N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

107
NETWORK DESIGN METHODOLOGY TOP-DOWN NETWORK DESIGN 1

Transcript of N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

Page 1: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK DESIGN METHODOLOGY

TOP-DOWN NETWORK DESIGN

1

Page 2: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

2

Top-Down Network Design, 3rd Edition

Priscilla Oppenheimer

Designing and Supporting Computer Networks (CCNA)

Page 3: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

Four phases in the top-down network design methodology

I: Identifying Your Customer's Needs and Goals

II: Logical Network Design

III: Physical Network Design

IV: Testing, Optimizing, and Documenting Your Network Design

3

Page 4: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

PART 1IDENTIFYING YOUR CUSTOMER’S NEEDS AND GOALS

4

Analyzing Business Goals and Constraints Analyzing Technical Goals and Tradeoffs Characterizing the Existing Internetwork Characterizing Network Traffic

Page 5: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHAPTER ONEANALYZING BUSINESS GOALS AND CONSTRAINTS

Systematic, Top-down network design methodology

Analysing your customer’s business objectives

Analysing the business constrains; budgets, timeframes, workplace politics.

5

Page 6: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK DESIGN

Good network design must recognizes customer’s requirements.

Network design choices and tradeoffs must be made when designing the logic network before any physical devices are selected.

6

Page 7: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

STRUCTURED NETWORK DESIGN

Four fundamental network design goals: Scalability Availability Security Manageability

7

Page 8: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

STRUCTURED NETWORK DESIGN

Core Layer: connects Distribution Layer devices Distribution Layer: interconnects smaller LANs Access Layer: provides connections for hosts

and end devices

8

Page 9: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

START FROM THE TOP

9

Application

Presentation

Session

Transport

Network

Data Link

PhysicalLayer 1

Layer 7

Layer 6

Layer 5

Layer 4

Layer 3

Layer 2

Page 10: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

10

Page 11: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SYSTEMS DEVELOPMENT LIFE CYCLES(SDLC)

Typical systems are developed and continue to exist over a period of time, often called a systems development life cycle (SDLC).

11

Page 12: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

Analyze requirements

Develop logical design

Develop physical design

Test, optimize, and document

design

Monitor and optimize network

performance

Implement and test network

TOP-DOWN NETWORK DESIGN STEPS

12

systems development life cycle (SDLC).

Page 13: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

THE PDIOO NETWORK LIFE CYCLE

Plan

Design

Implement

Operate

OptimizeRetire

Plan Design Implement Operate Optimize

13

Page 14: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK DESIGN STEPS

Phase 1 – Analyze RequirementsAnalyze business goals and constraintsAnalyze technical goals and tradeoffsCharacterize the existing networkCharacterize network traffic

14

Page 15: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK DESIGN STEPS

Phase 2 – Logical Network DesignDesign a network topologyDesign models for addressing and namingSelect switching and routing protocolsDevelop network security strategiesDevelop network management strategies

15

Page 16: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK DESIGN STEPS

Phase 3 – Physical Network DesignSelect technologies and devices for

campus networksSelect technologies and devices for

enterprise networks

16

Page 17: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK DESIGN STEPS

Phase 4 – Testing, Optimizing, and Documenting the Network DesignTest the network designOptimize the network designDocument the network design

17

Page 18: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

BUSINESS GOALS

Increase revenue Reduce operating costs Improve communications Shorten product development cycle Expand into worldwide markets Build partnerships with other companies Offer better customer support or new

customer services

18

Page 19: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

RECENT BUSINESS PRIORITIES Mobility Security Resiliency (fault tolerance) Business continuity after a disaster Network projects must be prioritized

based on fiscal goals Networks must offer the low delay

required for real-time applications such as VoIP

19

Page 20: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

BUSINESS CONSTRAINTS

Budget Staffing Schedule Politics and policies

20

Page 21: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

COLLECT INFORMATION BEFORE THE FIRST MEETING

Before meeting with the client, whether internal or external, collect some basic business-related information

Such asProducts produced/Services suppliedFinancial viabilityCustomers, suppliers, competitorsCompetitive advantage

21

Page 22: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

MEET WITH THE CUSTOMER

Try to getA concise statement of the goals of

the project What problem are they trying to solve? How will new technology help them be

more successful in their business? What must happen for the project to

succeed?

