Tải bản đầy đủ (.pdf) (476 trang)

Top down network design

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (3.25 MB, 476 trang )


Top-Down Network Design
Third Edition
Priscilla Oppenheimer
Priscilla Oppenheimer

Cisco Press
800 East 96th Street
Indianapolis, IN 46240


ii

Top-Down Network Design

Top-Down Network Design, Third Edition
Priscilla Oppenheimer
Copyright© 2011 Cisco Systems, Inc.
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage and retrieval
system, without written permission from the publisher, except for the inclusion of brief quotations in a
review.
Printed in the United States of America
First Printing August 2010
Library of Congress Cataloging-in-Publication data is on file.

ISBN-13: 978-1-58720-283-4


ISBN-10: 1-58720-283-2

Warning and Disclaimer
This book is designed to provide information about top-down network design. Every effort has been
made to make this book as complete and as accurate as possible, but no warranty or fitness is implied.
The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have
neither liability nor responsibility to any person or entity with respect to any loss or damages arising from
the information contained in this book or from the use of the discs or programs that may accompany it.
The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been appropriately
capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a
term in this book should not be regarded as affecting the validity of any trademark or service mark.


iii

Corporate and Government Sales
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:
U.S. Corporate and Government Sales 1-800-382-3419
For sales outside the United States please contact: International Sales



Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book
is crafted with care and precision, undergoing rigorous development that involves the unique expertise of
members from the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we

could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us
through email at Please make sure to include the book title and ISBN in your
message.
We greatly appreciate your assistance.
Publisher: Paul Boger

Manager, Global Certification: Erik Ullanderson

Associate Publisher: Dave Dusthimer

Business Operation Manager, Cisco Press: Anand Sundaram

Executive Editor: Mary Beth Ray

Technical Editors: Keith Nabozny, Joe Wilson

Managing Editor: Sandra Schroeder

Copy Editor: Bill McManus

Senior Development Editor: Christopher Cleveland

Book Designer: Louisa Adair

Senior Project Editor: Tonya Simpson

Proofreader: Apostrophe Editing Services

Editorial Assistant: Vanessa Evans
Composition: Mark Shirar

Indexer: Tim Wright


iv

Top-Down Network Design

About the Author
Priscilla Oppenheimer has been developing data communications and networking systems since 1980 when she earned her master’s degree in information science from the
University of Michigan. After many years as a software developer, she became a technical
instructor and training developer and has taught more than 3000 network engineers from
most of the Fortune 500 companies. Her employment at such companies as Apple
Computer, Network General, and Cisco gave her a chance to troubleshoot real-world network design problems and the opportunity to develop a practical methodology for enterprise network design. Priscilla was one of the developers of the Cisco Internetwork
Design course and the creator of the Designing Cisco Networks course. Priscilla teaches
network design, configuration, and troubleshooting around the world and practices what
she preaches in her network consulting business.

About the Technical Reviewers
Keith Nabozny is a technology consultant with HP, an adjunct professor at Macomb
Community College, and a graduate of Oakland University in Rochester, Michigan. He
has three Cisco professional certifications and is a Certified Information Systems
Security Professional (CISSP). Keith has supported large corporate clients for the past
14 years in operations, implementation, and engineering roles. He is currently supporting
the firewalls of a major manufacturer with locations around the world. Most recently he
taught network design and troubleshooting classes at Macomb Community College.
Keith and his family live in Southeast Michigan.
Joe Wilson, MSCS, PMC, CISSP No. 100304, is a senior network design engineer for
TelcoCapital Systems, LLC. TelcoCapital is a leading provider of Cisco Unified
Communications solutions for small and medium-sized enterprises. Joe is completing his
dissertation toward a PhD in information technology at Capella University (Minneapolis,

