SlideShare a Scribd company logo
Top-Down Network Design
Chapter Five
Designing a Network Topology
Copyright 2010 Cisco Press & Priscilla Oppenheimer
Topology 2
• A branch of mathematics concerned with those
properties of geometric configurations that are
unaltered by elastic deformations such as
stretching or twisting
• A term used in the computer networking field to
describe the structure of a network
Network Topology Design
Themes
 Hierarchy
 Redundancy
 Modularity
 Well-defined entries and exits
 Protected perimeters
3
Why Use a Hierarchical Model?
 Reduces workload on network devices
 Avoids devices having to communicate with too many other
devices (reduces “CPU adjacencies”)
 Constrains broadcast domains
 Enhances simplicity and understanding
 Facilitates changes
 Facilitates scaling to a larger size
4
Hierarchical Network Design 5
Enterprise WAN
Backbone
Campus A Campus B
Campus C
Building C-1 Building C-2
Campus C Backbone
Core Layer
Distribution
Layer
Access Layer
Cisco’s Hierarchical Design
Model
 A core layer of high-end routers and switches that are optimized for
availability and speed
 A distribution layer of routers and switches that implement policies
and segment traffic
 An access layer that connects users via hubs, switches, and other
devices
6
Flat Versus Hierarchy 7
Flat Loop Topology
Headquarters in
Medford
Grants Pass
Branch Office
Ashland
Branch
Office
Klamath Falls
Branch Office
Headquarters in
Medford
Ashland
Branch
Office
Klamath Falls
Branch Office
Grants Pass
Branch
Office
White City
Branch Office
Hierarchical Redundant Topology
Mesh
Designs
8
Partial-Mesh Topology
Full-Mesh Topology
A Partial-Mesh Hierarchical Design 9
Headquarters
(Core Layer)
Branch Offices (Access Layer)
Regional
Offices
(Distribution
Layer)
A Hub-and-Spoke Hierarchical
Topology 10
Corporate
Headquarters
Branch Office Branch OfficeHome Office
Avoid Chains and Backdoors 11
Core Layer
Distribution Layer
Access Layer
Chain
Backdoor
How Do You Know When You Have
a Good Design?
 When you already know how to add a new
building, floor, WAN link, remote site, e-
commerce service, and so on
 When new additions cause only local
change, to the directly-connected devices
 When your network can double or triple in
size without major design changes
 When troubleshooting is easy because there
are no complex protocol interactions to
wrap your brain around
12
Cisco’s SAFE Security Reference
Architecture
13
Campus Topology Design
 Use a hierarchical, modular approach
 Minimize the size of bandwidth domains
 Minimize the size of broadcast domains
 Provide redundancy
 Mirrored servers
 Multiple ways for workstations to reach a router for off-net
communications
14
A Simple Campus Redundant
Design
15
Host A
Host B
LAN X
LAN Y
Switch 1 Switch 2
Bridges and Switches use Spanning-
Tree Protocol (STP) to Avoid Loops
16
X
Host A
Host B
LAN X
LAN Y
Switch 1 Switch 2
Bridges (Switches) Running STP
 Participate with other bridges in the election of a single
bridge as the Root Bridge.
 Calculate the distance of the shortest path to the Root
Bridge and choose a port (known as the Root Port) that
provides the shortest path to the Root Bridge.
 For each LAN segment, elect a Designated Bridge and a
Designated Port on that bridge. The Designated Port is a
port on the LAN segment that is closest to the Root Bridge.
(All ports on the Root Bridge are Designated Ports.)
 Select bridge ports to be included in the spanning tree.