22

Page 23: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

MEET WITH THE CUSTOMERGet a copy of the organization chart

This will show the general structure of the organization It will suggest users to account for It will suggest geographical locations to account for

23

Page 24: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

MEET WITH THE CUSTOMERGet a copy of the security policy

How does the policy affect the new design? How does the new design affect the policy? Is the policy so strict that you (the network

designer) won’t be able to do your job?Start cataloging network assets that security

should protect Hardware, software, applications, and data Less obvious, but still important, intellectual

property, trade secrets, and a company's reputation

24

Page 25: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

THE SCOPE OF THE DESIGN PROJECT

Small in scope?Allow sales people to access network via a VPN

Large in scope?An entire redesign of an enterprise network

Use the OSI model to clarify the scopeNew financial reporting application versus new

routing protocol versus new data link (wireless, for example)

Does the scope fit the budget, capabilities of staff and consultants, schedule?

25

Page 26: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

GATHER MORE DETAILED INFORMATION

ApplicationsNow and after the project is completed Include both productivity applications and

system management applications User communities Data stores Protocols Current logical and physical architecture Current performance

26

Page 27: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SUMMARY

Systematic approach Focus first on business requirements and

constraints, and applications Gain an understanding of the customer’s

corporate structure Gain an understanding of the customer’s

business style

27

Page 28: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

REVIEW QUESTIONS

What are the main phases of network design per the top-down network design approach?

What are the main phases of network design per the PDIOO approach?

Why is it important to understand your customer’s business style?

What are some typical business goals for organizations today?

28

Page 29: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHAPTER TWO

ANALYZING TECHNICAL GOALS AND TRADEOFFS

29

Copyright 2010 Cisco Press & Priscilla Oppenheimer

Page 30: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TECHNICAL GOALS

Scalability Availability Performance Security Manageability Usability Adaptability Affordability

30

Your lab report should reflect some of these goals of your own designed network.

Page 31: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SCALABILITY Scalability refers to the ability to grow Some technologies are more scalable

Flat network designs, for example, don’t scale well

Try to learnNumber of sites to be addedWhat will be needed at each of these sitesHow many users will be addedHow many more servers will be added

31

Page 32: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

32

Page 33: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

33

Page 34: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

AVAILABILITY

Availability can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that periodFor example:

24/7 operation Network is up for 165 hours in the 168-hour week Availability is 98.21%

Different applications may require different levels

Some enterprises may want 99.999% or “Five Nines” availability

34

Page 35: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

AVAILABILITY

Availability can also be expressed as a mean time between failure (MTBF) and mean time to repair (MTTR)

Availability = MTBF/(MTBF + MTTR)For example:

The network should not fail more than once every 4,000 hours (166 days) and it should be fixed within one hour

4,000/4,001 = 99.98% availability

35

Page 36: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

AVAILABILITY

DOWNTIME IN MINUTES

4.32

1.44

.72

.01

30

10

5

.10

1577(26

H)

99.70%

52699.90%

26399.95%

599.999%

Per Hour Per Day Per Week Per Year

.18

.06

.03

.0006

.29 2 10599.98% .012

Page 37: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

99.999% AVAILABILITY MAY REQUIRE TRIPLE REDUNDANCY

Can the customer afford this?37

Enterprise

ISP 1 ISP 2 ISP 3

Page 38: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SERVER FARMS

38

Many enterprise networks provide users with Internet-accessible services, such as email and e-commerce. The availability and security of these services are crucial to the success of a business.Managing and securing numerous distributed servers at various locations within a business network is difficult. Recommended practice centralised servers in server farms. Server farms are typically located in computer rooms and data centres.

Page 39: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

39

Page 40: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

40

Page 41: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

BENEFITS OF CREATING A SERVER FARM

41

1. Network traffic enters and leaves the server farm at a defined point. This arrangement makes it easier to secure, filter and prioritise traffic.

2. Redundant, high-capacity links can be installed to the servers and between the server farm network and the main LAN. This configuration is more cost-effective than attempting to provide a similar level of connectivity to servers distributed throughout the network.

