Chapitre 4 - NETWORK DESIGN - Conception Logique Reseau PDF
Chapitre 4 - NETWORK DESIGN - Conception Logique Reseau PDF
2015-2016
INGENIERIE RESEAUX
NET - DESIGN
ANALYSE DES SYSTEMES
Chapitre 3
Logical Network Design
Network Topology
Addressing and Naming
Switching and Routing Protocols
Network Security Strategies
Management Strategies
2
UPL NET - DESIGN
2015-2016
5
UPL NET - DESIGN
2015-2016
6
UPL
2015-2016 Hierarchical Network Design NET - DESIGN
Enterprise WAN
Core Layer
Backbone
Campus A Campus B
Campus C
Distribution
Campus C Backbone Layer
Access Layer
8
UPL NET - DESIGN
2015-2016 Utilize the Hierarchical Design Model to Develop a
Cost-Effective Network Design
Access Layer
requirements:
Connectivity for existing
devices and new devices
VLANs to separate voice,
security, wireless, and
normal data services
Redundancy
QoS
UPL Utilize the Hierarchical Design Model to Develop a NET - DESIGN
2015-2016
Cost-Effective Network Design
Distribution layer
requirements:
Redundant components
and links
High-density routing
Traffic filtering
QoS implementation
High-bandwidth
connectivity
Fast convergence
Route summarization
UPL NET - DESIGN
2015-2016 Utilize the Hierarchical Design Model to Develop a
Cost-Effective Network Design
Core Layer
requirements:
High-speed
connectivity
Routed
interconnections
High-speed
redundant links
UPL
2015-2016 Flat Versus Hierarchy NET - DESIGN
Headquarters
in Medford
Klamath Falls Ashland Grants Pass Klamath Falls Ashland White City
Branch Office Branch Branch Branch Office Branch Branch
Office Office Office Office
Partial-Mesh Topology
13
Full-Mesh Topology
UPL
2015-2016 A Partial-Mesh Hierarchical Design NET - DESIGN
Headquarters
(Core Layer)
Regional
Offices
(Distribution
Layer)
15
Branch Home Office Branch
Office Office
UPL
2015-2016 Avoid Chains and Backdoors NET - DESIGN
Backdoor
Chain 16
UPL
2015-2016 Campus Topology Design NET - DESIGN
17
UPL NET - DESIGN
A Simple Campus Redundant Design
2015-2016
Host A
LAN X
Switch 1 Switch 2
LAN Y
Host B 18
UPL NET - DESIGN
Bridges and Switches use Spanning-
2015-2016
LAN X
Switch 1 X Switch 2
LAN Y
Host B 19
UPL NET - DESIGN
2015-2016
VIRTUAL LANS (VLANS)
VLANs versus Real LANs
Switch A Switch B
Network A Network B
Two switches that are not connected to each other in any way. When
Station A1 sends a broadcast, Station A2 and Station A3 receive the
broadcast, but none of the stations in Network B receive the broadcast 20
UPL
2015-2016 A Switch with VLANs NET - DESIGN
VLAN A
Through the configuration of the
Station A1 Station A2 Station A3
switch there are now two virtual
LANs implemented in a single
switch. The broadcast, multicast,
and unknown-destination traffic
originating with any member of
VLAN A is forwarded to all other
members of VLAN A, and not to a
member of VLAN B. VLAN A has
the same properties as a
physically separate LAN bounded
by routers. Station B1 Station B2 Station B3
21
VLAN B
UPL
2015-2016 VLANs Span Switches NET - DESIGN
VLAN A VLAN A
Switch A Switch B
VLAN B VLAN B
22
UPL NET - DESIGN
2015-2016
Incorporate Wireless Connectivity into
the LAN Design
Factors influencing availability in a
wireless network:
Location of the AP
Signal strength of the AP
Number of users
Dynamic
reconfiguration
Centralization
UPL
2015-2016 WLANs and VLANs NET - DESIGN
24
UPL
2015-2016 Security Topologies NET - DESIGN
DMZ
Enterprise Internet
Network
25
UPL
2015-2016 DMZ NET - DESIGN
Firewall: boundary
between two or more
networks
Internet
Firewall
DMZ
Enterprise Network
27
Web, File, DNS, Mail Servers
UPL
2015-2016 Firewall NET - DESIGN
28
UPL
2015-2016 Summary NET - DESIGN
29
UPL
2015-2016 Review Questions NET - DESIGN
Naming
Use a structured model for addressing and
naming
Assign addresses and names hierarchically
Decide in advance
32
UPL
2015-2016 Advantages of Structured Models NET - DESIGN
33
UPL
2015-2016 Public IP Addresses NET - DESIGN
34
UPL
2015-2016 Regional Internet Registries (RIR) NET - DESIGN
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
Advantages:
Security. Private network numbers are not
advertised.
