0% found this document useful (0 votes)
33 views18 pages

Chapter Two-2

Chapter two

Uploaded by

meti bekele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views18 pages

Chapter Two-2

Chapter two

Uploaded by

meti bekele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Network Design (ITec4114)

Chapter Two: Structuring and


Modularizing Network
Network Hierarchy
Designing the network hierarchy
• The hierarchical network model provides a modular view of a network, making it easier to
design and build a network.
• The hierarchical network design model consists of three layers:
• The access layer provides local and remote workgroup or user access to the network.
• The distribution layer provides policy-based connectivity.
• The core (or backbone) layer provides high-speed transport to satisfy the connectivity
and transport needs of the distribution layer devices.
• Each hierarchical layer focuses on specific functions, thereby allowing the network
designer to choose the right systems and features based on their function within the model.
• This approach helps provide more accurate capacity planning and minimize total costs.
Cont…
Access Layer
• This level provides local or remote workgroup or user access to the network
• It represents the edge of the network where end devices connect.
• It grants users access to network resources
• Commonly built using Layer 2 switching technology
• VLANs may be defined at this layer
• Multilayer switching in the campus access layer: Optimally satisfies the needs of a
particular user through routing, filtering, authentication, security, or quality of service.
Cont…
Cont…
• Improving the manageability of the access layer is a major concern for the
network designer.
• Following good design principles improves the manageability and ongoing
support of the network by:
• Ensuring that the network does not become too complex.
• Allowing easy troubleshooting when a problem occurs.
• Making it easier to add new features and services in the future.
• The primary concerns when designing the access layer of a campus
infrastructure is the physical location of the equipment.
Distribution Layer
• The distribution layer represents a routing boundary between the access
layer and the core layer. It also serves as a connection point between remote
sites and the core layer.
• They built using Layer 3 device i.e. Router or multilayer switches.
• At the distribution level policy based connectivity issues such as security,
traffic loading, and routing occur.
• Distribution layer devices used to manage queues and prioritize traffic
before transmission through the campus core.
• In a small network the access and distribution layers are combined, and
there is no core layer.
Cont…
Distribution Layer design consideration
• Redundant cabling and devices can be configured to limit the effects of a
link or device failure.
• To reduce downtime, the network designer deploys redundancy in the
network.
• Network designer take account to limit access and to prevent unwanted
traffic from entering the core network using ACL (Access Control List) at
this layer.
Core Layer
• The core layer is sometimes called the network backbone.
• Routers and switches at the core layer provide high-speed connectivity.
• In an enterprise LAN, the core layer, may connect multiple buildings or
multiple sites, and may provide connectivity to the server farm.
• Implementing a core layer reduces the complexity of the network, making it
easier to manage and troubleshoot.
Cont…
Core Layer Design Consideration
• The designer must ensure that the core layer is designed with fault tolerance,
especially because all users in the network can be affected by a failure.
• The ability to avoid unnecessary delays in network traffic quickly becomes a
top priority for the network designer.
• Implementing redundant links at the core layer ensures that network devices
can find alternate paths to send data in the event of a failure.
• Core layer networks are wired in either partial or full mesh topology. This
topology provides enough redundant paths to ensure that the network can
survive a link failure.
Core Layer Technologies
• Technologies used at the core layer include the following:
• Routers or multilayer switches that combine routing and switching in the same
device
• Redundancy and load balancing
• High-speed and aggregate links
• Routing protocols that scale well and converge quickly, such as Enhanced Interior
• Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) Protocol
Cont…
Q. Let assume you are a network designer how to prevent failure at core layer?
• The network designer must strive to provide a network that is resistant to failures and
that can recover quickly in the event of a failure. Some of them are:
• Core routers and switches can contain dual power supplies and fans
• Install generators and large uninterruptible power supply (UPS) devices.
• Never make a configuration change on a production network without first testing it in a lab
environment!
• The following figure shows the percentages
of common network outages
Using a modular approaches in Network Design
• The Cisco Enterprise Architecture comprises the following six major functional areas
(also called Modules):
• Enterprise Campus
• Enterprise Edge
• Service Provider
• Enterprise Branch
• Enterprise Data Centre
• Enterprise Teleworker
Cont…
• The enterprise campus infrastructure module includes the campus infrastructure
module and the server farm module.
• The enterprise edge modules include the e-commerce module, the Internet connectivity
module, the remote access and VPN module, and the WAN and MAN and site-to-site
modules. The Cisco Enterprise WAN and MAN and Site-to-Site VPN module is part of
the Enterprise Edge. The Cisco Enterprise Edge Architecture offers connectivity to voice,
video, and data services outside the enterprise. This module enables the enterprise to use
Internet and partner resources, and provide resources for its customers. QoS, service
levels, and security are the main issues in the Enterprise Edge.
• The remote enterprise modules include the remote branches, data centers, and
teleworkers.
Cont…
Cont…
• This modular approach has significant benefits including
• The network is easy to scale
• The problem domain can be more easily isolated
• It creates logical interconnection points where protocols changes can occur
• Failure in any component isolates the devices affected

You might also like