3. Load balancing and failover can be provided between servers and between networking devices.

4. The number of high-capacity switches and security devices is reduced, helping to lower the cost of providing services.

Page 42: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK PERFORMANCE Common performance factors include

BandwidthThroughputBandwidth utilizationOffered loadAccuracyEfficiencyDelay (latency) and delay variationResponse time

42

Page 43: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

BANDWIDTH VS. THROUGHPUT

Bandwidth and throughput are not the same

Bandwidth is the data carrying capacity of a circuit, fixed.

Usually specified in bits per second-bps

Throughput is the quantity of error free data transmitted per unit of time

Measured in bps, Bps, or packets per second (pps) Depend on offered load, access method and error

rate

Throughput < Bandwidth 43

Page 44: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

BANDWIDTH, THROUGHPUT, LOAD

44

Offered Load

Throughput

Actual

Idea

l

100 % of Capacity

100 % of Capacity

Page 45: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

OTHER FACTORS THAT AFFECT THROUGHPUT

The size of packets Inter-frame gaps between packets Packets-per-second ratings of devices that forward

packets Client speed (CPU, memory, and HD access speeds) Server speed (CPU, memory, and HD access speeds) Network design MAC Protocols (ALOHA 18.4%) Distance Errors Time of day, etc., etc., etc.

45

Page 46: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

THROUGHPUT VS. GOODPUT Are you referring to bytes per second,

regardless of whether the bytes are user data bytes or packet header bytesOr are you concerned with application-layer

throughput of user bytes, sometimes called “goodput” In that case, you have to consider that bandwidth is

being “wasted” by the headers in every packet

46

Page 47: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

PERFORMANCE (CONTINUED)

EfficiencyHow much overhead is required to deliver an

amount of data?How large can packets be?

Larger better for efficiency (and goodput) But too large means too much data is lost if a

packet is damaged How many packets can be sent in one bunch

without an acknowledgment?

47

Page 48: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

EFFICIENCY

48

Small Frames (Less Efficient)

Large Frames (More Efficient)

Page 49: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DELAY FROM THE USER’S POINT OF VIEW

Response TimeA function of the

application and the equipment the application is running on, not just the network

Most users expect to see something on the screen in 100 to 200 milliseconds

49

Page 50: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DELAY FROM THE ENGINEER’S POINT OF VIEW

Propagation delayA signal travels in a cable at about 2/3 the

speed of light in a vacuum (3×108 m/s) Transmission delay (also known as

serialization delay)Time to put digital data onto a transmission

line For example, it takes about 5 ms to output a 1,024

byte packet on a 1.544 Mbps T1 line Packet-switching delay Queuing delay

50

Page 51: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

QUEUING DELAY AND BANDWIDTH UTILIZATION

Number of packets in a queue increases exponentially as utilization increases

Queue depth = utilization/(1- utilization)

0

3

6

9

12

15

0.5 0.6 0.7 0.8 0.9 1

Average Utilization

Ave

rag

e Q

ue

ue

De

pth

Page 52: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

EXAMPLE A packet switch has 5 users, each offering

packets at a rate of 10 packets per second The average length of the packets is 1,024

bits The packet switch needs to transmit this

data over a 56-Kbps WAN circuitLoad = 5 x 10 x 1,024 = 51,200 bpsUtilization = 51,200/56,000 = 91.4%Average number of packets in queue =

(0.914)/(1-0.914) = 10.63 packets

52

Page 53: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SECURITY

Focus on requirements first Detailed security planning later

(Chapter 8) Identify network assets

Including their value and the expected cost associated with losing them due to a security problem

Analyze security risks

53

Page 54: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

MANAGEABILITY

Fault management Configuration management Accounting management Performance management Security management

54

Page 55: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

USABILITY

Usability: the ease of use with which network users can access the network and services

Networks should make users’ jobs easier

Some design decisions will have a negative affect on usability:Strict security, for example

55

Page 56: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

ADAPTABILITY

Avoid incorporating any design elements that would make it hard to implement new technologies in the future

Change can come in the form of new protocols, new business practices, new fiscal goals, new legislation

