Designing Network Topology Week 4. Network Topology Cisco has developed several models to help network designers conceptualize Some of the models we will.

Slides:



Advertisements
Similar presentations
Chapter 1: Introduction to Scaling Networks
Advertisements

Chapter 7: Intranet LAN Design
Hierarchical Design.
UTC-N Overview of Campus Networks Design.
Cisco Hierarchical Network Model RD-CSY /101.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
WAN Design Semester 4, Chapter 3 Chabot College Cisco Networking Academy.
WAN design ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department Kasetsart.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Scalable Network Design Ryan J. Determan, CCIE 5276 Scalable Network Design Ryan J. Determan, CCIE 5276 Copyright 2002 DDLS.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Ch.6 - Switches CCNA 3 version 3.0.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 CCNA 3 v3.1 Module 5. 2 CCNA 3 Module 5 Switches/LAN Design.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
CIS460 – NETWORK ANALYSIS AND DESIGN
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Chapter 1: Hierarchical Network Design
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Common Devices Used In Computer Networks
Network Admin Course Plan Accede Institute Of Science & Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Internetworking and ATM Lecture 8, April 30, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Hierarchical Network Design – a Review 1 RD-CSY3021.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 5 Switches.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Network design Topic 4 LAN design. Agenda Modular design Hierarchal model Campus network design Design considerations Switch features.
Hierarchical Topology Design. 2 Topology Design Topology is a map of an___________ that indicates network segments, interconnection points, and user communities.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Network Structure Models. 2 Chapter Topics  Hierarchical Network Models  Enterprise Composite Network Model  Network Availability.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Characteristics of Scaleable Internetworks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Instructor Materials Chapter 1: LAN Design
Semester 4, Chapter 3 Allan Johnson
Semester 4 - Chapter 3 – WAN Design
Planning and Troubleshooting Routing and Switching
Chapter 1: WAN Concepts Connecting Networks
IS3120 Network Communications Infrastructure
Module 5 - Switches CCNA 3 version 3.0.
인터넷 구조 2002년 2학기 장주욱.
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Designing Network Topology Week 4

Network Topology Cisco has developed several models to help network designers conceptualize Some of the models we will load at are : Hierarchical Enterprise Campus Three Part Firewall Redundancy in Design

Overview of the Hierarchical Model Hierarchical model lets you design the internetwork in layers (modular) Why? Simplifies tasks required for two systems to communicate (like the OSI model) Focuses functionality to unique layers Assigns bandwidth appropriately to each layer Network management issues such as training and staff costs are controlled Allows for distributed modular network management

Overview of the Hierarchical Model Benefits Cost savings Many organizations report that this model saves them money because they are not always doing all routing/switching on one platform Appropriate bandwidth per module means no wasted capacity

Overview of the Hierarchical Model Ease of Understanding Simpler and small design units facilitates understanding An easier system will reduce training and staff costs Different layers of the models can be assigned differing management responsibilities and management systems thus driving down management overheads

Overview of the Hierarchical Model Easy Network Growth Growth is facilitated through modules As a network grows specific modules can be replicated to handle the growth The cost and complexity of a making the growth is contained to only the new subset module Compare this to a fully meshed network or flat network were everyone is a peer dropping something in the middle necessitates a change for everything else.

Overview of the Hierarchical Model Improved fault Isolation By having limited isolation points between modules a network manager can target and isolate failure points faster and easier. Today’s fast converging protocols are designed for hierarchical topologies such as EIGRP

Hierarchical Network Design Layers Core High Speed Switching Distribution Layer Policy Based Connectivity Access Layer Local and Remote Workgroup Access

Core Layer Function The core layer is a high-speed switching backbone and should be designed to switch packets as fast as possible. This layer of the network should not perform any packet manipulation, such as access lists and filtering, that would slow down the switching of packets.

Core Layer Should Fast transport High reliability Redundancy Fault tolerance Quick adaptation Low latency and good manageability Avoidance of slow packet manipulation Limited And consistent diameter

Distribution Layer The distribution layer of the network is the demarcation point between the access and core layers and helps to define and differentiate the core. The purpose of this layer is to provide boundary definition and is the place at which packet manipulation can take place.

