Network Design Module2 2022 2023
Network Design Module2 2022 2023
I. UNIT TITLE
Designing a Network Topology
1. Hierarchical design
2. Flat design vs. hierarchical design
3. Mesh vs. hierarchical-mesh
4. Redundant design
5. Modular design
6. Campus network and spanning tree
7. Virtual LANs
In this chapter, you will learn techniques for developing a network topology.
A topology is a map of an internetwork that indicates network segments,
interconnection points, and user communities. Although geographical sites can appear
on the map, the purpose of the map is to show the geometry of the network, not the
physical geography or technical implementation. The map is a high-level blueprint of
the network, analogous to an architectural drawing that shows the location and size of
rooms for a building, but not the construction materials for fabricating the rooms.
IV. LESSON
TOPOLOGY as a map of a network that shows its segments, its interconnection points, and its
user communities.
HIERARCHICAL DESIGN
• core layer - routers and switches optimized to carry lots of data and to have high
availability, it acts as the backbone of the network, and carries data between sites.
• distribution layer - routers and switches with lower capacity than those in the core layer
that implement policies, and that connect as a between the access layer and the core
layer; they translate protocols as needed between the other two layers.
• access layer - the layer of switches and wireless access points through which users
connect their stations to the network, as well as the edge routers that connect LANs to
the distribution layer.
Unplanned network may grow by adding more and more switches, which can produce a network
with only one broadcast domain. This means that any broadcast not only reaches every host on
the network, it interrupts each host's processor, wasting time on a message that does not concern
most of them. A hierarchical design avoids this problem by producing subnets that are separate
broadcast domains. Each subnet is a separate module in the network, and more may be added
without causing needless traffic through existing subnets. This design also minimizes traffic from
one router to another, avoiding the traffic that would be caused by all routers talking to each other
constantly.
Network Requirements
When discussing network design, it is useful to categorize networks based on the number of devices
serviced:
Network designs vary depending on the size and requirements of the organizations. For example, the
networking infrastructure needs of a small organization with fewer devices will be less complex than the
infrastructure of a large organization with a significant number of devices and connections.
There are many variables to consider when designing a network. For instance, consider the example
in Figure 1-1. The sample high-level topology diagram is for a large enterprise network that consists of a
main campus site connecting small, medium, and large sites.
Figure 1-1
Large Enterprise Network Design
Network design is an expanding area and requires a great deal of knowledge and experience.
Regardless of network size or requirements, a critical factor for the successful implementation of any
network design is to follow good, structured engineering principles. These principles include
• Hierarchy: A hierarchical network model is a useful high-level tool for designing a reliable network
infrastructure. It breaks the complex problem of network design into smaller and more manageable
areas.
• Modularity: By separating the various functions that exist on a network into modules, the network
is easier to design. Cisco has identified several modules, including the enterprise campus, services
block, data center, and Internet edge.
• Resiliency: The network must remain available for use under both normal and abnormal
conditions. Normal conditions include normal or expected traffic flows and traffic patterns, as well
as scheduled events such as maintenance windows. Abnormal conditions include hardware or
software failures, extreme traffic loads, unusual traffic patterns, denial-of-service (DoS) events,
whether intentional or unintentional, and other unplanned events.
• Flexibility: The ability to modify portions of the network, add new services, or increase capacity
without going through a major forklift upgrade (i.e., replacing major hardware devices).
To meet these fundamental design goals, a network must be built on a hierarchical network architecture
that allows for both flexibility and growth.
Figure 1-2
Flat Switched Network
Hubs and switches were added as more devices needed to be connected. A flat network design provided
little opportunity to control broadcasts or to filter undesirable traffic. As more devices and applications were
added to a flat network, response times degraded, making the network unusable.
A better network design approach was needed. For this reason, organizations now use a hierarchical
network design as shown in Figure 1-3.