The ports selected are the Root Ports and Designated
Ports. These ports forward traffic. Other ports block traffic.
17
Elect a Root 18
Bridge B Bridge C
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root
Bridge A
Lowest Bridge ID
Wins!
Determine Root Ports 19
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root Port Root Port
Lowest Cost
Wins!
Determine Designated Ports
20
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root Port Root Port
Designated Port Designated Port
Designated Port
Lowest Bridge ID
Wins!
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root Port Root Port
Designated Port Designated Port
Designated Port Blocked Port
X
Prune Topology into a Tree!
21
React to Changes
22
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2LAN Segment 1
LAN Segment 3
Root Port Root Port
Designated Port Designated Port
Designated Port Becomes
Disabled
Blocked Port Transitions to
Forwarding State
Scaling the Spanning Tree Protocol
 Keep the switched network small
 It shouldn’t span more than seven switches
 Use BPDU skew detection on Cisco switches
 Use IEEE 802.1w
 Provides rapid reconfiguration of the spanning tree
 Also known as RSTP
23
Virtual LANs (VLANs)
 An emulation of a standard LAN that allows data transfer
to take place without the traditional physical restraints
placed on a network
 A set of devices that belong to an administrative group
 Designers use VLANs to constrain broadcast traffic
24
VLANs versus Real LANs 25
Switch A
Station A1 Station A2 Station A3
Network A
Switch B
Station B1 Station B2 Station B3
Network B
A Switch with VLANs 26
Station A1 Station A2 Station A3
VLAN A
Station B1 Station B2 Station B3
VLAN B
VLANs Span Switches 27
Switch A
Station B1 Station B2 Station B3
Switch B
Station B4 Station B5 Station B6
Station A1 Station A2 Station A3 Station A4 Station A5 Station A6
VLAN B
VLAN A
VLAN B
VLAN A
WLANs and VLANs
 A wireless LAN (WLAN) is often implemented as a VLAN
 Facilitates roaming
 Users remain in the same VLAN and IP subnet as they
roam, so there’s no need to change addressing
information
 Also makes it easier to set up filters (access control lists) to
protect the wired network from wireless users
28
Workstation-to-Router
Communication
 Proxy ARP (not a good idea)
 Listen for route advertisements (not a great idea either)
 ICMP router solicitations (not widely used)
 Default gateway provided by DHCP (better idea but no
redundancy)
 Use Hot Standby Router Protocol (HSRP) for redundancy
29
HSRP 30
Active Router
Standby Router
Virtual Router
Workstation
Enterprise Internetwork
Multihoming the Internet Connection 31
Enterprise
Enterprise
Enterprise
ISP 1
ISP 1 ISP 2
ISP 1
ISP 1 ISP 2
Enterprise
Option A
Option B
Option C
Option D
Paris NY
Paris NY
Security Topologies 32
Enterprise
Network
DMZ
Web, File, DNS, Mail Servers
Internet
Security Topologies 33
Internet
Enterprise Network
DMZ
Web, File, DNS, Mail Servers
Firewall
Summary
 Use a systematic, top-down approach
 Plan the logical design before the physical design
 Topology design should feature hierarchy, redundancy,
modularity, and security
34
Review Questions
 Why are hierarchy and modularity
important for network designs?
 What are the three layers of Cisco’s
hierarchical network design?
 What are the major components of Cisco’s
enterprise composite network model?
 What are the advantages and
disadvantages of the various options for
multihoming an Internet connection?
35

