SlideShare a Scribd company logo
1 of 50
© 2003, Cisco Systems, Inc. All rights reserved. 2-1
Campus Network Design
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-2
Design Principles
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-3
Design Principles
• Plan phase The detailed network requirements are identified, and the
existing network is reviewed.
• Design phase The network is designed according to the initial
requirements and additional data gathered during analysis of the
existing network. The design is refined with the client.
• Implement phase The network is built according to the approved
design.
• Operate phase The network is operational and is being monitored.
This phase is the ultimate test of the design.
• Optimize phase During this phase, issues are detected and corrected,
either before problems arise or, if no problems are found, after a
failure has occurred. Redesign might be required if too many problems
exist.
• Retirement phase Although not part of the PDIOO acronym, this phase
is necessary when part of the network is outdated or is no longer
required.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-4
Task in Network Design
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-5
Determine Requirement
• Applications that are to run on the network
• Internet connections required
• Addressing restrictions, for example, the use of private Internet Protocol (IP)
version 4 (IPv4) addresses
• Support for IP version 6 (IPv6) addresses
• Other protocols that are to run on the network (for example, routing protocols)
• Cabling requirements
• Redundancy requirements
• Use of proprietary equipment and protocols
• Existing equipment that must be supported
• Network services required, including quality of service (QoS) and wireless
• How security is to be integrated into the network
• Network solutions required (for example, voice traffic, content networking, and
storage networking)
• Support for existing applications while new ones are being phased in · Bandwidth
availability
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-6
Determine Requirement
• Budget Capital (for new equipment) and operating (for ongoing
expenses).
• Schedule This could include the phasing out of older applications, hiring
of new personnel, and so forth.
• People Considerations include who will install and operate the network,
what skills they have, whether they require training, whether any of
these tasks will be outsourced, and so forth.
• Legal Issues include any restrictions on the use and storage of data
collected, whether the organization has contractual obligations or
opportunities related to the network (for example, long-term
maintenance or lease contracts), and so forth.
• History Factors include examining the existing network's structure and
determining whether any person or group will block changes or
additions.
• Policies Consider whether current organizational policies might restrict
the network design.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-7
Analyzing the Existing Network
• If this is a redesign of an existing network, the current network
must be analyzed and understood.
• An existing network is likely to restrict the network design
• Should analyze the network to determine both what is good and
what should be changed.
• Examining documentation about the existing network and
discussing it with users, administration staff, and other
stakeholders is important
• Do an audit of the network. The audit can identify items such as
the protocols that are running
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-8
Preparing the Preliminary Design
• Preliminary design involves considering all the network
requirements and constraints (including the budget), and
determining viable alternative solutions.
• The network owner is then consulted, and together an optimal
solution is chosen; this solution is later developed into the final
design.
• Two models that can be used for network design are examined
– A top-down approach to network design means that requirements are
considered first, with the applications and network solutions that will run on
the network driving the design.
– A bottom-up approach would first select devices, features, cabling, and so on,
and then try to fit the applications onto this network. A bottom-up approach
can lead to redesign if the applications are not accommodated properly. This
approach can also result in increased costs by including features or devices
that are not required and would have been excluded had the network
requirements analysis been completed.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-9
Completing the Final Design Development
• producing detailed drawings, configuration specifications,
costing, addressing plans, and any other information required for
implementation.
• Physical
– Network diagram
– Network redundancy
– Physical connectivity to existing network
– Post-design hardware inventory documenting device location, type,
number of ports and type of ports
• Logical
– Addressing scheme(s)
– Supported Protocol(s)
– Routing protocol(s)
– Bridging group(s)
– Virtual Local Area Network (VLAN) architecture
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-10
Completing the Final Design Development
• Design Guide
– Security requirements
– Redundancy requirements and design
– Logical connectivity within the Local Area Network (LAN)
environment
– Implementation of any required equipment software advanced
features
– Connectivity to the gateway
– Configuration of each device
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-11
Deploying the Network
• The deployment plan must include details of what is to be done
and how it is to be done. For example, if new cabling is required,
the procedure to run the cable and the location where it is
needed must be fully documented.
• Scheduling is important, not only to identify when things will be
done but also to determine who will do them, and what impact the
deployment will have on the existing network.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-12
Monitoring and Redesigning
• After the network is operating, baseline operational statistics
should be gathered
• The network should then be monitored for anomalies and
problems. If problems that require redesign occur, or if
requirements change or are added, the appropriate design
changes must be made and the entire design process should be
repeated for that portion of the network.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-13
Maintaining Design Documentation
• The design should be documented throughout the
process. Documentation should include the following
items:
– All the agreed-to requirements and constraints
– The state of the existing network, if any
– Preliminary design options and a brief review of why the final design
was chosen
– Final design details
– Results of any pilot or prototype testing
– Deployment plans, schedules, and other implementation details
– Monitoring requirements
– Any other pertinent information
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-14
Modular Network Design
• Modules are analogous to building blocks of different shapes and
sizes; when creating a building, each block has different
functions
