IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS...

38
IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002

Transcript of IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS...

Page 1: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

IACT 424/924The Design Process: Choosing Typologies and Architectures

William Tibben

SITACS

University of Wollongong

23 September 2002

Page 2: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Overview

• Lecture first looks at why architectures are important in the design process. Essentially deals with the network from a logical aspects (Protocols, name and addressing, etc)

• Then the lecture looks to why topologies are important in the design process. Essentially deals with the physical aspects of – hardware provisioning and – dimensioning

• Bandwidth• Equal hops between network edges

Page 3: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

In summary,

• Architectures and topologies are an essential component of the design process.

• They provide:– a method by which we can judge whether the proposed

system will the meet the needs that have been identified– the network will be adequately provisioned in both

hardware and software– An effective means to communicate to others what the

network consists– A framework for ongoing network management and

fault rectification

Page 4: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Definitions-Architecture

Architecture: "A set of rules or outlines needed to perform functions according to user needs"

Communications Network Architecture: "A set of design principles on the basis of

which a communications network is designed and implemented to satisfy end-user needs over a period of time"

Page 5: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Definitions-Architecture cont’d

• A telecommunications network architecture is a set of design principles used as a basis for the designing and implementation of a network. It simply describes ‘what’ will be built - it does not say ‘how’.

• Architecture is a term applied to both the process and the outcome of thinking out and specifying the overall structure, logical components, and the logical interrelationships of a network

Page 6: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Architectures-A Tool for Design• A Network Architecture is an important element of the design process and documentation• For example how can one make sense of the following list?• HTTP, Frame Relay, Ethernet, PICT, TCP, IP, IPX, FTP (File Transfer Protocol), MPEG, SMTP (Simple Mail Transfer Protocol),

Appletalk, UDP (User Datagram Protocol), ICMP (Internet Control Monitoring Protocol), Telnet, TIFF, NFS (Network File Server, SQL (Structured Query language), DNS (Domain Name Server), JPEG

• Answer: By categorising these protocols and applications according to the OSI Model

Page 7: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Architectures-A tool for Design• The OSI Model is an example of an architecture that can

be used to map various protocols for better understanding.

TCP, UDP

IP, IPX, ICMP

NFS, SQL, X-Window System, Appletalk

PICT, TIFF, JPEG, MPEG, MIDI Quicktime

Telnet, FTP, HTTP, SMTP, DNS

Ethernet, Frame Relay, X.25

Page 8: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Architectures-Network Management

• Implementing a network management system is made possible by the use of an architecture

• The architecture allows you monitor and manage a complex network in a reliable and consistent fashion

Page 9: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Network Management

• A network management system allows viewing of the entire network as a unified architecture:– With addresses and labels assigned to each network

element

– With specific attributes of each network element and its connectivity known to the system

• The active elements of the network provide regular feedback of status information to the network control centre

Page 10: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Source: Terplan, 1992, p. 77

Generic Architecture for Network ManagementSystem

Page 11: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Decentralised architectures

• There is a trend from centralised management systems (as indicated by Terplan, previous slide) to ones that give end-users greater control

• This gives departmental (local) level managers the tools they need to maintain responsive networks, systems and applications for their local end users

• This is done through SNMP (Simple Network Management Protocol)

Page 12: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

SNMP Architecture

(Terplan, 1992, p. 90)

Page 13: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

SNMP

• Agent: local software program that stores management related data and responds to a manager’s request for data

• A manager is a software program that has the ability to query agents by using various SNMP commands

• Management Information Base (MIB): is a virtual database of managed objects, accessible to an agent and manipulated via SNMP to achieve network management

Page 14: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Definition - Topology

• The physical arrangement of network nodes and media within a network structure .

Page 15: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Examples of Topologies

• Ring

• Bus

• Star

• Tree, hierarchical, pyramid (controversial)

Page 16: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Extended Star Topology

Page 17: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Topologies as a Design Aid

• Topologies are used in the design phase to enable:– The provision of hardware and network

bandwidth to all corporate functions – The modularisation of the network into “bite-

size” pieces.

Page 18: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Hardware and Bandwidth Provisioning

Head Office

BranchOffices

Accounts

FinanceSales

NetworkSupport

Marketing

1 Gbpslinks

100Mbpslink

Branch Office

Page 19: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Modularisation of the Network

The network can be layered in the following way

CoreHigh Speed Switching

Distribution

Policy-based ConnectivityAccess

Local and Remote Workgroup Access

Page 20: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Modularisation of the Network

Advantages• Allows “measured” bandwidth allocation within each

layer• Separate network elements can be associated with

specific facilities thereby promoting ease of understanding(ie lower training costs).

