SlideShare a Scribd company logo
LESSON 6: Designing a network topology
Agenda
 Learning Activities
 Network Design Document, logical design, and top-down network design
methodology.
 Hierarchical Network Design, network topology consisting of many interrelated
components. This task might be easier to divide and conquer the problem and
develop it.
 Spanning Tree Protocol, fast convergence network routers.
 VLANs, small bandwidths to switches rather than broadcasting.
 Redundancy, provides availability, performance, and scalability.
 VPNs, use a third party communication media securing data.
Documenting Your Design
 If you are given a Request For Proposal (RFP), respond to the request
in the exact format that the RFP specifies
 If no RFP, you should still write a design document
 Describe your customer’s requirements and how your design meets those requirements
 Document the budget for the project
 Explain plans for implementing the design
Typical RFP Response Topics
 A network topology for the new design
 Information on the protocols, technologies, and products that form the
design
 An implementation plan
 A training plan
 Support and service information and plan
 Prices and payment options
 Qualifications of the responding vendor or supplier
 Recommendations from other customers
 Legal contractual terms and conditions
Contents of a Network Design Document
 Executive summary
 Project goal
 Project scope
 Design requirements
 Current state of the network
 New logical and physical design
 Results of network design testing
 Implementation plan
 Project budget
Design Requirements
 Business goals explain the role the network design will play in helping an
organization succeed
 Technical goals include scalability, performance, security, manageability, usability,
adaptability, and affordability
Logical and Physical Design
Logical design
 Topology
 Models for addressing and naming
 Switching and routing protocols
 Security strategies
 Network management strategies
Physical design
 Actual technologies and devices
Implementation Plan
Recommendations for deploying the network design
 Project schedule which includes dates and times for service provider
installations
 Any plans for outsourcing (offshore or in country)
 Training
 Risks
 A fallback plan if the implementation should fail
 A plan for evolving the design as new requirements arise
Possible Appendixes
Details found in appendixes
 Detailed topology maps
 Device configurations
 Addressing and naming details
 Network design testing results
 Contact information
 Pricing and payment options
 More information about the company that is presenting the design
 Annual reports, product catalogs, press releases
 Legal contractual terms and conditions
Topology
The origin of a topology
• A branch of mathematics concerned with those properties of
geometric configurations that are unaltered by elastic
deformations such as stretching or twisting
• A term used in the computer networking field to describe the
structure of a network
What is a Topology?
Definition of Topology
A topology is a map of an internetwork that indicates network segments,
interconnection points, and user communities. The purpose of the map is to show the
geometry of the network, not the physical geography or technical implementation.
Structured Engineering Principles
Regardless of network size or requirements, a critical factor for the successful
implementation of any network design is to follow good structured engineering
principles. These principles include;
 Hierarchy: A hierarchical network model is a useful high-level tool for
designing a reliable network infrastructure. It breaks the complex problem of
network design into smaller and more manageable areas.
 Modularity: By separating the various functions that exist on a network into
modules, the network is easier to design. Cisco has identified several
modules, including the enterprise campus, services block, data center, and
Internet edge.
Structured Engineering Principles (CONT)
 Resiliency: The network must remain available for use under both normal
and abnormal conditions. Normal conditions include normal or expected traffic
flows and traffic patterns, as well as scheduled events such as maintenance
windows. Abnormal conditions include hardware or software failures, extreme
traffic loads, unusual traffic patterns, denial-of-service (DoS) events, whether
intentional or unintentional, and other unplanned events.
Flexibility: The ability to modify portions of the network, add new services,
or increase capacity without going through a major forklift upgrade (i.e.,
replacing major hardware devices).
Hierarchical Network model
A typical enterprise hierarchical LAN campus network design includes the
following three layers:
 Access layer: Provides workgroup/user access to the network
 Distribution layer: Provides policy-based connectivity and controls the
boundary between the access and core layers
 Core layer: Provides fast transport between distribution switches within
the enterprise campus
July 19, 2022 15
The Access Layer
In a LAN environment, the access layer grants end devices access to the network. In the WAN
environment, it may provide teleworkers or remote sites access to the corporate network
across WAN connections. The access layer for a small business network generally incorporates
Layer 2 switches and access points providing connectivity between workstations and servers.
The access layer serves a number of functions, including;
 Layer 2 switching
 High availability
 Port security
 QoS classification and marking and trust boundaries
 Address Resolution Protocol (ARP) inspection
 Virtual access control lists (VACLs)
 Spanning tree
 Power over Ethernet (PoE) and auxiliary VLANs for VoIP
July 19, 2022 16
The Distribution Layer
This layer aggregates the data received from the access layer switches before it is transmitted to
the core layer for routing to its final destination. It is the boundary between the Layer 2 domains
and the Layer 3 routed network. The distribution layer device is the focal point in the wiring
closets. Either a router or a multilayer switch is used to segment workgroups and isolate network
problems in a campus environment. A distribution layer switch may provide upstream services for
many access layer switches. The distribution layer can provide;
 Aggregation of LAN or WAN links.
 Policy-based security in the form of access control lists (ACLs) and filtering.
