We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18
Network Design (ITec4114)
Chapter Two: Structuring and
Modularizing Network Network Hierarchy Designing the network hierarchy • The hierarchical network model provides a modular view of a network, making it easier to design and build a network. • The hierarchical network design model consists of three layers: • The access layer provides local and remote workgroup or user access to the network. • The distribution layer provides policy-based connectivity. • The core (or backbone) layer provides high-speed transport to satisfy the connectivity and transport needs of the distribution layer devices. • Each hierarchical layer focuses on specific functions, thereby allowing the network designer to choose the right systems and features based on their function within the model. • This approach helps provide more accurate capacity planning and minimize total costs. Cont… Access Layer • This level provides local or remote workgroup or user access to the network • It represents the edge of the network where end devices connect. • It grants users access to network resources • Commonly built using Layer 2 switching technology • VLANs may be defined at this layer • Multilayer switching in the campus access layer: Optimally satisfies the needs of a particular user through routing, filtering, authentication, security, or quality of service. Cont… Cont… • Improving the manageability of the access layer is a major concern for the network designer. • Following good design principles improves the manageability and ongoing support of the network by: • Ensuring that the network does not become too complex. • Allowing easy troubleshooting when a problem occurs. • Making it easier to add new features and services in the future. • The primary concerns when designing the access layer of a campus infrastructure is the physical location of the equipment. Distribution Layer • The distribution layer represents a routing boundary between the access layer and the core layer. It also serves as a connection point between remote sites and the core layer. • They built using Layer 3 device i.e. Router or multilayer switches. • At the distribution level policy based connectivity issues such as security, traffic loading, and routing occur. • Distribution layer devices used to manage queues and prioritize traffic before transmission through the campus core. • In a small network the access and distribution layers are combined, and there is no core layer. Cont… Distribution Layer design consideration • Redundant cabling and devices can be configured to limit the effects of a link or device failure. • To reduce downtime, the network designer deploys redundancy in the network. • Network designer take account to limit access and to prevent unwanted traffic from entering the core network using ACL (Access Control List) at this layer. Core Layer • The core layer is sometimes called the network backbone. • Routers and switches at the core layer provide high-speed connectivity. • In an enterprise LAN, the core layer, may connect multiple buildings or multiple sites, and may provide connectivity to the server farm. • Implementing a core layer reduces the complexity of the network, making it easier to manage and troubleshoot. Cont… Core Layer Design Consideration • The designer must ensure that the core layer is designed with fault tolerance, especially because all users in the network can be affected by a failure. • The ability to avoid unnecessary delays in network traffic quickly becomes a top priority for the network designer. • Implementing redundant links at the core layer ensures that network devices can find alternate paths to send data in the event of a failure. • Core layer networks are wired in either partial or full mesh topology. This topology provides enough redundant paths to ensure that the network can survive a link failure. Core Layer Technologies • Technologies used at the core layer include the following: • Routers or multilayer switches that combine routing and switching in the same device • Redundancy and load balancing • High-speed and aggregate links • Routing protocols that scale well and converge quickly, such as Enhanced Interior • Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) Protocol Cont… Q. Let assume you are a network designer how to prevent failure at core layer? • The network designer must strive to provide a network that is resistant to failures and that can recover quickly in the event of a failure. Some of them are: • Core routers and switches can contain dual power supplies and fans • Install generators and large uninterruptible power supply (UPS) devices. • Never make a configuration change on a production network without first testing it in a lab environment! • The following figure shows the percentages of common network outages Using a modular approaches in Network Design • The Cisco Enterprise Architecture comprises the following six major functional areas (also called Modules): • Enterprise Campus • Enterprise Edge • Service Provider • Enterprise Branch • Enterprise Data Centre • Enterprise Teleworker Cont… • The enterprise campus infrastructure module includes the campus infrastructure module and the server farm module. • The enterprise edge modules include the e-commerce module, the Internet connectivity module, the remote access and VPN module, and the WAN and MAN and site-to-site modules. The Cisco Enterprise WAN and MAN and Site-to-Site VPN module is part of the Enterprise Edge. The Cisco Enterprise Edge Architecture offers connectivity to voice, video, and data services outside the enterprise. This module enables the enterprise to use Internet and partner resources, and provide resources for its customers. QoS, service levels, and security are the main issues in the Enterprise Edge. • The remote enterprise modules include the remote branches, data centers, and teleworkers. Cont… Cont… • This modular approach has significant benefits including • The network is easy to scale • The problem domain can be more easily isolated • It creates logical interconnection points where protocols changes can occur • Failure in any component isolates the devices affected