• Improved fault isolation. (Too many interconnections create complexity where a change to one part of the network can have effects in other parts)

Page 21: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Modularisation of the Network

AdvantagesNaming and addressing schemes assume a

hierarchye.g UoW IP address is 130.130.0.0SITACS Staff IP group no. is 130.130.64.0My PC’s IP address is 130.130.64.152

Page 22: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Core Layer - Backbone

• Generally talking about WAN• High Speed• High Reliability• Redundancy• Low latency

– Time between service request and the service being granted

– Delay between the receipt of a frame and the time it is forwarded on

• Minimal packet manipulation (filtering)

Page 23: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Core Layer - BackboneWAN

Dedicated Switched

Circuit switched

Packet/cell switched

Dial-up modem(ISDNADSL)

(X.25Frame Relay

ATM)

Lease lines:T1/E1T3/E3

(Point to Point Protocol)

Page 24: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Diameter

The number of router hops between router edges is described in terms of diameter

1. The number of router hops from end-station to end-station across the backbone should be equal

2. The distance from any end station to a server should be consistent

Page 25: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Distribution Layer – Policy Based Connectivity

• Interface between LANs and WAN

• Interface between LANs,VLANs

• Information Access Policy is enabled– Who is allowed access to what

• Demarcation between static and dynamic routing

Page 26: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Distribution Layer – Policy Based Connectivity

• Security is deployed– Who is allowed access to what– Protection from non-authorised external traffic

• Router can filter traffic on the basis of source and destination address

• Filtering in specific input and out ports of router

• Hiding internal network numbers

• Static routing

Page 27: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Firewall

(Teare, 1999, p. 103)

Page 28: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Access Layer

• User access to LANs

• Switched and shared bandwidth networks (eg Ethernet)

• Microsegmentation of LANS occurs at Access layer to limit collision domains and enable high bandwidth provision to specific groups

Page 29: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Redundancy

• Redundancy should be designed into your network if your business relies on critical systems or provides critical services.

• Router redundancy– Hot Standby Router Protocol (HSRP) is a CISCO

protocol that enables IP workstations to keep using the internetwork should its default router fail. Essentially is a system where 2 or more routers communicate with each other using HSRP. Should one fail the other router takes over it load

Page 30: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Server Redundancy

• Server Redundancy – Mirrored file servers should be used for critical

systems such as brokerage firms– Servers should be on separate networks and

power supplies

Page 31: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Route Redundancy

• Route Redundancy can be achieved by using a full mesh or partial mesh architecture

• Full mesh is where every router is connected to each other– The number of links required make it an

expensive solution– There is considerable overhead because of the

number of routing table updates that must occur

Page 32: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Route Redundancy

• Partial mesh is a more practical solution

1.5Mbps

64kbps

Headquarters

Regions

Branches

Page 33: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Media Redundancy

• Redundant links are most relevant to WANs• Can be a different technology – Leased line

backed up by ISDN or dial up modem• Investigate that your back up lines are not

susceptible to the same failures that your primary path is.

Page 34: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Some Important Questions

• Does your company have a central office with many branches?– If yes, you need to be looking at hierarchical

topologies with an emphasis on WAN technologies

– You should be looking at route redundancy to ensure an alternative path should a WAN link fail.

Page 35: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Some Important Questions

• Is it a small company that uses high bandwidth applications (multimedia applications as opposed to finance data)?– If yes, you need to have high bandwidth LANs.

If this data needs to be transferred to other places you are also looking at installing high speed WAN links)

– Once again, hierarchical topologies are a must to ensure bottlenecks do not emerge in use.

Page 36: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Some Important Questions

• Does your company rely on real time access to critical data (eg Web CT or stock market information)?

• If yes, you should be looking at installing redundancy within your topology

Page 37: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

Some Important Questions

• Does you company require on online presence that represents an attractive site for hackers?

• You need to consider installing security such as a firewall.

Page 38: IACT 424/924 The Design Process: Choosing Typologies and Architectures William Tibben SITACS University of Wollongong 23 September 2002.

References

• Awyzio, G. IACT 302-1999 and IACT 424-2002 Lecture Notes, University of Wollongong

• Cisco, 2001, Cisco Academy Networking Program: Second Year Companion Guide, Cisco Press Indianapolis.

• Teare, D. 1999, Designing Cisco Networks, Cisco Press Indianapolis.

• Terplan, C. 1992, Communications Network Management, 2nd ed. Prentice Hall Communication Series, Englewood Cliffs, New Jersey, USA.

• TechTarget Enterprises, 2002, Architecture-A Whatis definition, Available from: http://www.whatis.techtarget.com. Accessed 3 September 2002.