More Related Content

What's hot

Chapter11
Chapter11Chapter11
Chapter11
Muhammad Ahad
 
Chapter07
Chapter07Chapter07
Chapter07
Muhammad Ahad
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
Muhammad Ahad
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
Muhammad Ahad
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
Muhammad Ahad
 
Chapter10
Chapter10Chapter10
Chapter10
Muhammad Ahad
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
Muhammad Ahad
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
Sibghatullah585075
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
08. networking
08. networking08. networking
08. networking
Muhammad Ahad
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
Muhammad Ahad
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
lavanya marichamy
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
Pijush Kanti Das
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
Muhammad Ahad
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
Muhammad Ahad
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
Muhammad Ahad
 

What's hot (20)

Chapter11
Chapter11Chapter11
Chapter11
 
Chapter07
Chapter07Chapter07
Chapter07
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
Chapter10
Chapter10Chapter10
Chapter10
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
 
Chapter08
Chapter08Chapter08
Chapter08
 
08. networking
08. networking08. networking
08. networking
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 

Viewers also liked

06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
Muhammad Ahad
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
Muhammad Ahad
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
Muhammad Ahad
 
Chapter04
Chapter04Chapter04
Chapter04
Muhammad Ahad
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
Muhammad Ahad
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
Muhammad Ahad
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
Muhammad Ahad
 

Viewers also liked (8)

06. security concept
06. security concept06. security concept
06. security concept
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
Chapter04
Chapter04Chapter04
Chapter04
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 

Similar to Chapter05

CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
Reetesh Gupta
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
Sachin Morya
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
東原 李
 
NET7.PPT
NET7.PPTNET7.PPT
NET7.PPT
ssuser50c54b
 
Assembling And Cabling
Assembling And CablingAssembling And Cabling
Assembling And Cablingscooby_doo
 
high speed network notes for both cse and ece students
high speed network notes for both cse and ece studentshigh speed network notes for both cse and ece students
high speed network notes for both cse and ece students
vani643720
 
Networking basics
Networking basicsNetworking basics
Networking basics
Sridhar Baithi
 
Network adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesNetwork adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devices
Jafar Nesargi
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
VijayKaran7
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
Westermo Network Technologies
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overview
Anushka Hapuhinna
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
cisco49
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
scooby_doo
 
Saidul
SaidulSaidul
Saidul
saidulriaz
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
darulquthni
 

Similar to Chapter05 (20)

Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
NET7.PPT
NET7.PPTNET7.PPT
NET7.PPT
 
Assembling And Cabling
Assembling And CablingAssembling And Cabling
Assembling And Cabling
 
high speed network notes for both cse and ece students
high speed network notes for both cse and ece studentshigh speed network notes for both cse and ece students
high speed network notes for both cse and ece students
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Network adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesNetwork adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devices
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
 
Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overview
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Saidul
SaidulSaidul
Saidul
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Chapter05