 Routing services between LANs and VLANs and between routing domains (e.g., EIGRP to OSPF).
 Redundancy and load balancing.
 A boundary for route aggregation and summarization configured on interfaces
toward the core layer.
 Broadcast domain control, because routers or multilayer switches do not forward
broadcasts. The device acts as the demarcation point between broadcast domains.
17
The Core Layer
The core layer is also referred to as the network backbone. The core layer consists of high-speed
network devices. These are designed to switch packets as fast as possible and interconnect
multiple campus components, such as distribution modules, service modules, the data center, and
the WAN edge. The core should be highly available and redundant. The core aggregates the
traffic from all the distribution layer devices, so it must be capable of forwarding large
amounts of data quickly.
Considerations at the core layer include
 Providing high-speed switching (i.e., fast transport)
 Providing reliability and fault tolerance
 Scaling by using faster, and not more, equipment
 Avoiding CPU-intensive packet manipulation caused by security, inspection, quality of service
(QoS) classification, or other processes
NOTE:
- No policy implementation should take place in the core of the network.
- Every device in the core should have full reachability to every destination in the network.
July 19, 2022 18
Two-Tier Collapsed Core Design
 The three-tier hierarchical design maximizes performance, network availability, and
the ability to scale the network design.
 However, many small enterprise networks do not grow significantly larger over time.
Therefore, a two-tier hierarchical design where the core and distribution layers
are collapsed into one layer is often more practical. A “collapsed core” is when the
distribution layer and core layer functions are implemented by a single device. The
primary motivation for the collapsed core design is reducing network cost, while
maintaining most of the benefits of the three-tier hierarchical model.
July 19, 2022 19
 A flat network topology is adequate for very small networks. With a flat
network design, there is no hierarchy.
 Each internetworking device has essentially the same job, and the network
is not divided into layers or modules.
 A flat network topology is easy to design and implement, and it is easy to
maintain, as long as the network stays small.
 When the network grows, however, a flat network is undesirable. The lack
of hierarchy makes troubleshooting difficult. Rather than being able to
concentrate troubleshooting efforts in just one area of the network, you
may need to inspect the entire network.
July 19, 2022 20
Flat Versus Hierarchical Topologies
Network Topology Design Themes
Why Use a Hierarchical Model?
1. Reduces workload on network devices
2. Avoids devices having to communicate with too many other
devices (reduces “CPU adjacencies”)
3. Constrains on broadcast domains
4. Enhances simplicity and understanding
5. Facilitates changes
6. Facilitates scaling to a larger size
What is Spanning Tree Protocol?
A second problem occurs with redundant topologies is a single
device will receive multiple copies of the same frame.
The third problem occurs within the switch itself. The MAC
address table can change rapidly and contain wrong information. What
happens when neither switch has learned about devices A and B’s
location? Device A sends data to device B. Each switch learns about
device A is on port 1, and each records this in its MAC address table. The
switches haven’t learned about device B yet. Both switches flood the
frame to discover device B on their port 2.
What is Spanning Tree Protocol?
As a result, the MAC address table is overwritten. The switches
previously had device A connected to port 1. Because the table changed
rapidly, it might be considered unstable.
What is Spanning Tree Protocol?
The design of STP is hierarchical. At the top of the network is the
root device, which could be a bridge or switch. The root device makes all
decisions regarding which link should be blocked or allow data to flow.
Most switches come with a default setting. Normally, this setting
is 38464.
How is the root device determined?
1. Manually
2. Hard coded
What is Spanning Tree Protocol?
Replicating links is good for improving
reliability and availability
Packets are intended to flow on one
link at a time. EtherChannel insures
that only one link is active at a time.
What is Spanning Tree Protocol?
Replicating links is good for improving reliability and availability.
Packets are intended to flow on one link at a time. EtherChannel
insures that only one link is active at a time in two or a bundle of
connections.
What is Spanning Tree Protocol?
What is EtherChannel?
EtherChannel is a port link aggregation technology or port-channel architecture used primarily
on Cisco switches. It allows grouping of several physical Ethernet links to create one logical Ethernet link
for the purpose of providing fault-tolerance and high-speed links between switches, routers and servers.
What is Spanning Tree Protocol?
When bridges or switches are connected together in a
redundant configuration, this appear to be harmless
and good. The problem occurs when the switches
broadcast to their neighbors to create their routing
tables. No broadcasting occurs on the links connecting
adjacent switches .
What is Spanning Tree Protocol?
When bridges or switches are connected together to form a redundant configuration,
this appears again to be harmless. The problem occurs when the switches broadcast to
their neighbors to create their routing tables. There is no broadcasting that occurs on
the links connecting adjacent switches, but there is on the remaining switch ports.
What is Spanning Tree Protocol?
The red arrows represent links going the other
switches in the network.
What is Spanning Tree Protocol?
The selection criteria for selecting a root device is based on the lowest
priority of the device. Usually, the root device priority is 38463, which
is one less than the manufactures default priority (38464).
What is Spanning Tree Protocol?
The root device makes all decisions about which
links will pass traffic. In most cases, the root
device will shut down the furthest link. Cost is a
factor of the link speed.
What is Spanning Tree Protocol?
The root device makes all decisions about which links will pass