A flexible design can adapt to changing traffic patterns and Quality of Service (QoS) requirements

56

Page 57: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

AFFORDABILITY

A network should carry the maximum amount of traffic possible for a given financial cost

Affordability is especially important in campus network designs

WANs are expected to cost more, but costs can be reduced with the proper use of technologyQuiet routing protocols, for example

57

Page 58: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

MAKING TRADEOFFS (EXAMPLE)

Scalability 20 Availability 30 Network performance 15 Security 5 Manageability 5 Usability 5 Adaptability 5 Affordability 15Total (must add up to 100) 100

58

Page 59: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SUMMARY

Continue to use a systematic, top-down approach

Don’t select products until you understand goals for scalability, availability, performance, security, manageability, usability, adaptability, and affordability

Tradeoffs are almost always necessary

59

Page 60: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

REVIEW QUESTIONS

What are some typical technical goals for organizations today?

How do bandwidth and throughput differ? How can one improve network efficiency? What tradeoffs may be necessary in order

to improve network efficiency?

60

Page 61: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHAPTER THREE

CHARACTERIZING THE EXISTING INTERNETWORK

61

Copyright 2010 Cisco Press & Priscilla Oppenheimer

Page 62: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

WHAT’S THE STARTING POINT? According to Abraham Lincoln:

“If we could first know where we are and whither we are tending, we could better judge what to do and how to do it.”

62

Page 63: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

WHERE ARE WE?

Characterize the exiting internetwork in terms of: Its infrastructure

Logical structure (modularity, hierarchy, topology) Physical structure

Addressing and namingWiring and mediaArchitectural and environmental constraintsHealth

63

Page 64: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DIAGRAM A PHYSICAL NETWORK AND DOCUMENT THE EXISTING NETWORK

Network documentation: Logical and physical diagrams Floor plans Complete lists for equipments and

applications Current network configuration files

Page 65: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

GET A NETWORK MAP (PHYSICAL)

65

Gigabit Ethernet

Eugene Ethernet20 users

Web/FTP server

Grants PassHQ

Gigabit Ethernet

FEP (Front End Processor)

IBMMainframe

T1

MedfordFast Ethernet

50 users

RoseburgFast Ethernet

30 usersFrame Relay

CIR = 56 KbpsDLCI = 5

Frame RelayCIR = 56 Kbps

DLCI = 4

Grants PassHQ

Fast Ethernet75 users

InternetT1

Page 66: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DIAGRAM A PHYSICAL NETWORK AND DOCUMENT THE EXISTING NETWORK

Identify and document the strengths and weaknesses of the existing network

Focus on finding ways to overcome weaknesses

Page 67: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

67

Page 68: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHARACTERIZE ADDRESSING AND NAMING

IP addressing for major devices, client networks, server networks, and so on

Any addressing oddities, such as discontiguous subnets?

Any strategies for addressing and naming?For example, sites may be named using airport

codes San Francisco = SFO, Oakland = OAK In LSBU, T-tower block; K-keyworth building; B-

Borough road building; L- london road building

68

Page 69: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DISCONTINUOUS SUBNETS – make problems for some routing protocols

69

Area 1Subnets 10.108.16.0 -

10.108.31.0

Area 0Network

192.168.49.0

Area 2Subnets 10.108.32.0 -

10.108.47.0

Router A Router B

Page 70: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHARACTERIZE THE WIRING AND MEDIA

Single-mode fiber Multi-mode fiber Shielded twisted pair (STP) copper Unshielded-twisted-pair (UTP) copper Coaxial cable Microwave Laser Radio Infra-red

70

Page 71: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

ARCHITECTURAL CONSTRAINTS

Make sure the following are sufficientAir conditioningHeatingVentilationPowerProtection from electromagnetic interferenceDoors that can lock

71

Page 72: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

ARCHITECTURAL CONSTRAINTS

Make sure there’s space for:Cabling conduits Patch panelsEquipment racksWork areas for technicians installing and

troubleshooting equipment

72

Page 73: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

73

Page 74: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHECK THE HEALTH OF THE EXISTING INTERNETWORK

Performance Availability Bandwidth utilization Accuracy Efficiency Response time Status of major routers, switches, and

firewalls74

Page 75: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHARACTERIZE AVAILABILITY