MN), with specializations in college teaching and IT security and assurance. Joe has
worked in information technology for the past 20 years and is a retired systems engineer
from The Boeing Company in Seattle, Washington, where he designed airborne NMS
solutions for commercial aircraft. While working for AT&T Broadband Network
Solutions as a broadband systems engineer, Joe designed commercial broadband networks using advanced communications technologies such as ATM, SONET, DWDM, and
Gigabit Ethernet. Joe has been a CISSP since 2006 and has distinguished himself as a
trusted partner in providing secure communications solutions and services to public and
private organizations. Joe teaches courses in the Cisco Networking Academy program at
DeVry University in Federal Way, Washington.


v

Dedication
To my parents, Dr. Stephen T. Worland, PhD, and Mrs. Roberta Worland, MS. They gave
me an appreciation for knowledge, logic, and analysis, and taught me that “where there’s a
will, there’s a way.”

Acknowledgments
I would like to thank Mary Beth Ray, executive editor at Cisco Press, for giving me the
opportunity to update this book and for marshaling the people and resources needed to
complete the project. I would especially like to thank Christopher Cleveland, Tonya
Simpson, and Bill McManus for their hard work on the book. I am also grateful for the
work of the technical editors, Keith Nabozny and Joe Wilson. In many ways, updating a
book is even harder than writing it in the first place, and I couldn’t have done it without
the help of Chris, Tonya, Bill, Keith, and Joe.
I also wish to thank the technical editors for the first two editions, Matthew Birkner,
Blair Buchanan, Dr. Peter Welcher, Dr. Alex Cannara, David Jansson, and Hank Mauldin.
Their terrific contributions are still evident in the third edition.
I would like to thank other networking professionals who have inspired me over the

years, including Joseph Bardwell and Anita Lenk from Connect802, Laura Chappell and
her terrific Wireshark University, Howard Berkowitz, Paul Borghese, John Neiberger,
Leigh Anne Chisholm, Marty Adkins, Matthias David Moore, Tom Lisa, Scott Vermillion,
and many more.
I am grateful for my colleagues and students in Ashland, Oregon, who have inspired and
entertained me, including Dr. Lynn Ackler, Jeff McJunkin, Andrew Krug, Brandon Kester,
Stephen Perkins, Daniel DeFreeze, Christina Kaiserman, Nicole Colbert, Corey Smith,
Stefan Hutchison, Jesse Williamson, Jonathan McCoy, Jennifer Comstock, Linda
Sturgeon, Kathleen Marrs, Vinnie Moscaritolo, Louis Kowolowski, and Robert Luaders
for his ideas regarding the design scenarios.
I’d like to thank Gary Rubin, Rob Stump, and Kip Peterson from Advanced Network
Information for the many opportunities they’ve given me over the years, in particular the
terrific opportunity to work at Cisco. To my colleagues at Cisco, Patrick Stark, our manager, Lisa Bacani, Walt Sacharok, Dax Mickelson, David Daverso, and Paul Azzi; you are
terrific!
Finally, I would like to thank Alan Oppenheimer, who throughout this project acted as my
technical advisor, therapist, chef, and best friend. I’m glad he doesn’t mind that it was
finally time to remove AppleTalk.


vi

Top-Down Network Design

Contents at a Glance
Introduction

xxii

Part I


Identifying Your Customer’s Needs and Goals

Chapter 1

Analyzing Business Goals and Constraints

Chapter 2

Analyzing Technical Goals and Tradeoffs

Chapter 3

Characterizing the Existing Internetwork

Chapter 4

Characterizing Network Traffic

Part II

Logical Network Design

117

Chapter 5

Designing a Network Topology

119


Chapter 6

Designing Models for Addressing and Numbering

Chapter 7

Selecting Switching and Routing Protocols

Chapter 8

Developing Network Security Strategies

Chapter 9

Developing Network Management Strategies

Part III

Physical Network Design

Chapter 10

Selecting Technologies and Devices for Campus Networks

Chapter 11

Selecting Technologies and Devices for Enterprise Networks

Part IV


Testing, Optimizing, and Documenting Your Network
Design 351

Chapter 12

Testing Your Network Design

Chapter 13

Optimizing Your Network Design

Chapter 14

Documenting Your Network Design
Glossary
Index

407

435

1

3
25
59

87

167


199
233
263

281

353
367
393

283
319


vii

Contents
Introduction

xxii

Part I

Identifying Your Customer’s Needs and Goals

Chapter 1

Analyzing Business Goals and Constraints


3

Using a Top-Down Network Design Methodology
Using a Structured Network Design Process
Systems Development Life Cycles