traffic. In most cases, the root device will shut down the furthest link. A
consideration is made based on the speed of the link. cost
What is Spanning Tree Protocol?
When new switches are installed, they may all have the
same default priority (38464). The selection criteria for the
root device is likely to result is a “root war” of fight off. If
the root war fails to determine a root device, then the lowest
MAC address (could be the oldest) is selected.
What is Spanning Tree Protocol?
When new switches are installed, they may all have the same default priority
number, 38464. The selection criteria for who is going to be the root device, usually
results in a “root war” or fight off. If the root war fails to determine a root device, then
the lowest MAC address (usually the oldest) is selected.
What is Spanning Tree Protocol?
When a link or node fails, the network topology changes.
The root device has to adjust the existing links to make the
new configuration reliable and secure. In doing so, it takes
approximately 30 seconds before the first packet can be sent.
It takes time for these transitions to finalize.
Currently, the IEEE802.1W (RSTP) converges in
approximately 5 seconds.
Root
What is Spanning Tree Protocol?
When a link or node fails, the network topology changes.
The root device has to adjust the existing/remaining links to make
the new configuration reliable and secure. In doing so, it takes
approximately 30 seconds before the first packet is sent again.
It takes time for these transitions to finalize.
What is Spanning Tree Protocol?
STP is the root part of Ethernet.
Latest STP standard is IEEE 802.1S
Bridges (Switches) Running STP
 Participate with other bridges in the election of a single bridge as the Root
Bridge.
 Calculate the distance of the shortest path to the Root Bridge and choose a
port (known as the Root Port) that provides the shortest path to the Root
Bridge.
 For each LAN segment, elect a Designated Bridge and a Designated Port
on that bridge. The Designated Port is a port on the LAN segment that is
closest to the Root Bridge. (All ports on the Root Bridge are Designated
Ports.)
 Select bridge ports to be included in the spanning tree. The ports selected
are the Root Ports and Designated Ports. These ports forward traffic. Other
ports block traffic.
Elect a Root
Bridge B Bridge C
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root
Bridge A
Lowest Bridge ID
Wins!
React to Changes
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
LAN Segment 1
LAN Segment 3
Root Port Root Port
Designated Port Designated Port
Designated Port Becomes
Disabled
Blocked Port Transitions to
Forwarding State
Determine Root Ports
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root Port Root Port
Lowest Cost
Wins!
Determine Designated Ports
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root Port Root Port
Designated Port Designated Port
Designated Port Lowest Bridge ID
Wins!
Bridge B Bridge C
Root
Bridge A
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Bridge B ID =
80.00.00.00.0C.BB.BB.BB
Bridge C ID =
80.00.00.00.0C.CC.CC.CC
Port 1
Port 2
Port 1
Port 2
Port 1 Port 2
LAN Segment 2
100-Mbps Ethernet
Cost = 19
LAN Segment 1
100-Mbps Ethernet
Cost = 19
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Root Port Root Port
Designated Port Designated Port
Designated Port Blocked Port
X
Prune Topology into a Tree!
Scaling the Spanning Tree Protocol
 Keep the switched network small
 It shouldn’t span more than seven switches
 Use Bridge Protocol Data Units (BPDU) skew detection on
Cisco switches
 Use IEEE 802.1w
 Provides rapid reconfiguration of the spanning tree. Also known as
RSTP
Rapid Spanning Tree Protocol
 Bridge port states
- Discarding is a port that is neither learning MAC addresses nor
forwarding user’s frames.
- Learning is a port that is learning MAC addresses to populate the
MAC address table, but has not yet forwarded user frames
- Forwarding is a port that is learning MAC addresses and
forwarding user frames.
Rapid Spanning Tree Protocol
 Converged switched network Bridge port roles
- Root port assigned on a non-root bridge, provides lowest cost path to the
root bridge.
- Designated assigned on a port attached to a LAN, provides lowest cost
path to the root bridge.
- Alternate assigned to a port that offers an alternative path in the
direction of the root bridge to that provided by the bridge’s root port.
Considered a discarded port
Rapid Spanning Tree Protocol
- Backup assigned to a port on a designated bridge that acts as a backup path
provided by a designated port in the direction of the leaves of the spanning
tree.
- Disabled assigned to a port that is not operational or is excluded from the
active topology by network management. Considered a discarded port.
- RSTP converges quicker (5 sec) than STP (30 seconds) to a tree topology
where the lowest-cost paths are forwarding frames. RSTP archives rapid
transition to the forwarding state on edge ports, root ports, and point-to-point
links. Edge and root ports can transition to forwarding without transmitting or
receiving messages from other bridges.
Rapid Spanning Tree Protocol
 Port Modes
Full-duplex mode port assumed to be point-to-point. Modern switched
networks utilize this mode mostly.
Half-duplex mode port considered a shared port by default.
Rapid Spanning Tree Protocol
 Port Modes
HSRP
Hot Standby Router Protocol
Active Router
Standby Router
Virtual Router
Workstation
Enterprise Internetwork
Multi-Homing
What is Multi-homing?
Multi-homing is to provide more than one connection for a system to access and offer
network services. In an enterprise network, multi-homing provides access to more
than one entry into the Internet.
Example: WAN backup and ISP redundancy
If a server has more than one network layer address.
Multi-homing the Internet Connection
Enterprise
Enterprise
Enterprise
ISP 1
ISP 1 ISP 2
ISP 1
ISP 1 ISP 2
Enterprise
Option A
Option B
Option C
Option D
Paris NY
Paris NY
Security Topologies
Enterprise
Network
DMZ
Web, File, DNS, Mail Servers
Internet
Security Topologies
Internet
Enterprise Network
DMZ
Web, File, DNS, Mail Servers
Firewall
Review Questions
 Why are hierarchy and modularity important for
network designs?
 What are the three layers of Cisco’s hierarchical
network design?
 What are the major components of Cisco’s
enterprise composite network model?
 What are the advantages and disadvantages of
the various options for multihoming an Internet
connection?

