Professional Documents
Culture Documents
1
Objectives of This Section
• Learn
– How to design a network using the correct techniques
– Some common guidelines for network design
2
An Example
4
Strayer’s New Network
5
The Approach to Network Design
8
To Begin
10
The Framework
12
Oppenheimer Steps
13
Oppenheimer Steps
14
Oppenheimer Steps
15
Analyzing Business Goals and Constraints
16
Collect Information Before the Meeting
17
Financial Condition
18
Financial Condition
19
Meet With the Customer
20
Meet With the Customer
21
Meet With the Customer
22
Start Gathering Information at the Site
23
Application List
24
Applications List
MAS90 Enterprise accounting Existing Critical A new version that switches from client/
server to browser/server will be out in one
month
25
Business Constraints
26
Business Constraints
27
Business Constraints
29
Putting It Into Practice
31
Scalability
32
Scalability
34
Availability
Downtime Allowed Per Week in Minutes Based on a 24 Hour Day
99.7% at 30 minutes looks ok, what if all at one time
95% sounds good, but 504 minutes doesn’t
99.9 10 97 302
99.7 30 96 403
99.5 50 95 504
35
Performance
36
Performance
37
Capacity v Throughput
38
Capacity v Throughput
39
Capacity v Throughput
40
Capacity v Throughput
41
Capacity v Throughput
42
Performance
• Capacity
– This is the data carrying capacity of a circuit
• Usually measured in bits per second
• Throughput
– This is the quantity of error free data transmitted per
unit of time
– This is normally the packets per second
• Bandwidth Utilization
– The percent of total available capacity in use
43
Performance
• Offered Load
– This is the sum of all the data all network devices have
ready to send at a particular time
• Accuracy
– Exactly what goes out gets to the other end
– To check accuracy use a network analyzer to check the
CRC on received frames
– Track the number of frames received with a bad CRC
every hour for one or two days
– It is normal for errors to increase as network utilization
goes up
44
Performance
45
Performance
• Efficiency
– How much overhead is required to deliver an amount of
data
– How large a packet can be used
• Larger better
• Too large means too much data is lost if a packet is damaged
• How many packets can be sent in one bunch without an
acknowledgment
46
Performance
• Latency
– This is the delay in transmission
– or
– The time that passes from when a user expects
something to appear, to when it does appear
– Instantaneous response is the only goal
• Response
– Related to latency, but also a function of the application
and the equipment the application is running on
– Most users expect to see something on the screen in
100 to 200 milliseconds
47
Performance
49
Performance
51
Manageability
52
Ease of Use
53
Adaptability
54
Affordability
55
Network Applications Technical Requirements
56
Network Applications Technical Requirements
58
Location Location Location
59
Putting It Into Practice
60
Characterizing the Existing Network
61
Information to Collect
62
Information to Collect
63
Information to Collect
• Trend Analysis
– Collect the same basic information discussed in
baselining, but do this over time
– This allows you to anticipate problems, before they
become so
– It also allows you to justify buying new toys at the end of
the year when a budget surplus is discovered and must be
spent quickly
• The tools that do this vary as to capability and cost
• www.solarwinds.net has several good tools at a
reasonable price
64
Compare Data to Guidelines
65
Putting It Into Practice
66
Characterizing Network Traffic
67
Step 1 in Collecting Network Traffic
68
User Community List
69
Step 2 in Collecting Network Traffic
70
Data Stores List
71
Step 3 in Collecting Network Traffic
72
Traffic Flow List
Application Traffic Type Protocols User Data Store Bandwidth QoS
Used Community Needed
73
Step 4 in Collecting Network Traffic
74
Types of Traffic
75
Types of Traffic
– Browser/Server
• Similar to a terminal/server
• Uses a web browser instead of a dedicated program
• The server response will be quite large possibly
– Peer-to-Peer
• This flow is bi-directional and symmetric
• Unix-to-Unix workstations often use this
76
Types of Traffic
– Server-to-Server
• The flow depends on the relationship between the servers