• Designing one of these blocks is a much easier task than
designing the entire building
• Each block might be used in multiple places, saving time and
effort in the overall design and building process
• The blocks have standard interfaces to each other so that they fit
together easily
• If the requirements for a block change, only that block needs to
change other blocks are not affected. Similarly, a specific block
can be removed or added without affecting other blocks.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-15
Modular Network Design
• Access layer Provides user and workgroup access to the resources of the network
· Distribution layer Implements the organization's policies, and provides connections
between workgroups and between the workgroups and the core
· Core layer Provides high-speed transport between distribution-layer devices and to
core resources
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-16
Access Layer
• Entry point to the network
• Shared bandwidth
• Layer 2 services
–Filtering
–VLAN membership
Access Layer
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-17
Distribution Layer
• Access aggregation point
• Workgroup services access
• Broadcast domains definition
• InterVLAN routing
• Media translation
• Security
Distribution Layer
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-18
The Core Layer
• Fast transport
• No Layer 3 processing
Core Layer
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-19
Enterprise Campus Infrastructure
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-20
Role of Switches in the Server Farm
Module
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-21
Server Farm Infrastructure
Architecture
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-22
Server Farm Distribution Layer
• Deploy high to mid-range switches.
• Make switching and links entirely redundant.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-23
Server Farm Access Layer
• Deploy midrange switches.
• Dual home all servers.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-24
Role of Switches in the Enterprise
Edge Module
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-25
A Collapsed Core
Switch Block 2
Access Layer
Distribution/Core Layer
Switch Block 1
Access Layer
Distribution/Core Layer
Core Connectivity
Core Connectivity
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-26
Switch Block 2
Access Layer
Distribution/Core Layer
Switch Block 1
Access Layer
Distribution/Core Layer
Core Connectivity
Core Connectivity
A Collapsed Core (Cont.)
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-27
The Dual Core
Switch Block 2
Switch Block 1
Core Block
Subnet A Subnet B
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-28
The Dual Core (cont.)
Switch Block 2
Switch Block 1
Core Block
Subnet A Subnet B
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-29
Campus Network Example
M1
M2
M P1
P2
P
X Y
A B C
North Building South Building
D
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-30
Campus Network Example (cont.)
M1
M2
M P1
P2
P
X Y
A B C
North Building South Building
D
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-31
Campus Network Example (cont.)
M1
M2
M P1
P2
P
X Y
A B C
North Building South Building
D
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-32
Campus Network Example (cont.)
M1
M2
M P1
P2
P
X Y
A B C
North Building South Building
D
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-33
Small Campus Network
• Collapse the Campus Backbone and Building Distribution
submodules in the Campus Backbone submodule.
• Scale up to several Building Access switches.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-34
Example Small Enterprise
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-35
Medium Campus Backbone
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-36
Example Medium Enterprise
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-37
Large Campus Design
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-38
Large-Scale Layer 3
Switched Campus Backbone
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-39
Example Large Enterprise
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-40
Network Security Design
• Reconnaissance Attacks consist of intelligence gathering, often using
tools like network scanners or packet analyzers. The information
collected can then be used to compromise networks.
• Ping sweeping To discover network addresses of live hosts
• Network and port scanning To discover active ports on target hosts
• Stack fingerprinting To determine the target operating system (OS) and the
applications running on targeted hosts
• Enumeration To infer network topology
• Access Attacks : the hacker exploits the vulnerabilities he has
discovered during the reconnaissance attack.
• Entry Unlawful entry to an e-mail account or database.
• Collect The hacker gathers information or passwords.
• Plant The hacker might create a back door so that he can return at a later
time.
• Occupy The hacker might elect to control as many hosts as he wants.
• Cover The hacker might cover his tracks by attempting to change the system
logs.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-41
Network Security Design
• Information Disclosure Attacks are different from an access
attack in the sense that the information is provided voluntarily
through a sophisticated subterfuge.
• Social engineering
• Phishing
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-42
Network Security Design
• Denial of Service Attacks a hacker attempts to render a network
or an Internet resource, such as a web server, worthless to users.
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-43
Network Security Design
• Mitigating Technologies
• Threat defense
• Virus protection
• Traffic filtering
• Intrusion detection and prevention
• Content filtering
• Secure communication
• Encrypted Virtual Private Network (VPN)
• Secure Socket Layer (SSL)
• File encryption
• Trust and identity
• Authentication, authorization, and accounting (AAA)
• Network Admission Control (NAC)
• Public key infrastructure (PKI)
• Network security best practices
• Network management
• Assessment and audits
• Policies
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-44
Network Security Design
• Virus protection
• Hosts Workstations and servers.
• E-mail servers Incoming messages are scanned prior to being
passed to the recipient.
• Network An intrusion detection system (IDS) or intrusion
prevention system (IPS)
• Traffic Filtering (Firewall)
• Intrusion Detection and Prevention
• Intrusion Detection Systems
• Network-based IDS (NIDS) A dedicated appliance installed on
the network
• Host-based IDS (HIDS) Integrated software on a mission-
critical system, such as a web server
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-45
Network Security Design
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-46
Network Security Design
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-47
Content Networking Design
WCCP = Web Cache Communication Protocol
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-48
Content Networking Design
Nontransparent Caching
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-49
Content Networking Design
© 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-50