More Related Content

Similar to Designing network topology.pptx

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
Jheyson Ayala
 
Network Analysis & Designing
Network Analysis & DesigningNetwork Analysis & Designing
Network Analysis & Designing
Pawan Sharma
 
The Essential Components of Structured Cabling
The Essential Components of Structured CablingThe Essential Components of Structured Cabling
The Essential Components of Structured Cabling
libertyuae uae
 
Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1
SaifullahSiddiqui7
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networkingVinod Jadhav
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
Ccna report
Ccna reportCcna report
Ccna report
Surender Singh
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
toltonkendal
 
08-sdnfvmec.pdf
08-sdnfvmec.pdf08-sdnfvmec.pdf
08-sdnfvmec.pdf
SumaiyaRaiyan
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
Ramesh Sibal
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
ccna presentation
ccna presentationccna presentation
ccna presentation
Yasser Mahfouz
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
 
E018113036
E018113036E018113036
E018113036
IOSR Journals
 
Week2
Week2Week2
Week2
trayyoo
 

Similar to Designing network topology.pptx (20)

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Network Analysis & Designing
Network Analysis & DesigningNetwork Analysis & Designing
Network Analysis & Designing
 
The Essential Components of Structured Cabling
The Essential Components of Structured CablingThe Essential Components of Structured Cabling
The Essential Components of Structured Cabling
 
Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Ccna report
Ccna reportCcna report
Ccna report
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
 
08-sdnfvmec.pdf
08-sdnfvmec.pdf08-sdnfvmec.pdf
08-sdnfvmec.pdf
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Black_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdfBlack_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdf
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
E018113036
E018113036E018113036
E018113036
 
Week2
Week2Week2
Week2
 

More from KISHOYIANKISH

4. Data Manipulation.ppt
4. Data Manipulation.ppt4. Data Manipulation.ppt
4. Data Manipulation.ppt
KISHOYIANKISH
 
Lect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.pptLect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.ppt
KISHOYIANKISH
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
KISHOYIANKISH
 
Lect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.pptLect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.ppt
KISHOYIANKISH
 
