMENTS OF SPECIFIC
CATEGORIES OF APPLICATIONS
Estimate the volume of application traffic
during the initial design phase.
Document projected applications and
associated hardware in a network diagram.
SUMMARY
105
REVIEW QUESTIONS