More Related Content

Similar to 13257474.ppt-it-networking-gdfgdfgdfgdbd

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
Tuan Phan
 
CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4
Irsandi Hasan
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
Gene Smith 2016 ResumeRev2
Gene Smith 2016 ResumeRev2Gene Smith 2016 ResumeRev2
Gene Smith 2016 ResumeRev2
Gene Smith
 

Similar to 13257474.ppt-it-networking-gdfgdfgdfgdbd (20)

BRKDCN-2670 Day2 operations for Datacenter VxLAN EVPN fabrics.pdf
BRKDCN-2670 Day2 operations for Datacenter VxLAN EVPN fabrics.pdfBRKDCN-2670 Day2 operations for Datacenter VxLAN EVPN fabrics.pdf
BRKDCN-2670 Day2 operations for Datacenter VxLAN EVPN fabrics.pdf
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
CISCO DCNM.pdf
CISCO DCNM.pdfCISCO DCNM.pdf
CISCO DCNM.pdf
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
 
CCNP Switching Chapter 2
CCNP Switching Chapter 2CCNP Switching Chapter 2
CCNP Switching Chapter 2
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
Necos keynote UFRN Telecomday
Necos keynote UFRN TelecomdayNecos keynote UFRN Telecomday
Necos keynote UFRN Telecomday
 
Vaibhav (2)
Vaibhav (2)Vaibhav (2)
Vaibhav (2)
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4CCNA Discovery 4 - Chapter 4
CCNA Discovery 4 - Chapter 4
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
SMB_University_120307_Networking_Fundamentals.pdf
SMB_University_120307_Networking_Fundamentals.pdfSMB_University_120307_Networking_Fundamentals.pdf
SMB_University_120307_Networking_Fundamentals.pdf
 
SMB_University_120307_Networking_Fundamentals.pdf
SMB_University_120307_Networking_Fundamentals.pdfSMB_University_120307_Networking_Fundamentals.pdf
SMB_University_120307_Networking_Fundamentals.pdf
 
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...OpenStack Infrastructure at any Scale - Simple is BEST!? -  - OpenStack最新情報セミ...
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
Gene Smith 2016 ResumeRev2
Gene Smith 2016 ResumeRev2Gene Smith 2016 ResumeRev2
Gene Smith 2016 ResumeRev2
 