Figure 1-3
Hierarchical Network
A hierarchical network design involves dividing the network into discrete layers. Each layer, or tier, in the
hierarchy provides specific functions that define its role within the overall network. This helps the network
designer and architect to optimize and select the right network hardware, software, and features to perform
specific roles for that network layer. Hierarchical models apply to both LAN and WAN design.
The benefit of dividing a flat network into smaller, more manageable blocks is that local traffic remains local.
Only traffic that is destined for other networks is moved to a higher layer. For example, in Figure 1-3 the flat
network has now been divided into three separate broadcast domains.
A typical enterprise hierarchical LAN campus network design includes the following three layers:
Another sample three-layer hierarchical network design is displayed in Figure 1-4. Notice that each building
is using the same hierarchical network model that includes the access, distribution, and core layers.
Figure 1-4
Multi Building Enterprise Network Design
NOTE
There are no absolute rules for the way a campus network is physically built. While it is true that many
campus networks are constructed using three physical tiers of switches, this is not a strict requirement. In
a smaller campus, the network might have two tiers of switches in which the core and distribution elements
are combined in one physical switch. This is referred to as a collapsed core design.
In a LAN environment, the access layer highlighted grants end devices access to the network. In the WAN
environment, it may provide teleworkers or remote sites access to the corporate network across WAN
connections.
As shown in Figure 1-5, the access layer for a small business network generally incorporates Layer 2
switches and access points providing connectivity between workstations and servers.
Figure 1-5
Access Layer
• Layer 2 switching
• High availability
• Port security
• QoS classification and marking and trust boundaries
• Address Resolution Protocol (ARP) inspection
• Virtual access control lists (VACLs)
• Spanning tree
• Power over Ethernet (PoE) and auxiliary VLANs for VoIP
The distribution layer aggregates the data received from the access layer switches before it is
transmitted to the core layer for routing to its destination. In Figure 1-6, the distribution layer is the
boundary between the Layer 2 domains and the Layer 3 routed network.
Figure 1-6
Distribution Layer
The distribution layer device is the focal point in the wiring closets. Either a router or a multilayer switch is
used to segment workgroups and isolate network problems in a campus environment.
A distribution layer switch may provide upstream services for many access layer switches.
The three-tier hierarchical design maximizes performance, network availability, and the ability to scale
the network design.
However, many small enterprise networks do not grow significantly larger over time. Therefore, a two-tier
hierarchical design where the core and distribution layers are collapsed into one layer is often more
practical. A “collapsed core” is when the distribution layer and core layer functions are implemented by a
single device. The primary motivation for the collapsed core design is reducing network cost, while
maintaining most of the benefits of the three-tier hierarchical model.
The example in Figure 1-8 has collapsed the distribution layer and core layer functionality into multilayer
switch devices.
Figure 1-8
Two-Tier Hierarchical Design
The hierarchical network model provides a modular framework that allows flexibility in network design and
facilitates ease of implementation and troubleshooting.
Virtual LANs
Bandwidth domain as any set of devices that share bandwidth or compete for access to it. In a classic
wired Ethernet, there was one bandwidth domain, because all devices on that LAN competed for access
with each other. In an Ethernet with switches, the text tells us that each device that is wired to a switch is
on its own bandwidth domain, but this is a little specious, since the there is no point in communicating only
with the switch.
The text also defines a broadcast domain as the set of devices that can receive each other's broadcasts
frames. This is better definition than we usually see. We are reminded (or told, if we did not know) that the
broadcast address for layer 2 is a MAC address that is all Fs: FF:FF:FF:FF:FF:FF
The text turns a corner and steers toward VLANs. Users anywhere on your network can be made members
of a common Virtual LAN, which lets them communicate as easily as if they were on the same LAN. This
was the original use of VLANs. They are not often used for this purpose any longer. Usually, VLANs are
used, as the text says, to make a large switch act as though it was really several switches, so that it can
be used to separate groups of ports into different VLANs. This has the benefit of having each VLAN act as
a separate broadcast domain, minimizing broadcast intrusions for all devices plugged into ports on that
switch. A virtual router on the switch connects the separate VLANs the same way a real router would.