• If mirrored, then one way and high level
• Other relationships may be more bi-directional
– Distributed Computing
• Several computers join together to solve a single problem
• Normally the exchange is quite high
• It is bi-directional and symmetrical
77
Type of Traffic List
78
Types of Traffic
79
Traffic Flow Estimates List
80
Measuring Traffic Flow
81
Measuring the Baseline and Trend
82
Measuring Traffic Flow
83
Measuring Traffic Flow
84
Measuring Traffic Flow
– Does the recipient tend to store the data in RAM and ACK
quickly or does it write to disk, a slow mechanical process,
and then ACK
– This may depend on the state of the receive window, the
amount of RAM available, and so forth
– What sort of negotiation happens before the data can be
sent
– Any transport or session layer establishment, such as a
TCP 3-way handshake
– How about at the upper layers
– Before file bytes are sent, are there negotiations and
packets related to file size, file name, file access rights
85
Measuring Traffic Flow
86
Measuring Traffic Flow
87
Measuring Traffic Flow
88
Traffic Flows Estimates Formula
89
Traffic Floes Estimate Formula
90
Traffic Flows Estimates Formula
• 8 x N x K x M / (K x P + T)
– N
• Number of active users at a location
• That is the number of users that will simultaneously use an application
– K
• Number of packets per transaction in any given direction
– M
• Number of bytes per packet in any one direction
– P
• One-way network latency
– T
• User think time
• How much time typically exists between inquiries
92
Traffic Flows Estimates Formula
94
Environmental Considerations
95
Environmental Considerations
96
PoE
98
Designing a Network Topology
99
Designing a Network Topology
100
Flat Network
101
Flat Network Design
102
Hierarchical Network
103
Hierarchical Network
Types
• In the Cisco world any network design is hierarchical
• This is so the network can be
– Organized
– Managed
– Scaled
– Upgraded
• There are three levels in the Cisco hierarchical design
– Access
– Distribution
– Core
104
Hierarchical Network Levels
• Access
– The access layer is where workstations connect to
hubs/switches
– VLANs may be used to create separate broadcast
domains at this level
– With a layered design, a failure in an access layer
device will only affect those devices directly attached
to it
– In multistory building for example, each floor would be
isolated this way
105
Hierarchical Network Levels
• Distribution
– At the distribution layer switches and routers connect
LAN segments to each other
– This level connects the Access level to the Core level
– This is also where routing and filtering take place
– The Distribution level decides, by using routing
protocols and filters, if and how traffic will be
forwarded
– These devices see a high volume of traffic
106
Hierarchical Network Levels
107
Hierarchical Network Levels
• Core
– At the Core level devices connect the distinct
distribution layer groups of devices to each other
– The important consideration here is speed
108
Hierarchical Network Levels
109
Hierarchical Network Design
111
Broadcast Domains
112
Broadcast Domain Limits
114
Hierarchical Network Design
115
Hierarchical Network Design
116
Hierarchical Network Design
117
Hierarchical Network Design
119
Distance Guidelines
10 Mbps
100 Mbps
100m 5m 100m
120
Distance Guidelines
121
LAN Device Characteristics
122
Decide on the Basic Layout
123
Point-to-Point
124
Point-to-Point
125
Hub and Spoke
126
Hub and Spoke
127
Partial Mesh
128
Partial Mesh
129
Full Mesh
130
Full Mesh
131
Network Type to Use
133
Putting It Into Practice
134
Models for Addressing and Naming
135
Putting It Into Practice
136
Switching and Routing Protocols
138
Switching and Routing Protocols
139
Switching and Routing Protocols
140
Switching and Routing Protocols
141
Switching and Routing Protocols
142
Switching and Routing Protocols
143
Putting It Into Practice
144
Network Security Strategies
145
Network Security Strategies
146
Network Management Strategies
148
Technologies and Devices for Networks
149
Technologies and Devices for Networks
150
Technologies and Devices for Networks
151
Technologies and Devices for Networks
• For a CAN
– For cabling use
• MMF if distance allows
• SMF otherwise