Lect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.pptLect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.ppt
KISHOYIANKISH
 
Lect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.pptLect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.ppt
KISHOYIANKISH
 
Lect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.pptLect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.ppt
KISHOYIANKISH
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
KISHOYIANKISH
 
VIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxVIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptx
KISHOYIANKISH
 
Lesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.pptLesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.ppt
KISHOYIANKISH
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
KISHOYIANKISH
 

More from KISHOYIANKISH (11)

4. Data Manipulation.ppt
4. Data Manipulation.ppt4. Data Manipulation.ppt
4. Data Manipulation.ppt
 
Lect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.pptLect 7a - Innovative Companies.ppt
Lect 7a - Innovative Companies.ppt
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Lect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.pptLect 6- The Value of an Invention.ppt
Lect 6- The Value of an Invention.ppt
 
Lect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.pptLect 7a - Innovation and Enterpreneureship.ppt
Lect 7a - Innovation and Enterpreneureship.ppt
 
Lect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.pptLect 3- Technology Transfer Processes.ppt
Lect 3- Technology Transfer Processes.ppt
 
Lect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.pptLect 5a- Diffusion of Innovations-1.ppt
Lect 5a- Diffusion of Innovations-1.ppt
 
Lesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptxLesson 5a_IP Addressing.pptx
Lesson 5a_IP Addressing.pptx
 
VIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxVIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptx
 
Lesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.pptLesson 7 - Structured cabling.ppt
Lesson 7 - Structured cabling.ppt
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Designing network topology.pptx