75

Enterprise

Segment 1

Segment 2

Segment n

MTBF MTTRDate and Duration of Last Major Downtime

Cause of Last Major Downtime

Fix for Last Major Downtime

Mean time between failures (MTBF)Mean time to recovery (MTTR)

Page 76: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

Network Utilization

0 1 2 3 4 5 6 7

17:10:00

17:07:00

17:04:00

17:01:00

16:58:00

16:55:00

16:52:00

16:49:00

16:46:00

16:43:00

16:40:00

Tim

e

Utilization

Series1

NETWORK UTILIZATION IN MINUTE INTERVALS

76

Page 77: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

Network Utilization

0 0.5 1 1.5 2 2.5 3 3.5 4 4.5

17:00:00

16:00:00

15:00:00

14:00:00

13:00:00

Tim

e

Utilization

Series1

NETWORK UTILIZATION IN HOUR INTERVALS

77

Page 78: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

BANDWIDTH UTILIZATION BY PROTOCOL

78

Protocol 1

Protocol 2

Protocol 3

Protocol n

Relative Network Utilization

Absolute Network Utilization

Broadcast Rate

Multicast Rate

Page 79: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHARACTERIZE PACKET SIZES

79

Page 80: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHARACTERIZE RESPONSE TIME

80

Node A

Node B

Node C

Node D

Node A Node B Node C Node D

X

X

X

X

Page 81: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHECK THE STATUS OF MAJOR ROUTERS, SWITCHES, AND FIREWALLS

show buffers show environment show interfaces show memory show processes show running-config show version

81

Use Cisco IOS show command

Page 82: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TOOLS

Protocol analyzers Multi Router Traffic Grapher (MRTG) Remote monitoring (RMON) probes Cisco Discovery Protocol (CDP) Cisco IOS NetFlow technology CiscoWorks

82

Page 83: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SUMMARY

Characterize the exiting internetwork before designing enhancements

Helps you verify that a customer’s design goals are realistic

Helps you locate where new equipment will go

Helps you cover yourself if the new network has problems due to unresolved problems in the old network

83

Page 84: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

REVIEW QUESTIONS

What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements?

When considering protocol behavior, what is the difference between relative network utilization and absolute network utilization?

Why should you characterize the logical structure of an internetwork and not just the physical structure?

What architectural and environmental factors should you consider for a new wireless installation?

84

Page 85: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

CHAPTER FOUR

CHARACTERIZING NETWORK TRAFFIC

85

Copyright 2010 Cisco Press & Priscilla Oppenheimer

Page 86: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK TRAFFIC FACTORS

Traffic flow Location of traffic sources and data

stores Traffic load Traffic behavior Quality of Service (QoS) requirements

86

Page 87: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

USER COMMUNITIES, a set of worker who use a particular application or set of applications.

87

User Community Name

Size of Community (Number of Users)

Location(s) of Community

Application(s) Used by Community

Page 88: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DATA STORES (SINKS), an area in a network where application layer data resides. Server, or any device where large quantities of data are stored.

88

Data Store Location Application(s) Used by User Community(or Communities)

Page 89: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TRAFFIC FLOW, involves identifying and characterizing individual traffic flows between traffic source and stores.

89

Destination 1 Destination 2 Destination 3Destination MB/sec MB/secMB/sec MB/sec

Source 1

Source 2

Source 3

Source n

Page 90: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TRAFFIC FLOW EXAMPLE

90

Administration

Business and Social Sciences

Math and Sciences

50 PCs 25 Macs50 PCs

50 PCs30 PCs

30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center

Library and Computing Center

App 1 108 KbpsApp 2 60 KbpsApp 3 192 KbpsApp 4 48 KbpsApp 7 400 KbpsTotal 808 Kbps

App 1 48 KbpsApp 2 32 KbpsApp 3 96 KbpsApp 4 24 KbpsApp 5 300 KbpsApp 6 200 KbpsApp 8 1200 KbpsTotal 1900 Kbps

App 1 30 KbpsApp 2 20 KbpsApp 3 60 KbpsApp 4 16 KbpsTotal 126 Kbps

App 2 20 KbpsApp 3 96 KbpsApp 4 24 KbpsApp 9 80 KbpsTotal 220 Kbps

Arts and Humanities

Server Farm

10-Mbps Metro Ethernet to Internet

Page 91: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TYPES OF TRAFFIC FLOW

Terminal/host Client/server Thin client Peer-to-peer Server/server Distributed computing

91

Page 92: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TRAFFIC FLOW FOR VOICE OVER IP

The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown. The flow for transmitting the digital

voice is essentially peer-to-peer.Call setup and teardown is a

client/server flow A phone needs to talk to a server or

phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on.