• Unless unusual circumstances occur and cable cannot be run,
then use a wireless method
– To future proof
• Run cable that contains both MMF and SMF
– The speed should be whatever is required based on
traffic expected
• In general 1 Gbps
• Maybe using multiple connections for load balancing
152
Technologies and Devices for Networks
153
Technologies and Devices for Networks
154
Technologies and Devices for Networks
155
Technologies and Devices for Networks
156
Technologies and Devices for Networks
157
Technologies and Devices for Networks
158
Technologies and Devices for Networks
159
What Does Everyone Else Use
160
Desktop Device
161
Desktop Operating System
162
LAN Cabling
163
LAN Speed
164
Devices in the LAN Room
165
Wiring Closet to Backbone Speed
166
Backbone
167
Routed Protocol Used
168
Network Access Method
169
WAN Network Access Line
170
Putting It Into Practice
171
Testing the Network Design
172
Testing the Network Design
173
Testing the Network Design
• Performance
– Test the application with transaction volume that is
within and at the top of the range expected from the
business requirements
– Make sure that the resulting system behavior is within
expectations or any formal service level agreements
• Stress
– Expose the system to transaction volume substantially
higher than what would normally be expected and over
a concentrated time period
174
Testing the Network Design
• Failure
– Regression tests look to see what no longer works when
the new stuff goes on line
• Security
– Ensure that people have the access level that is required
and no more and that unauthorized people cannot
access the system
• Requirements
– Track each business requirement through the
development process and make sure that it is included
in the final system
175
Testing the Network Design
• Usability
– Determine that people can use the system easily and
without frustration
• Documentation
– Check that hard-copy and online documentation are
understandable and accurate
176
Testing the Network Design
• Training
– Ensure that online or in-person training is effective and
meets the training requirements
• Interface
– Test your application interfaces with external databases
or third-party companies
177
Testing the Network Design
• Disaster Recovery
– See whether you can recover the system from a
simulated disaster
• Multiple Locations
– Verify your system can function between multiple
locations, if necessary
178
Putting It Into Practice
179
Optimizing the Network Design
180
Assessing the Design
181
Assessing the Design
182
Assessing the Design
183
Assessing the Design
184
Assessing the Design
185
Assessing the Design
186
Assessing the Design
187
Assessing the Design
188
Assessing the Design
189
Assessing the Design
190
Assessing the Design
191
Assessing the Design
192
Assessing the Design
• Total:
• Score yourself
– Every A counts for three points; every B counts for two
points; and every C counts for one point
• If your score equals
193
Assessing the Design
• 20 to 33 - Slow network
– You have to improve your network performance with
reengineering and process structuring
– An application-aware infrastructure assessment can
assist in this effort
– This approach reviews current application profiles,
traffic profiles and existing infrastructures to develop
an approach to remedy all performance problems
194
Assessing the Design
• 34 to 51 - Acceptable performance
– You should examine improved performance and
network failure tools such as synthetic transaction
monitors or high-volume transaction monitors that
provide insight into rare slow transactions
195
Assessing the Design
196
Assessing the Design
• 52 to 60 - Fast network
– Your network has great performance consistently
– You'll need to capacity plan and baseline new
applications such as VoIP and video to keep up this
performance
– Perhaps you should investigate data engineering
considerations such as using MPLS for convergence
197
Documenting the Network Design
198
Do It All Over Again
199
PDIOO
Step
Plan
Design
Implement
Operate
Optimize
Retire
200
Network Design Life Cycle
201
Network Design Life Cycle
202
What You Should Be Able To Do
203
For More Information
204
Review
205
Review
207
Review
208
Slides That Contain Test Material
209