  • 1. LESSON 6: Designing a network topology
  • 2. Agenda  Learning Activities  Network Design Document, logical design, and top-down network design methodology.  Hierarchical Network Design, network topology consisting of many interrelated components. This task might be easier to divide and conquer the problem and develop it.  Spanning Tree Protocol, fast convergence network routers.  VLANs, small bandwidths to switches rather than broadcasting.  Redundancy, provides availability, performance, and scalability.  VPNs, use a third party communication media securing data.
  • 3. Documenting Your Design  If you are given a Request For Proposal (RFP), respond to the request in the exact format that the RFP specifies  If no RFP, you should still write a design document  Describe your customer’s requirements and how your design meets those requirements  Document the budget for the project  Explain plans for implementing the design
  • 4. Typical RFP Response Topics  A network topology for the new design  Information on the protocols, technologies, and products that form the design  An implementation plan  A training plan  Support and service information and plan  Prices and payment options  Qualifications of the responding vendor or supplier  Recommendations from other customers  Legal contractual terms and conditions
  • 5. Contents of a Network Design Document  Executive summary  Project goal  Project scope  Design requirements  Current state of the network  New logical and physical design  Results of network design testing  Implementation plan  Project budget
  • 6. Design Requirements  Business goals explain the role the network design will play in helping an organization succeed  Technical goals include scalability, performance, security, manageability, usability, adaptability, and affordability
  • 7. Logical and Physical Design Logical design  Topology  Models for addressing and naming  Switching and routing protocols  Security strategies  Network management strategies Physical design  Actual technologies and devices
  • 8. Implementation Plan Recommendations for deploying the network design  Project schedule which includes dates and times for service provider installations  Any plans for outsourcing (offshore or in country)  Training  Risks  A fallback plan if the implementation should fail  A plan for evolving the design as new requirements arise
  • 9. Possible Appendixes Details found in appendixes  Detailed topology maps  Device configurations  Addressing and naming details  Network design testing results  Contact information  Pricing and payment options  More information about the company that is presenting the design  Annual reports, product catalogs, press releases  Legal contractual terms and conditions
  • 10. Topology The origin of a topology • A branch of mathematics concerned with those properties of geometric configurations that are unaltered by elastic deformations such as stretching or twisting • A term used in the computer networking field to describe the structure of a network
  • 11. What is a Topology? Definition of Topology A topology is a map of an internetwork that indicates network segments, interconnection points, and user communities. The purpose of the map is to show the geometry of the network, not the physical geography or technical implementation.
  • 12. Structured Engineering Principles Regardless of network size or requirements, a critical factor for the successful implementation of any network design is to follow good structured engineering principles. These principles include;  Hierarchy: A hierarchical network model is a useful high-level tool for designing a reliable network infrastructure. It breaks the complex problem of network design into smaller and more manageable areas.  Modularity: By separating the various functions that exist on a network into modules, the network is easier to design. Cisco has identified several modules, including the enterprise campus, services block, data center, and Internet edge.
  • 13. Structured Engineering Principles (CONT)  Resiliency: The network must remain available for use under both normal and abnormal conditions. Normal conditions include normal or expected traffic flows and traffic patterns, as well as scheduled events such as maintenance windows. Abnormal conditions include hardware or software failures, extreme traffic loads, unusual traffic patterns, denial-of-service (DoS) events, whether intentional or unintentional, and other unplanned events. Flexibility: The ability to modify portions of the network, add new services, or increase capacity without going through a major forklift upgrade (i.e., replacing major hardware devices).
  • 15. A typical enterprise hierarchical LAN campus network design includes the following three layers:  Access layer: Provides workgroup/user access to the network  Distribution layer: Provides policy-based connectivity and controls the boundary between the access and core layers  Core layer: Provides fast transport between distribution switches within the enterprise campus July 19, 2022 15
  • 16. The Access Layer In a LAN environment, the access layer grants end devices access to the network. In the WAN environment, it may provide teleworkers or remote sites access to the corporate network across WAN connections. The access layer for a small business network generally incorporates Layer 2 switches and access points providing connectivity between workstations and servers. The access layer serves a number of functions, including;  Layer 2 switching  High availability  Port security  QoS classification and marking and trust boundaries  Address Resolution Protocol (ARP) inspection  Virtual access control lists (VACLs)  Spanning tree  Power over Ethernet (PoE) and auxiliary VLANs for VoIP July 19, 2022 16
  • 17. The Distribution Layer This layer aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination. It is the boundary between the Layer 2 domains and the Layer 3 routed network. The distribution layer device is the focal point in the wiring closets. Either a router or a multilayer switch is used to segment workgroups and isolate network problems in a campus environment. A distribution layer switch may provide upstream services for many access layer switches. The distribution layer can provide;  Aggregation of LAN or WAN links.  Policy-based security in the form of access control lists (ACLs) and filtering.  Routing services between LANs and VLANs and between routing domains (e.g., EIGRP to OSPF).  Redundancy and load balancing.  A boundary for route aggregation and summarization configured on interfaces toward the core layer.  Broadcast domain control, because routers or multilayer switches do not forward broadcasts. The device acts as the demarcation point between broadcast domains. 17