Recently uploaded

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

13257474.ppt-it-networking-gdfgdfgdfgdbd

  • 1. © 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design
  • 2. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-2 Design Principles
  • 3. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-3 Design Principles • Plan phase The detailed network requirements are identified, and the existing network is reviewed. • Design phase The network is designed according to the initial requirements and additional data gathered during analysis of the existing network. The design is refined with the client. • Implement phase The network is built according to the approved design. • Operate phase The network is operational and is being monitored. This phase is the ultimate test of the design. • Optimize phase During this phase, issues are detected and corrected, either before problems arise or, if no problems are found, after a failure has occurred. Redesign might be required if too many problems exist. • Retirement phase Although not part of the PDIOO acronym, this phase is necessary when part of the network is outdated or is no longer required.
  • 4. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-4 Task in Network Design
  • 5. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-5 Determine Requirement • Applications that are to run on the network • Internet connections required • Addressing restrictions, for example, the use of private Internet Protocol (IP) version 4 (IPv4) addresses • Support for IP version 6 (IPv6) addresses • Other protocols that are to run on the network (for example, routing protocols) • Cabling requirements • Redundancy requirements • Use of proprietary equipment and protocols • Existing equipment that must be supported • Network services required, including quality of service (QoS) and wireless • How security is to be integrated into the network • Network solutions required (for example, voice traffic, content networking, and storage networking) • Support for existing applications while new ones are being phased in · Bandwidth availability
  • 6. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-6 Determine Requirement • Budget Capital (for new equipment) and operating (for ongoing expenses). • Schedule This could include the phasing out of older applications, hiring of new personnel, and so forth. • People Considerations include who will install and operate the network, what skills they have, whether they require training, whether any of these tasks will be outsourced, and so forth. • Legal Issues include any restrictions on the use and storage of data collected, whether the organization has contractual obligations or opportunities related to the network (for example, long-term maintenance or lease contracts), and so forth. • History Factors include examining the existing network's structure and determining whether any person or group will block changes or additions. • Policies Consider whether current organizational policies might restrict the network design.
  • 7. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-7 Analyzing the Existing Network • If this is a redesign of an existing network, the current network must be analyzed and understood. • An existing network is likely to restrict the network design • Should analyze the network to determine both what is good and what should be changed. • Examining documentation about the existing network and discussing it with users, administration staff, and other stakeholders is important • Do an audit of the network. The audit can identify items such as the protocols that are running
  • 8. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-8 Preparing the Preliminary Design • Preliminary design involves considering all the network requirements and constraints (including the budget), and determining viable alternative solutions. • The network owner is then consulted, and together an optimal solution is chosen; this solution is later developed into the final design. • Two models that can be used for network design are examined – A top-down approach to network design means that requirements are considered first, with the applications and network solutions that will run on the network driving the design. – A bottom-up approach would first select devices, features, cabling, and so on, and then try to fit the applications onto this network. A bottom-up approach can lead to redesign if the applications are not accommodated properly. This approach can also result in increased costs by including features or devices that are not required and would have been excluded had the network requirements analysis been completed.
  • 9. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-9 Completing the Final Design Development • producing detailed drawings, configuration specifications, costing, addressing plans, and any other information required for implementation. • Physical – Network diagram – Network redundancy – Physical connectivity to existing network – Post-design hardware inventory documenting device location, type, number of ports and type of ports • Logical – Addressing scheme(s) – Supported Protocol(s) – Routing protocol(s) – Bridging group(s) – Virtual Local Area Network (VLAN) architecture
  • 10. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-10 Completing the Final Design Development • Design Guide – Security requirements – Redundancy requirements and design – Logical connectivity within the Local Area Network (LAN) environment – Implementation of any required equipment software advanced features – Connectivity to the gateway – Configuration of each device
  • 11. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-11 Deploying the Network • The deployment plan must include details of what is to be done and how it is to be done. For example, if new cabling is required, the procedure to run the cable and the location where it is needed must be fully documented. • Scheduling is important, not only to identify when things will be done but also to determine who will do them, and what impact the deployment will have on the existing network.
  • 12. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-12 Monitoring and Redesigning • After the network is operating, baseline operational statistics should be gathered • The network should then be monitored for anomalies and problems. If problems that require redesign occur, or if requirements change or are added, the appropriate design changes must be made and the entire design process should be repeated for that portion of the network.
  • 13. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-13 Maintaining Design Documentation • The design should be documented throughout the process. Documentation should include the following items: – All the agreed-to requirements and constraints – The state of the existing network, if any – Preliminary design options and a brief review of why the final design was chosen – Final design details – Results of any pilot or prototype testing – Deployment plans, schedules, and other implementation details – Monitoring requirements – Any other pertinent information