92

Page 93: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

IDENTIFYING APPLICATION IMPACTS ON NETWORK DESIGN

File transfer and email applications: Unpredictable bandwidth usage Large packet size Centralization of file and mail servers in a

secure location Redundancy to ensure reliable service

Page 94: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

IDENTIFYING APPLICATION IMPACTS ON NETWORK DESIGN

HTTP and web traffic: Network media Redundancy Security

Page 95: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK APPLICATIONSTRAFFIC CHARACTERISTICS

95

Name of Application

Type of Traffic Flow

Protocol(s) Used by Application

User Communities That Use the Application

Data Stores (Servers, Hosts, and so on)

Approximate Bandwidth Requirements

QoS Requirements

Page 96: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TRAFFIC LOAD To calculate whether capacity is

sufficient, you should know:The number of stationsThe average time that a station is idle

between sending framesThe time required to transmit a message

once medium access is gained That level of detailed information can be

hard to gather, however

96

Page 97: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SIZE OF OBJECTS ON NETWORKS

Terminal screen: 4 Kbytes Simple e-mail: 10 Kbytes Simple web page: 50 Kbytes High-quality image: 50Mbytes Database backup: 1Gbytes or more

97

Page 98: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

TRAFFIC BEHAVIOR

Broadcasts All ones data-link layer destination address

FF: FF: FF: FF: FF: FF Doesn’t necessarily use huge amounts of

bandwidth But does disturb every CPU in the broadcast

domain Multicasts

First bit sent is a one 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)

Should just disturb NICs that have registered to receive it

Requires multicast routing protocol on internetworks 98

Page 99: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

NETWORK EFFICIENCY

Frame size Protocol interaction Windowing and flow control Error-recovery mechanisms

99

Page 100: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

QOS REQUIREMENTS

ATM service specificationsConstant bit rate (CBR)Realtime variable bit rate (rt-VBR)Non-realtime variable bit rate (nrt-VBR)Unspecified bit rate (UBR)Available bit rate (ABR)Guaranteed frame rate (GFR)

100

Page 101: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

QOS REQUIREMENTS PER IETF (Internet Engineering Task Force, develops and promotes Internet standards, It is an open standards organization, with no formal membership or membership requirements.)

IETF integrated services working group specificationsControlled load service

Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network

Guaranteed service Provides firm (mathematically provable) bounds

on end-to-end packet-queuing delays101

Page 102: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

QOS REQUIREMENTS PER IETF

IETF differentiated services working group specificationsRFC 2475 IP packets can be marked with a

differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router

102

Page 103: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

HOW QUALITY OF SERVICE IS IMPLEMENTED ON THE LAN/WAN

Where QoS can be implemented to affect traffic flow:

Layer 2 devices Layer 3 devices

Page 104: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

DOCUMENT THE NETWORK REQUIREMENTS OF SPECIFIC CATEGORIES OF APPLICATIONS

Estimate the volume of application traffic during the initial design phase.

Document projected applications and associated hardware in a network diagram.

Page 105: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

SUMMARY

Continue to use a systematic, top-down approach

Don’t select products until you understand network traffic in terms of:FlowLoadBehaviorQoS requirements

105

Page 106: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

REVIEW QUESTIONS

List and describe six different types of traffic flows.

What makes traffic flow in voice over IP networks challenging to characterize and plan for?

Why should you be concerned about broadcast traffic?

How do ATM and IETF specifications for QoS differ?

106

Page 107: N ETWORK D ESIGN M ETHODOLOGY T OP -D OWN N ETWORK D ESIGN 1.

OF PART 1 107