Distribution Layer Should Implement the following functions Policy and security Address and area aggregation Departmental or workgroup access Broadcast/multicast domain definition Routing between virtual LANs Media Translations Redistribution between routing domains Demarcation between static and dynamic routing protocols

Distribution Layer Using Cisco IOS software you can implement policy Filter source or destination addresses Filter input and output ports Hide internal network numbers by route filtering Static routing Quality of Service mechanisms (can every device on the path handle the information being distributed)

Access Layer The access layer is the point at which local end users are allowed into the network. This layer may also use access lists or filters to further optimize the needs of a particular set of users.

Access Layer Should Provide users on local segments access to the network Be characterized by switched or shared bandwidth LANs Some characteristics of the excess latter include: High-availability Port security ARP inspection Virtual access lists Trust classification

Switched Hierarchical Designs

Routed Hierarchical Designs

Enterprise Composite Model The enterprise composite model facilitates the design of larger and more scalable networks. The network is divided into functional components containing network modules The three major functional components are: Enterprise campus Enterprise edge Service provider edge

Enterprise Composite Model

Enterprise Campus Modules The modules are: Enterprise infrastructure Edge distribution Server farms Network management

Enterprise Edge Modules E-commerce networks Internet connections VPN and remote access Classic WAN

Hot Standby Router Protocol (HSRP)

Hot Standby Router Protocol (HRSP) Hot Standby Router Protocol. Provides high network availability and transparent network topology changes. HSRP creates a Hot Standby router group with a lead router that services all packets sent to the Hot Standby address. (phantom) The lead router is monitored by other routers in the group, and if it fails, one of these standby routers inherits the lead position and the Hot Standby group address.

Server Redundancy Complete server redundancy Servers on different networks and power sources Very expensive but stock traders require it Disk Mirroring Synchronizing two disks Disk Duplexing Disk mirroring plus each disk has a different disk controller

Media Redundancy Mission critical requires redundant media (hardware) Media redundancy on the LAN Relies on redundant links between switches Uses spanning tree for loop avoidance Media redundancy on the WAN Relies on backup links

Media Redundancy WAN backup links Use different technologies for backups (ISDN) Use floating static routes by specifying higher administrative distance so it won’t be used unless primary route is goes down Beware, different carriers may actual use the same physical circuit

Media Redundancy

Route Redundancy Provides load balancing IP balances across six parallel links of equal cost Minimizes downtime from link failures Full mesh provides complete redundancy Partial mesh provides redundancy with lower cost and more scalability

Route Redundancy

Three Part Firewall System

Bastion Hosts Provide the following services Anonymous FTP server Web server Domain Name server Specialized security software Telnet ??? In the book, on the CCDA test, but don’t do it

Three- Part Firewall System Rules The inside packet filter router should allow inbound TCP packets from established sessions The outside packet filter router should allow inbound TCP packets from established TCP sessions The outside packet filter router should also allow packets to specific TCP or UDP ports going to specific bastion hosts.

Rules (cont’d) Do not enable any unnecessary services on the outside filter router Turn off Telnet access (no virtual terminals) Use static routing only Do not make it a TFTP server Use password encryption Turn off proxy ARP and finger service Turn off IP redirects and route caching Do not make it a MacIP server

PIX Firewalls The Cisco Secure PIX Firewall series delivers strong security in an easy-to-install, integrated hardware/software appliance that offers outstanding performance. The series allows you to rigorously protect your internal network from the outside world— providing full firewall security protection. Unlike typical CPU-intensive full-time proxy servers that perform extensive processing on each data packet at the application level, Cisco Secure PIX Firewalls use a non-UNIX, secure, real-time, embedded system.

Cisco Secure PIX Firewall Series Less complex and more robust than packet filters No downtime for installation No upgrading hosts or routers required No day to day management requirement Generally better performance than delivered by other appliance-like firewalls or those based on general-purpose operating systems (Unix NT Netware)