  • 14. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-14 Modular Network Design • Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions • Designing one of these blocks is a much easier task than designing the entire building • Each block might be used in multiple places, saving time and effort in the overall design and building process • The blocks have standard interfaces to each other so that they fit together easily • If the requirements for a block change, only that block needs to change other blocks are not affected. Similarly, a specific block can be removed or added without affecting other blocks.
  • 15. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-15 Modular Network Design • Access layer Provides user and workgroup access to the resources of the network · Distribution layer Implements the organization's policies, and provides connections between workgroups and between the workgroups and the core · Core layer Provides high-speed transport between distribution-layer devices and to core resources
  • 16. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-16 Access Layer • Entry point to the network • Shared bandwidth • Layer 2 services –Filtering –VLAN membership Access Layer
  • 17. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-17 Distribution Layer • Access aggregation point • Workgroup services access • Broadcast domains definition • InterVLAN routing • Media translation • Security Distribution Layer
  • 18. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-18 The Core Layer • Fast transport • No Layer 3 processing Core Layer
  • 19. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-19 Enterprise Campus Infrastructure
  • 20. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-20 Role of Switches in the Server Farm Module
  • 21. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-21 Server Farm Infrastructure Architecture
  • 22. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-22 Server Farm Distribution Layer • Deploy high to mid-range switches. • Make switching and links entirely redundant.
  • 23. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-23 Server Farm Access Layer • Deploy midrange switches. • Dual home all servers.
  • 24. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-24 Role of Switches in the Enterprise Edge Module
  • 25. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-25 A Collapsed Core Switch Block 2 Access Layer Distribution/Core Layer Switch Block 1 Access Layer Distribution/Core Layer Core Connectivity Core Connectivity
  • 26. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-26 Switch Block 2 Access Layer Distribution/Core Layer Switch Block 1 Access Layer Distribution/Core Layer Core Connectivity Core Connectivity A Collapsed Core (Cont.)
  • 27. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-27 The Dual Core Switch Block 2 Switch Block 1 Core Block Subnet A Subnet B
  • 28. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-28 The Dual Core (cont.) Switch Block 2 Switch Block 1 Core Block Subnet A Subnet B
  • 29. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-29 Campus Network Example M1 M2 M P1 P2 P X Y A B C North Building South Building D
  • 30. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-30 Campus Network Example (cont.) M1 M2 M P1 P2 P X Y A B C North Building South Building D
  • 31. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-31 Campus Network Example (cont.) M1 M2 M P1 P2 P X Y A B C North Building South Building D
  • 32. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-32 Campus Network Example (cont.) M1 M2 M P1 P2 P X Y A B C North Building South Building D
  • 33. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-33 Small Campus Network • Collapse the Campus Backbone and Building Distribution submodules in the Campus Backbone submodule. • Scale up to several Building Access switches.
  • 34. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-34 Example Small Enterprise
  • 35. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-35 Medium Campus Backbone
  • 36. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-36 Example Medium Enterprise
  • 37. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-37 Large Campus Design
  • 38. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-38 Large-Scale Layer 3 Switched Campus Backbone
  • 39. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-39 Example Large Enterprise
  • 40. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-40 Network Security Design • Reconnaissance Attacks consist of intelligence gathering, often using tools like network scanners or packet analyzers. The information collected can then be used to compromise networks. • Ping sweeping To discover network addresses of live hosts • Network and port scanning To discover active ports on target hosts • Stack fingerprinting To determine the target operating system (OS) and the applications running on targeted hosts • Enumeration To infer network topology • Access Attacks : the hacker exploits the vulnerabilities he has discovered during the reconnaissance attack. • Entry Unlawful entry to an e-mail account or database. • Collect The hacker gathers information or passwords. • Plant The hacker might create a back door so that he can return at a later time. • Occupy The hacker might elect to control as many hosts as he wants. • Cover The hacker might cover his tracks by attempting to change the system logs.
  • 41. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-41 Network Security Design • Information Disclosure Attacks are different from an access attack in the sense that the information is provided voluntarily through a sophisticated subterfuge. • Social engineering • Phishing
  • 42. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-42 Network Security Design • Denial of Service Attacks a hacker attempts to render a network or an Internet resource, such as a web server, worthless to users.
  • 43. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-43 Network Security Design • Mitigating Technologies • Threat defense • Virus protection • Traffic filtering • Intrusion detection and prevention • Content filtering • Secure communication • Encrypted Virtual Private Network (VPN) • Secure Socket Layer (SSL) • File encryption • Trust and identity • Authentication, authorization, and accounting (AAA) • Network Admission Control (NAC) • Public key infrastructure (PKI) • Network security best practices • Network management • Assessment and audits • Policies
  • 44. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-44 Network Security Design • Virus protection • Hosts Workstations and servers. • E-mail servers Incoming messages are scanned prior to being passed to the recipient. • Network An intrusion detection system (IDS) or intrusion prevention system (IPS) • Traffic Filtering (Firewall) • Intrusion Detection and Prevention • Intrusion Detection Systems • Network-based IDS (NIDS) A dedicated appliance installed on the network • Host-based IDS (HIDS) Integrated software on a mission- critical system, such as a web server
  • 45. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-45 Network Security Design
  • 46. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-46 Network Security Design
  • 47. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-47 Content Networking Design WCCP = Web Cache Communication Protocol
  • 48. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-48 Content Networking Design Nontransparent Caching
  • 49. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-49 Content Networking Design
  • 50. © 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0—2-50