Top-Down Network Design Chapter Thirteen Optimizing Your Network Design
Network design
-
Upload
amir-jafari -
Category
Engineering
-
view
394 -
download
4
Transcript of Network design
![Page 1: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/1.jpg)
©2014 Amir Jafari – www.amir-Jafari.com
Network Design
![Page 2: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/2.jpg)
Agenda
©2014 Amir Jafari – www.amir-Jafari.com
Introduction
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
![Page 3: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/3.jpg)
Introduction
©2014 Amir Jafari – www.amir-Jafari.com
Why do we need modern network design?
Rise of new technologies
Traditional network boundaries have been removed
Complexities of networks
Reduce the time to develop and market products
What affect Network Design?
Business drivers
Return on investment, Regulation, Competitiveness
Technology drivers
Removal of borders, Virtualization, Growth of applications
![Page 4: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/4.jpg)
Introduction
©2014 Amir Jafari – www.amir-Jafari.com
Objective
present a systematic design methodology that meet a customer’s
business and technical goals
Network Design Methodology
Step 1. Analyze Customer Requirements
Step 2. Characterize the Existing Network and Sites
Step 3. Design the Network Topology and Solutions
![Page 5: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/5.jpg)
Analyze the Customer
Requirements
©2014 Amir Jafari – www.amir-Jafari.com
Step 1. Identify network applications and services.
Step 2. Define the organizational goals.
Step 3. Define the possible organizational constraints.
Step 4. Define the technical goals.
Step 5. Define the possible technical constraints.
![Page 6: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/6.jpg)
Analyze the Customer
Requirements
©2014 Amir Jafari – www.amir-Jafari.com
![Page 7: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/7.jpg)
Characterize the Existing Network
and Sites
©2014 Amir Jafari – www.amir-Jafari.com
Step 1. Gather existing documentation and query the organization
Step 2. Perform a network audit
Step 3. Use traffic analysis Identifying Major Traffic Sources and Stores
Characterizing Types of Traffic Flow for New Network Applications
Characterizing Traffic Behavior
Characterizing Quality of Service Requirements
![Page 8: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/8.jpg)
Design the Network Topology and
Solutions
©2014 Amir Jafari – www.amir-Jafari.com
Top-Down Approach
![Page 9: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/9.jpg)
Design a Network Topology
©2014 Amir Jafari – www.amir-Jafari.com
Modular
Network
Design
![Page 10: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/10.jpg)
Design a Model for Network Layer
Addressing and Naming
©2014 Amir Jafari – www.amir-Jafari.com
Using a Structured Model for Network Layer Addressing
Using a Hierarchical Model for Assigning Addresses
Administering Addresses by a Central Authority
Using Dynamic Addressing for End Systems
Designing a Model for Naming
![Page 11: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/11.jpg)
Select the Switching and Routing
Protocols
©2014 Amir Jafari – www.amir-Jafari.com
Making Decisions
![Page 12: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/12.jpg)
Select the Switching and Routing
Protocols
©2014 Amir Jafari – www.amir-Jafari.com
Selecting Switching Protocols
VLANNIG, VLAN Trunking Protocols (ISL, Dot1q), inter-VLAN Routing,
VTP, STP, RSTP, PVST+, CEF
Selecting Routing Protocols
Characterizing Routing Protocols
Distance-vector, link-state, or hybrid, Interior or exterior, Classless or
classful, Fixed-length or variable-length subnet masks (VLSM), Flat or
hierarchical, IPv4 or IPv6
Routing Protocol Metrics and Loop Prevention
Scalability Constraints for Routing Protocols
![Page 13: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/13.jpg)
Select the Switching and Routing
Protocols
©2014 Amir Jafari – www.amir-Jafari.com
Routing
Protocol
Comparisons
![Page 14: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/14.jpg)
Network Security Design
©2014 Amir Jafari – www.amir-Jafari.com
Security Strategy
Identifying Network Assets
Analyzing Security Risks
Analyzing Security Requirements
Developing a Security Plan
Developing a Security Policy
Developing Security Procedures
Maintaining Security
Security MechanismsPhysical Security, Authentication, Authorization, Accounting (Auditing), Data
Encryption, Packet Filters, Firewalls, Intrusion Detection and Prevention Systems
Monitoring, Analysis, and Correlation
![Page 15: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/15.jpg)
Network Management Design
©2014 Amir Jafari – www.amir-Jafari.com
Network Management Functional Areas
Fault management
Configuration management
Accounting management
Performance management
Security management
Network Management Architectures
A managed device
An agent
A network management system (NMS)
Selecting Network Management Tools and Protocols
![Page 16: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/16.jpg)
Optimize the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
Quality Issues in Converged Networks
Bandwidth capacity
End-to-end delay (both fixed and variable):
Variation of delay (also called jitter)
Packet loss
QoS
The main categories of mechanism
Classification and marking
Congestion management
Congestion avoidance
Policing and shaping
Link efficiency
![Page 17: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/17.jpg)
Optimize the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
QoS Models
Best effort
IntServ
DiffServ
![Page 18: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/18.jpg)
Select Technologies and
Devices
©2014 Amir Jafari – www.amir-Jafari.com
Cabling Topologies and Types of Cable for Campus Networks
Campus- and building-cabling topologies
Cables between buildings
Location of telecommunications closets
Vertical cabling between floors
Horizontal cabling within floors
Criteria for Selecting Internetworking Devices
Number of ports, Processing speed, Amount of memory, Throughput in packets
per second, LAN and WAN technologies supported, Media (cabling) supported,
Support for redundant power supplies, Support for QoS features,…
![Page 19: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/19.jpg)
Select Technologies and
Devices
©2014 Amir Jafari – www.amir-Jafari.com
Selecting Technologies for Enterprise Networks
Remote-access technologies
Point-to-Point Protocol (PPP)
Cable modems
Digital subscriber line (DSL)
WAN technologies
Leased lines
Synchronous Digital Hierarchy (SDH)
Frame Relay
![Page 20: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/20.jpg)
Test the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
Pilot and Prototype Tests
Writing and Implementing a Test Plan for the Network Design
Tools for Testing a Network Design
![Page 21: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/21.jpg)
Document the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
Executive Summary
Project Goal
Project Scope
Design Requirements
Current State of the Network
Logical Design
Network Layer Addressing and Naming
Switching and Routing Protocols
Security Design
Management Design
Quality of service (QOS)
Technologies and Devices
![Page 22: Network design](https://reader034.fdocuments.in/reader034/viewer/2022042817/55a99edd1a28ab965b8b46f1/html5/thumbnails/22.jpg)
References
©2014 Amir Jafari – www.amir-Jafari.com
[1] John Tiso,“Designing Cisco Network Service Architectures (ARCH)”,
Cisco Press, USA, 2012
[2] Anthony Bruno,Steve Jordan,“CCDA 640-864 Official Cert Guide”,
Cisco Press, USA, 2011
[3] Priscilla Oppenheimer,“Top-Down Network Design”, Cisco Press,
USA, 2012
[4] “Cisco SAFE Reference Guide”, Cisco Systems, Inc., USA, 2010