Example of A Campus Network Design: From Top-Down Network Design by Priscilla Oppenheimer
Example of A Campus Network Design: From Top-Down Network Design by Priscilla Oppenheimer
NETWORK DESIGN
FROM TOP-DOWN NETWORK DESIGN BY PRISCILLA OPPENHEIMER
EXAMPLE OF A CAMPUS NETWORK
DESIGN
Background information
Business Goals
Technical Goals
Network Applications
User Communities and Servers
Current Network
Traffic Characteristics of Network Applications
Summary of Traffic Flows
Performance Characteristics
Network Redesign
2
BACKGROUND INFORMATION
3
BUSINESS GOALS
Increase the enrollment from 600 to 1000 students
in the next 3 years.
Reduce the attrition rate from 30 to 15 percent in
the next 3 years.
Improve faculty efficiency and allow faculty to
participate in more research projects with
colleagues at other colleges.
Improve student efficiency and eliminate problems
with homework submission.
4
BUSINESS GOALS (CONT.)
9
USER COMMUNITIES (CONT.)
10
SERVERS
11
SERVERS (CONT.)
12
CURRENT NETWORK
(left) whole campus architecture – (right) building architecture
13
CURRENT NETWORK – FEATURES
The network uses switched Ethernet. A high-end switch in each building is redundantly
connected to two high-end switches in the Computing Center.
Within each building, a 24- or 48-port Ethernet switch on each floor connects end user
systems.
The switches run the IEEE 802.1D Spanning Tree Protocol.
The switches support SNMP and RMON. A Windows-based network management
software package monitors the switches. The software runs on a server in the server farm
module of the network design.
All devices are part of the same broadcast domain. All devices (except two public
servers) are part of the 192.168.1.0 subnet using a subnet mask of 255.255.255.0.
Addressing for end-user PCs and Macs is accomplished with DHCP. A Windows server in
the server farm acts as the DHCP server.
The email and web servers use public addresses that the state community college network
system assigned to the college. The system also provides a DNS server that the college
uses.
The router acts as a firewall using packet filtering. The router also implements NAT. The
router has a default route to the Internet and does not run a routing protocol. The WAN
link to the Internet is a 1.544-Mbps T1 link.
14
CURRENT NETWORK – PHYSICAL
FEATURES
Buildings are connected via full-duplex 100BASE-FX Ethernet (fiber
optic).
Within buildings, 100-Mbps Ethernet switches are used.
Every building is equipped with Category 5e cabling and wallplates
in the various offices, classrooms, and labs.
The router in the Computing Center supports two 100BASE-TX ports
and one T1 port with a built-in CSU/DSU unit. The router has a
redundant power supply.
A centralized (star) physical topology is used for the campus cabling.
Underground cable conduits hold multimode fiber-optic cabling. The
cabling is off-the-shelf cabling that consists of 30 strands of fiber with
a 62.5-micron core and 125-micron cladding, protected by a plastic
sheath suitable for outdoor wear and tear.
15
TRAFFIC CHARACTERISTICS OF NETWORK
APPLICATIONS
Homework, email, web research, library card catalog, and college
management system applications have nominal bandwidth requirements
and are not delay sensitive.
The other applications, however, use a significant amount of bandwidth,
in particular a high percentage of the WAN bandwidth to the Internet.
The distance-learning application is also delay sensitive.
Weather-modeling and telescope-monitoring, graphics uploads limited
bandwidth to Internet.
Distance-learning is one-way streaming and now is point-to-point
service with 56-Kbps bandwidth. Should support IP multicast and allow
more than 10 connections at time.
16
SUMMARY OF TRAFFIC FLOWS
Computing Center
Router To Internet
17
PERFORMANCE CHARACTERISTICS
The bandwidth on the Ethernet campus network is lightly used
Three Major problems:
The IP addressing scheme supports just one IP subnet with /24 mask
Only 254 addresses are allowed
19
OPTIMIZED IP ADDRESSING AND
ROUTING FOR THE CAMPUS BACKBONE
Server farm: 192.168.1.1–192.168.1.254
Library: 192.168.2.1–192.168.2.254
Computing Center: 192.168.3.1–192.168.3.254
Administration: 192.168.4.1–192.168.4.254
Business and Social Sciences: 192.168.5.1–192.168.5.254
Math and Sciences: 192.168.6.1–192.168.6.254
Arts and Humanities: 192.168.7.1–192.168.7.254
Users of the secure, private wireless network: 192.168.8.1–192.168.8.254 (This is a campus wide
subnet that spans all buildings and outside grounds.)
Users of the open, public wireless network: 192.168.9.1–192.168.9.254 (This is a campus wide
subnet that spans all buildings and outside grounds.)
The email and web servers use public addresses that the state community college network system
assigned to the college.
Using Layer 3 (OSPF) protocol instead of Layer 2 (STP), because it is not proprietary, converges quickly,
supports load sharing, and is moderately easy to configure and troubleshoot.
20
WIRELESS NETWORK
Private and Public Wireless – 2 access points in each building
Different channels
The access points support IEEE 802.11n and each provides a nominal bandwidth of 600
Mbps.
21
IMPROVED PERFORMANCE AND SECURITY
FOR THE EDGE OF THE NETWORK
Break apart the network functions of security and traffic forwarding.
Simpler list of access filters that provide initial protection from
intruders, removed NAT with a dedicated firewall between the router
and the campus network. The firewall provides security and NAT.
Four interfaces on the firewall: The outside interface will connect the
Internet router; two inside interfaces will connect the campus network;
and the demilitarized zone (DMZ) interface will connect the email and
web servers.
WAN link was replaced with a 10-Mbps Metro Ethernet link. (Single-
mode-fiber-optic-link)
22
ENHANCED NETWORK DESIGN
23
TOP-DOWN NETWORK DESIGN STEPS
Step 1. Analyze requirements, including both business and technical goals,
and any “workplace politics” that are relevant to technology choices.
Step 2. Characterize the existing network.
Step 3. Identify network applications and analyze bandwidth and QoS
requirements for the applications.
Step 4. Analyze traffic flows.
Step 5. Choose a logical topology.
Step 6. Select building access technologies.
Step 7. Select campus-backbone technologies.
Step 8. Select Internet connectivity technologies.
Step 9. Select security solutions.
24