Flexibility. Easy to change to new ISP. 36
Save IP address resources.
UPL
2015-2016 The Two Parts of an IP Address NET - DESIGN
32 Bits
Prefix Host
Prefix Length
37
UPL NET - DESIGN
2015-2016
Designing Networks with Subnets
38
UPL Subnets NET - DESIGN
2015-2016
39
UPL Reasons for Using Subnets NET - DESIGN
2015-2016
40
UPL Subnet Masks NET - DESIGN
2015-2016
Subnetting
42
UPL
2015-2016 Classful IP Addressing NET - DESIGN
*Addresses starting with 127 are reserved for IP traffic local to a host.
43
UPL
2015-2016 Division of the Classful Address NET - DESIGN
Space
A 8 224-2 = 16,777,214
B 16 216-2 = 65,534
C 24 28-2 = 254
44
UPL
2015-2016 Classful IP is Wasteful NET - DESIGN
45
UPL
2015-2016 Classless Addressing NET - DESIGN
46
UPL Supernetting NET - DESIGN
2015-2016
172.16.0.0
172.17.0.0
172.18.0.0
Branch-Office Router
172.19.0.0
Enterprise Core
Branch-Office Networks Network
Names should be
–Short
–Meaningful
–Clear
–Distinct
–Case insensitive
Avoid names with unusual characters
–Hyphens, underscores, asterisks, and so on
48
UPL
2015-2016 Domain Name System (DNS) NET - DESIGN
49
UPL NET - DESIGN
2015-2016
Describe IPv6 Implementations and IPv6
to IPv4 Interactions
Enhancements available with IPv6:
Mobility and security
Simpler header
Address formatting
UPL
2015-2016 Summary NET - DESIGN
51
UPL
2015-2016 Review Questions NET - DESIGN
52
UPL NET - DESIGN
2015-2016
Switching
–Layer 2 transparent bridging (switching)
–Multilayer switching
–Spanning Tree Protocol enhancements
–VLAN technologies
Routing
–Static or dynamic
–Distance-vector and link-state protocols
–Interior and exterior
–Etc.
54
UPL
2015-2016 Selection Criteria for Switching NET - DESIGN
55
UPL
2015-2016 Example Decision Table NET - DESIGN
56
UPL NET - DESIGN
2015-2016
Transparent Bridging (Switching) Tasks
58
UPL NET - DESIGN
2015-2016
Protocols for Transporting VLAN Information
Switches need a method to make sure intra-
VLAN traffic goes to the correct interfaces.
IEEE 802.1Q
VLAN Trunk Protocol (VTP)
–VLAN management protocol
VLAN A VLAN A
Switch A Switch B
59
Station B1 Station B2 Station B3 Station B4 Station B5 Station B6
VLAN B VLAN B
UPL Routing vs. Bridging and Switching NET - DESIGN
2015-2016
Routing is operating at the Network Layer of the
OSI Model. Bridging and switching occur on the
Data Link Layer.
60
UPL
2015-2016 Selecting Routing Protocols NET - DESIGN
Protocols
Interior routing protocols are used within
one organization. The current lead Interior
Routing Protocol is OSPF. Other Interior
Protocols include IS-IS, RIP, and EIGRP.