  • 1. Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Topology 2 • A branch of mathematics concerned with those properties of geometric configurations that are unaltered by elastic deformations such as stretching or twisting • A term used in the computer networking field to describe the structure of a network
  • 3. Network Topology Design Themes  Hierarchy  Redundancy  Modularity  Well-defined entries and exits  Protected perimeters 3
  • 4. Why Use a Hierarchical Model?  Reduces workload on network devices  Avoids devices having to communicate with too many other devices (reduces “CPU adjacencies”)  Constrains broadcast domains  Enhances simplicity and understanding  Facilitates changes  Facilitates scaling to a larger size 4
  • 5. Hierarchical Network Design 5 Enterprise WAN Backbone Campus A Campus B Campus C Building C-1 Building C-2 Campus C Backbone Core Layer Distribution Layer Access Layer
  • 6. Cisco’s Hierarchical Design Model  A core layer of high-end routers and switches that are optimized for availability and speed  A distribution layer of routers and switches that implement policies and segment traffic  An access layer that connects users via hubs, switches, and other devices 6
  • 7. Flat Versus Hierarchy 7 Flat Loop Topology Headquarters in Medford Grants Pass Branch Office Ashland Branch Office Klamath Falls Branch Office Headquarters in Medford Ashland Branch Office Klamath Falls Branch Office Grants Pass Branch Office White City Branch Office Hierarchical Redundant Topology
  • 9. A Partial-Mesh Hierarchical Design 9 Headquarters (Core Layer) Branch Offices (Access Layer) Regional Offices (Distribution Layer)
  • 10. A Hub-and-Spoke Hierarchical Topology 10 Corporate Headquarters Branch Office Branch OfficeHome Office
  • 11. Avoid Chains and Backdoors 11 Core Layer Distribution Layer Access Layer Chain Backdoor
  • 12. How Do You Know When You Have a Good Design?  When you already know how to add a new building, floor, WAN link, remote site, e- commerce service, and so on  When new additions cause only local change, to the directly-connected devices  When your network can double or triple in size without major design changes  When troubleshooting is easy because there are no complex protocol interactions to wrap your brain around 12
  • 13. Cisco’s SAFE Security Reference Architecture 13
  • 14. Campus Topology Design  Use a hierarchical, modular approach  Minimize the size of bandwidth domains  Minimize the size of broadcast domains  Provide redundancy  Mirrored servers  Multiple ways for workstations to reach a router for off-net communications 14
  • 15. A Simple Campus Redundant Design 15 Host A Host B LAN X LAN Y Switch 1 Switch 2
  • 16. Bridges and Switches use Spanning- Tree Protocol (STP) to Avoid Loops 16 X Host A Host B LAN X LAN Y Switch 1 Switch 2
  • 17. Bridges (Switches) Running STP  Participate with other bridges in the election of a single bridge as the Root Bridge.  Calculate the distance of the shortest path to the Root Bridge and choose a port (known as the Root Port) that provides the shortest path to the Root Bridge.  For each LAN segment, elect a Designated Bridge and a Designated Port on that bridge. The Designated Port is a port on the LAN segment that is closest to the Root Bridge. (All ports on the Root Bridge are Designated Ports.)  Select bridge ports to be included in the spanning tree. The ports selected are the Root Ports and Designated Ports. These ports forward traffic. Other ports block traffic. 17
  • 18. Elect a Root 18 Bridge B Bridge C Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Bridge A Lowest Bridge ID Wins!
  • 19. Determine Root Ports 19 Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Port Root Port Lowest Cost Wins!
  • 20. Determine Designated Ports 20 Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Port Root Port Designated Port Designated Port Designated Port Lowest Bridge ID Wins!
  • 21. Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Port Root Port Designated Port Designated Port Designated Port Blocked Port X Prune Topology into a Tree! 21
  • 22. React to Changes 22 Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2LAN Segment 1 LAN Segment 3 Root Port Root Port Designated Port Designated Port Designated Port Becomes Disabled Blocked Port Transitions to Forwarding State
  • 23. Scaling the Spanning Tree Protocol  Keep the switched network small  It shouldn’t span more than seven switches  Use BPDU skew detection on Cisco switches  Use IEEE 802.1w  Provides rapid reconfiguration of the spanning tree  Also known as RSTP 23
  • 24. Virtual LANs (VLANs)  An emulation of a standard LAN that allows data transfer to take place without the traditional physical restraints placed on a network  A set of devices that belong to an administrative group  Designers use VLANs to constrain broadcast traffic 24
  • 25. VLANs versus Real LANs 25 Switch A Station A1 Station A2 Station A3 Network A Switch B Station B1 Station B2 Station B3 Network B
  • 26. A Switch with VLANs 26 Station A1 Station A2 Station A3 VLAN A Station B1 Station B2 Station B3 VLAN B
  • 27. VLANs Span Switches 27 Switch A Station B1 Station B2 Station B3 Switch B Station B4 Station B5 Station B6 Station A1 Station A2 Station A3 Station A4 Station A5 Station A6 VLAN B VLAN A VLAN B VLAN A
  • 28. WLANs and VLANs  A wireless LAN (WLAN) is often implemented as a VLAN  Facilitates roaming  Users remain in the same VLAN and IP subnet as they roam, so there’s no need to change addressing information  Also makes it easier to set up filters (access control lists) to protect the wired network from wireless users 28
  • 29. Workstation-to-Router Communication  Proxy ARP (not a good idea)  Listen for route advertisements (not a great idea either)  ICMP router solicitations (not widely used)  Default gateway provided by DHCP (better idea but no redundancy)  Use Hot Standby Router Protocol (HSRP) for redundancy 29
  • 30. HSRP 30 Active Router Standby Router Virtual Router Workstation Enterprise Internetwork
  • 31. Multihoming the Internet Connection 31 Enterprise Enterprise Enterprise ISP 1 ISP 1 ISP 2 ISP 1 ISP 1 ISP 2 Enterprise Option A Option B Option C Option D Paris NY Paris NY
  • 32. Security Topologies 32 Enterprise Network DMZ Web, File, DNS, Mail Servers Internet
  • 33. Security Topologies 33 Internet Enterprise Network DMZ Web, File, DNS, Mail Servers Firewall
  • 34. Summary  Use a systematic, top-down approach  Plan the logical design before the physical design  Topology design should feature hierarchy, redundancy, modularity, and security 34
  • 35. Review Questions  Why are hierarchy and modularity important for network designs?  What are the three layers of Cisco’s hierarchical network design?  What are the major components of Cisco’s enterprise composite network model?  What are the advantages and disadvantages of the various options for multihoming an Internet connection? 35