  • 18. The Core Layer The core layer is also referred to as the network backbone. The core layer consists of high-speed network devices. These are designed to switch packets as fast as possible and interconnect multiple campus components, such as distribution modules, service modules, the data center, and the WAN edge. The core should be highly available and redundant. The core aggregates the traffic from all the distribution layer devices, so it must be capable of forwarding large amounts of data quickly. Considerations at the core layer include  Providing high-speed switching (i.e., fast transport)  Providing reliability and fault tolerance  Scaling by using faster, and not more, equipment  Avoiding CPU-intensive packet manipulation caused by security, inspection, quality of service (QoS) classification, or other processes NOTE: - No policy implementation should take place in the core of the network. - Every device in the core should have full reachability to every destination in the network. July 19, 2022 18
  • 19. Two-Tier Collapsed Core Design  The three-tier hierarchical design maximizes performance, network availability, and the ability to scale the network design.  However, many small enterprise networks do not grow significantly larger over time. Therefore, a two-tier hierarchical design where the core and distribution layers are collapsed into one layer is often more practical. A “collapsed core” is when the distribution layer and core layer functions are implemented by a single device. The primary motivation for the collapsed core design is reducing network cost, while maintaining most of the benefits of the three-tier hierarchical model. July 19, 2022 19
  • 20.  A flat network topology is adequate for very small networks. With a flat network design, there is no hierarchy.  Each internetworking device has essentially the same job, and the network is not divided into layers or modules.  A flat network topology is easy to design and implement, and it is easy to maintain, as long as the network stays small.  When the network grows, however, a flat network is undesirable. The lack of hierarchy makes troubleshooting difficult. Rather than being able to concentrate troubleshooting efforts in just one area of the network, you may need to inspect the entire network. July 19, 2022 20 Flat Versus Hierarchical Topologies
  • 21. Network Topology Design Themes Why Use a Hierarchical Model? 1. Reduces workload on network devices 2. Avoids devices having to communicate with too many other devices (reduces “CPU adjacencies”) 3. Constrains on broadcast domains 4. Enhances simplicity and understanding 5. Facilitates changes 6. Facilitates scaling to a larger size
  • 22. What is Spanning Tree Protocol? A second problem occurs with redundant topologies is a single device will receive multiple copies of the same frame. The third problem occurs within the switch itself. The MAC address table can change rapidly and contain wrong information. What happens when neither switch has learned about devices A and B’s location? Device A sends data to device B. Each switch learns about device A is on port 1, and each records this in its MAC address table. The switches haven’t learned about device B yet. Both switches flood the frame to discover device B on their port 2.
  • 23. What is Spanning Tree Protocol? As a result, the MAC address table is overwritten. The switches previously had device A connected to port 1. Because the table changed rapidly, it might be considered unstable.
  • 24. What is Spanning Tree Protocol? The design of STP is hierarchical. At the top of the network is the root device, which could be a bridge or switch. The root device makes all decisions regarding which link should be blocked or allow data to flow. Most switches come with a default setting. Normally, this setting is 38464. How is the root device determined? 1. Manually 2. Hard coded
  • 25. What is Spanning Tree Protocol? Replicating links is good for improving reliability and availability Packets are intended to flow on one link at a time. EtherChannel insures that only one link is active at a time.
  • 26. What is Spanning Tree Protocol? Replicating links is good for improving reliability and availability. Packets are intended to flow on one link at a time. EtherChannel insures that only one link is active at a time in two or a bundle of connections.
  • 27. What is Spanning Tree Protocol? What is EtherChannel? EtherChannel is a port link aggregation technology or port-channel architecture used primarily on Cisco switches. It allows grouping of several physical Ethernet links to create one logical Ethernet link for the purpose of providing fault-tolerance and high-speed links between switches, routers and servers.
  • 28. What is Spanning Tree Protocol? When bridges or switches are connected together in a redundant configuration, this appear to be harmless and good. The problem occurs when the switches broadcast to their neighbors to create their routing tables. No broadcasting occurs on the links connecting adjacent switches .
  • 29. What is Spanning Tree Protocol? When bridges or switches are connected together to form a redundant configuration, this appears again to be harmless. The problem occurs when the switches broadcast to their neighbors to create their routing tables. There is no broadcasting that occurs on the links connecting adjacent switches, but there is on the remaining switch ports.
  • 30. What is Spanning Tree Protocol? The red arrows represent links going the other switches in the network.
  • 31. What is Spanning Tree Protocol? The selection criteria for selecting a root device is based on the lowest priority of the device. Usually, the root device priority is 38463, which is one less than the manufactures default priority (38464).
  • 32. What is Spanning Tree Protocol? The root device makes all decisions about which links will pass traffic. In most cases, the root device will shut down the furthest link. Cost is a factor of the link speed.
  • 33. What is Spanning Tree Protocol? The root device makes all decisions about which links will pass traffic. In most cases, the root device will shut down the furthest link. A consideration is made based on the speed of the link. cost
  • 34. What is Spanning Tree Protocol? When new switches are installed, they may all have the same default priority (38464). The selection criteria for the root device is likely to result is a “root war” of fight off. If the root war fails to determine a root device, then the lowest MAC address (could be the oldest) is selected.
  • 35. What is Spanning Tree Protocol? When new switches are installed, they may all have the same default priority number, 38464. The selection criteria for who is going to be the root device, usually results in a “root war” or fight off. If the root war fails to determine a root device, then the lowest MAC address (usually the oldest) is selected.