As you might imagine from the description of VLAN users being anywhere in your network, a VLAN can
exist on specific ports of multiple switches. When this is done, the connections between the switches that
contain the parts of a VLAN are called trunks or trunk links. Frames traveling from one such switch to
another are given a header identifying the VLAN it belongs to. The header is called a VLAN tag. As the
illustration on page 144 shows, we can place multiple VLANs on a switch, they can all span to other switches
across trunk links.
Wireless LANs
The text offers some general advice about placing wireless access points, and positioning antennas. The
text mentions that most WAP antennas are isotropic antennas, also called omnidirectional antennas.
This means that they should radiate signals in a spherical pattern, equally in all directions. The reality is
that the patterns are not perfect spheres. Think of an antenna as a stick that points up. Think of the signal
as a disk with a hole in its center that the antenna has been pushed through. The strongest signal coming
from such an antenna will radiate like a disk that is centered on the antenna. If the antenna is mounted
vertically, the plane of that disk will be strongest horizontally.
The text also mentions that mobile devices like cell phones and laptops have a variety of antenna types
and alignments. It mentions that the antennas of those devices may be large or small, and may be oriented
in any direction. The text suggests that a given WAP may offer connections to too many wireless devices
if the WAP's signal is too strong. It recommends that we may want to reduce signal strength to limit the
operating distance, which will limit the number of stations that can connect, which may improve the user
experience of those who can connect.
The text also recommends that when we set up multiple WAPs on a campus, we should make all wireless
users members of a particular VLAN, which will simplify subnet addressing for those devices, and may
provide an advantage when roaming from one wireless cell to another.
The text also recommends redundant WAPs when high availability is desired. When using Cisco equipment,
the second WAP in each pair would be placed in Hot Standby mode, which monitors the primary WAP in
the pair, and causes the standby WAP to take over if the primary WAP fails.
Text discussed redundant switches and spanning tree protocol to control which switch is active in a
redundant situation. It tells us here that this solution does not support load sharing. It recommends a newer
protocol from Cisco, Per VLAN Spanning Tree+ (PVST+), which constructs a separate logical tree for
every VLAN.
Note that each switch holds elements of two VLANs, and each switch is linked to both switches in the
hierarchical layer above it.
Server redundancy
The text lists several kinds of servers that should be considered for redundancy:
• file servers
• web servers
• DHCP servers - The text reminds us that DHCP requests are broadcast requests. If your DHCP
server serves more than one network or subnet, you must configure appropriate routers to forward
this kind of traffic.
• name servers - Servers for DNS, WINS, and NetBIOS Name Service (NBNS).
• database servers
Workstations will typically need access to routers for any information not on their own networks. Routers,
like other devices, go down from time to time, so redundant routers are recommended.
The text ponders how the workstations will find the redundant routers, once their default routers are down.
The use of the Router Discovery Protocol (RDP) which causes routers to multicast their addresses and
services every 7 to 10 minutes.
This is a Cisco book, so a Cisco specific solution to default gateway failure. Hot Standby Router Protocol
(HSRP) is explained as a protocol that allows for a primary and a backup router, both of which would act
on requests sent to a virtual router (also called a phantom router), whose IP address and MAC address
would be delivered as the default router for a network by a DHCP server.
The text suggests that we should have some redundant connections to our WAN links that are actually
redundant. We are warned that we should ask for circuit diversity from our data carriers, so that a backup
circuit is actually different from our primary connection to their data service. It would not do any good to
have a backup system that is taken down by the same threats that could take down our primary system.
The text presents some terms you may know, but uses some in different ways than you might know:
You probably know that VPNs are used to make secure connections over the Internet, over leased data
line, and over regular network lines. The text provides some background on VPN functions. It mentions that
VPNs often use tunneling, the practice of encapsulating packets in other kinds of packets so they can
pass across a network that does not understand their native packet type.