Editor's Notes

  1. Did you know that according to topologists, a coffee cup and donut are the same shape? If they were made of clay, for example, consider how easy it would be to mold the one to look like the other, while retaining the most significant characteristics (such as the roundedness and the hole). Just like with coffee and donuts made of clay, in the networking field, during the logical design phase, we are more concerned with the overall architecture, shape, size, and interconnectedness of a network, than with the physical details. For more information regarding topology, coffee, and donuts, see: http://en.wikipedia.org/wiki/Topology
  2. Said by Dr. Peter Welcher, consultant and author of many networking articles in magazines, etc.
  3. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  4. To understand VLANs, it helps to think about real (non-virtual) LANs first. Imagine two switches that are not connected to each other in any way. Switch A connects stations in Network A and Switch B connects stations in Network B, When Station A1 sends a broadcast, Station A2 and Station A3 receive the broadcast, but none of the stations in Network B receive the broadcast, because the two switches are not connected. This same configuration can be implemented through configuration options in a single switch, with the result looking like the next slide.
  5. Through the configuration of the switch there are now two virtual LANs implemented in a single switch, instead of two separate physical LANs. This is the beauty of VLANs. The broadcast, multicast, and unknown-destination traffic originating with any member of VLAN A is forwarded to all other members of VLAN A, and not to a member of VLAN B. VLAN A has the same properties as a physically separate LAN bounded by routers. The protocol behavior in this slide is exactly the same as the protocol behavior in the previous slide.
  6. VLANs can span multiple switches. In this slide, both switches contain stations that are members of VLAN A and VLAN B. This design introduces a new problem, the solution to which is specified in the IEEE 802.1Q standard and the Cisco proprietary Inter-Switch Link (ISL) protocol. The problem has to do with the forwarding of broadcast, multicast, or unknown-destination frames from a member of a VLAN on one switch to the members of the same VLAN on the other switch. In this slide, all frames going from Switch A to Switch B take the same interconnection path. The 802.1Q standard and Cisco's ISL protocol define a method for Switch B to recognize whether an incoming frame belongs to VLAN A or to VLAN B. As a frame leaves Switch A, a special header is added to the frame, called the VLAN tag. The VLAN tag contains a VLAN identifier (ID) that specifies to which VLAN the frame belongs. Because both switches have been configured to recognize VLAN A and VLAN B, they can exchange frames across the interconnection link, and the recipient switch can determine the VLAN into which those frames should be sent by examining the VLAN tag. The link between the two switches is sometimes called a trunk link or simply a trunk. Trunk links allow the network designer to stitch together VLANs that span multiple switches. A major design consideration is determining the scope of each VLAN and how many switches it should span. Most designers try to keep the scope small. Each VLAN is a broadcast domain. In general, a single broadcast domain should be limited to a few hundred workstations (or other devices, such as IP phones).