  • 36. What is Spanning Tree Protocol? When a link or node fails, the network topology changes. The root device has to adjust the existing links to make the new configuration reliable and secure. In doing so, it takes approximately 30 seconds before the first packet can be sent. It takes time for these transitions to finalize. Currently, the IEEE802.1W (RSTP) converges in approximately 5 seconds. Root
  • 37. What is Spanning Tree Protocol? When a link or node fails, the network topology changes. The root device has to adjust the existing/remaining links to make the new configuration reliable and secure. In doing so, it takes approximately 30 seconds before the first packet is sent again. It takes time for these transitions to finalize.
  • 38. What is Spanning Tree Protocol? STP is the root part of Ethernet. Latest STP standard is IEEE 802.1S
  • 39. Bridges (Switches) Running STP  Participate with other bridges in the election of a single bridge as the Root Bridge.  Calculate the distance of the shortest path to the Root Bridge and choose a port (known as the Root Port) that provides the shortest path to the Root Bridge.  For each LAN segment, elect a Designated Bridge and a Designated Port on that bridge. The Designated Port is a port on the LAN segment that is closest to the Root Bridge. (All ports on the Root Bridge are Designated Ports.)  Select bridge ports to be included in the spanning tree. The ports selected are the Root Ports and Designated Ports. These ports forward traffic. Other ports block traffic.
  • 40. Elect a Root Bridge B Bridge C Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Bridge A Lowest Bridge ID Wins!
  • 41. React to Changes Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 LAN Segment 1 LAN Segment 3 Root Port Root Port Designated Port Designated Port Designated Port Becomes Disabled Blocked Port Transitions to Forwarding State
  • 42. Determine Root Ports Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Port Root Port Lowest Cost Wins!
  • 43. Determine Designated Ports Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Port Root Port Designated Port Designated Port Designated Port Lowest Bridge ID Wins!
  • 44. Bridge B Bridge C Root Bridge A Bridge A ID = 80.00.00.00.0C.AA.AA.AA Bridge B ID = 80.00.00.00.0C.BB.BB.BB Bridge C ID = 80.00.00.00.0C.CC.CC.CC Port 1 Port 2 Port 1 Port 2 Port 1 Port 2 LAN Segment 2 100-Mbps Ethernet Cost = 19 LAN Segment 1 100-Mbps Ethernet Cost = 19 LAN Segment 3 100-Mbps Ethernet Cost = 19 Root Port Root Port Designated Port Designated Port Designated Port Blocked Port X Prune Topology into a Tree!
  • 45. Scaling the Spanning Tree Protocol  Keep the switched network small  It shouldn’t span more than seven switches  Use Bridge Protocol Data Units (BPDU) skew detection on Cisco switches  Use IEEE 802.1w  Provides rapid reconfiguration of the spanning tree. Also known as RSTP
  • 46. Rapid Spanning Tree Protocol  Bridge port states - Discarding is a port that is neither learning MAC addresses nor forwarding user’s frames. - Learning is a port that is learning MAC addresses to populate the MAC address table, but has not yet forwarded user frames - Forwarding is a port that is learning MAC addresses and forwarding user frames.
  • 47. Rapid Spanning Tree Protocol  Converged switched network Bridge port roles - Root port assigned on a non-root bridge, provides lowest cost path to the root bridge. - Designated assigned on a port attached to a LAN, provides lowest cost path to the root bridge. - Alternate assigned to a port that offers an alternative path in the direction of the root bridge to that provided by the bridge’s root port. Considered a discarded port
  • 48. Rapid Spanning Tree Protocol - Backup assigned to a port on a designated bridge that acts as a backup path provided by a designated port in the direction of the leaves of the spanning tree. - Disabled assigned to a port that is not operational or is excluded from the active topology by network management. Considered a discarded port. - RSTP converges quicker (5 sec) than STP (30 seconds) to a tree topology where the lowest-cost paths are forwarding frames. RSTP archives rapid transition to the forwarding state on edge ports, root ports, and point-to-point links. Edge and root ports can transition to forwarding without transmitting or receiving messages from other bridges.
  • 49. Rapid Spanning Tree Protocol  Port Modes Full-duplex mode port assumed to be point-to-point. Modern switched networks utilize this mode mostly. Half-duplex mode port considered a shared port by default.
  • 50. Rapid Spanning Tree Protocol  Port Modes
  • 51. HSRP Hot Standby Router Protocol Active Router Standby Router Virtual Router Workstation Enterprise Internetwork
  • 52. Multi-Homing What is Multi-homing? Multi-homing is to provide more than one connection for a system to access and offer network services. In an enterprise network, multi-homing provides access to more than one entry into the Internet. Example: WAN backup and ISP redundancy If a server has more than one network layer address.
  • 53. Multi-homing the Internet Connection Enterprise Enterprise Enterprise ISP 1 ISP 1 ISP 2 ISP 1 ISP 1 ISP 2 Enterprise Option A Option B Option C Option D Paris NY Paris NY
  • 56. Review Questions  Why are hierarchy and modularity important for network designs?  What are the three layers of Cisco’s hierarchical network design?  What are the major components of Cisco’s enterprise composite network model?  What are the advantages and disadvantages of the various options for multihoming an Internet connection?

Editor's Notes

  1. Did you know that according to topologists, a coffee cup and donut are the same shape? If they were made of clay, for example, consider how easy it would be to mold the one to look like the other, while retaining the most significant characteristics (such as the roundedness and the hole). Just like with coffee and donuts made of clay, in the networking field, during the logical design phase, we are more concerned with the overall architecture, shape, size, and interconnectedness of a network, than with the physical details. For more information regarding topology, coffee, and donuts, see: http://en.wikipedia.org/wiki/Topology
  2. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  3. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  4. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  5. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  6. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  7. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  8. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.
  9. If all ports have equal distance to the Root Bridge, then the Designated Port is chosen by lowest sender Bridge ID. If the IDs are the same, then the port is chosen by lowest Port ID. In general, STP checks for the best information by using these four criteria in the following order: Lowest Root Bridge ID Lowest path cost to the Root Bridge Lowest sender Bridge ID Lowest Port ID See Top-Down Network Design for more details.