Static routing
–Calculated beforehand, offline
Default routing
–“If I don’t recognize the destination, just send the packet to
Router X”
Cisco’s On-Demand Routing
–Routing for stub networks
–Uses Cisco Discovery Protocol (CDP)
Dynamic routing protocol
–Distance-vector algorithms
–Link-state algorithms
64
UPL
2015-2016 Distance-Vector Vs. Link-State NET - DESIGN
66
UPL
2015-2016 Dynamic IP Routing Protocols NET - DESIGN
Distance-Vector Link-State
Routing Information • Open Shortest Path First
Protocol (RIP) Version 1 and (OSPF)
2
• Intermediate System-to-
Interior Gateway Routing Intermediate System (IS-IS)
Protocol (IGRP)
Enhanced IGRP
Border Gateway Protocol
(BGP)
67
UPL NET - DESIGN
2015-2016
68
UPL Summary NET - DESIGN
2015-2016
69
UPL
2015-2016 Review Questions NET - DESIGN
70
UPL NET - DESIGN
2015-2016
73
UPL
2015-2016 Network Assets NET - DESIGN
Hardware
Software
Applications
Data
Intellectual property
Trade secrets
Company’s reputation
74
UPL
2015-2016 Security Risks NET - DESIGN
75
UPL
2015-2016 Security Tradeoffs NET - DESIGN
77
UPL
2015-2016 A Security Policy NET - DESIGN
A security policy is a
–“Formal statement of the rules by which people
who are given access to an organization’s
technology and information assets must abide.”
The policy should address
–Access, accountability, authentication, privacy, and
computer technology purchasing guidelines
78
UPL
2015-2016 Security Mechanisms NET - DESIGN
Physical security
Authentication
Authorization
Accounting (Auditing)
Data encryption
Packet filters
Firewalls
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
79
UPL
2015-2016 Modularizing Security Design NET - DESIGN
80
UPL
2015-2016 Modularizing Security Design NET - DESIGN
Physical security
Firewalls and packet filters
Audit logs, authentication, authorization
Well-defined exit and entry points
Routing protocols that support authentication
82
UPL
2015-2016 Securing Public Servers NET - DESIGN
85
UPL
2015-2016 Securing Server Farms NET - DESIGN
86
UPL
2015-2016 Securing User Services NET - DESIGN
87
UPL
2015-2016 Securing Wireless Networks NET - DESIGN
91
UPL NET - DESIGN
2015-2016
Extensible Authentication Protocol
(EAP)
With 802.1X and EAP, devices take on one of three roles:
–The supplicant resides on the wireless LAN client
–The authenticator resides on the access point
–An authentication server resides on a RADIUS server
92
UPL
2015-2016 EAP (Continued) NET - DESIGN
93
UPL
2015-2016 VPN Software on Wireless Clients NET - DESIGN
96
UPL NET - DESIGN
2015-2016
98
UPL
2015-2016 Network Management Design NET - DESIGN
99
UPL
2015-2016 Proactive Network Management NET - DESIGN
100
UPL
2015-2016 Network Management Processes NET - DESIGN
101
UPL
2015-2016 Fault Management NET - DESIGN
102
UPL
2015-2016 Configuration Management NET - DESIGN
103
UPL
2015-2016 Accounting Management NET - DESIGN
104
UPL
2015-2016 Performance Management NET - DESIGN
105
UPL
2015-2016 Security Management NET - DESIGN
106
UPL
2015-2016 Network Management Components NET - DESIGN
107
UPL
2015-2016 Network Management Architecture NET - DESIGN
NMS
Managed
108
Devices
UPL
2015-2016 Architecture Concerns NET - DESIGN
Protocol (SNMP)
Most popular network management protocol
SNMPv3 should gradually supplant versions 1 and 2 because it
offers better authentication
SNMP works with Management Information Bases (MIBs)
110
UPL
2015-2016 Remote Monitoring (RMON) NET - DESIGN
112
UPL Summary NET - DESIGN
2015-2016
113
UPL
2015-2016 Review Questions NET - DESIGN
114