1

3

5

6

Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle
Analyzing Business Goals

8

Working with Your Client

8

Changes in Enterprise Networks

10

Networks Must Make Business Sense
Networks Offer a Service


10

11

The Need to Support Mobile Users

12

The Importance of Network Security and Resiliency
Typical Network Design Business Goals

13

Identifying the Scope of a Network Design Project
Identifying a Customer’s Network Applications
Analyzing Business Constraints
Politics and Policies

19

19

Budgetary and Staffing Constraints
Project Scheduling

21

Business Goals Checklist
Summary


22

23

Review Questions
Design Scenario
Chapter 2

20

23
24

Analyzing Technical Goals and Tradeoffs
Scalability

25

Planning for Expansion

26

Expanding Access to Data

26

Constraints on Scalability

27


Availability

27

Disaster Recovery

28

Specifying Availability Requirements

29

25

16

14

12

7


viii

Top-Down Network Design

Five Nines Availability

30


The Cost of Downtime

31

Mean Time Between Failure and Mean Time to Repair
Network Performance

32

Network Performance Definitions
Optimum Network Utilization
Throughput

33

34

35

Throughput of Internetworking Devices
Application Layer Throughput
Accuracy
Efficiency

37

38
39


Delay and Delay Variation
Causes of Delay

41

Delay Variation

43

Response Time
Security

40

44

44

Identifying Network Assets

45

Analyzing Security Risks

46

Reconnaissance Attacks

47


Denial-of-Service Attacks

48

Developing Security Requirements
Manageability
Usability

50
50

Affordability

51

Making Network Design Tradeoffs
Technical Goals Checklist

52

54

55

Review Questions
Design Scenario
Chapter 3

48


49

Adaptability

Summary

36

56
56

Characterizing the Existing Internetwork
Characterizing the Network Infrastructure
Developing a Network Map

59

59

60

Characterizing Large Internetworks

60

Characterizing the Logical Architecture
Developing a Modular Block Diagram

62
64


Characterizing Network Addressing and Naming

64

31


ix

Characterizing Wiring and Media

65

Checking Architectural and Environmental Constraints
Checking a Site for a Wireless Installation
Performing a Wireless Site Survey

69

70

Checking the Health of the Existing Internetwork

71

Developing a Baseline of Network Performance
Analyzing Network Availability

68


72

73

Analyzing Network Utilization

73

Measuring Bandwidth Utilization by Protocol
Analyzing Network Accuracy

75

76

Analyzing Errors on Switched Ethernet Networks
Analyzing Network Efficiency

77

79

Analyzing Delay and Response Time

80

Checking the Status of Major Routers, Switches, and Firewalls
Network Health Checklist
Summary


83

84

Review Questions

84

Hands-On Project

85

Design Scenario
Chapter 4

82

85

Characterizing Network Traffic
Characterizing Traffic Flow

87

87

Identifying Major Traffic Sources and Stores

87


Documenting Traffic Flow on the Existing Network

89

Characterizing Types of Traffic Flow for New Network Applications
Terminal/Host Traffic Flow
Client/Server Traffic Flow
Peer-to-Peer Traffic Flow

91
91

93

Server/Server Traffic Flow

94

Distributed Computing Traffic Flow

94

Traffic Flow in Voice over IP Networks

94

Documenting Traffic Flow for New and Existing Network
Applications 95
Characterizing Traffic Load


96

Calculating Theoretical Traffic Load

97

Documenting Application-Usage Patterns

99

Refining Estimates of Traffic Load Caused by Applications
Estimating Traffic Load Caused by Routing Protocols

101

99

90


x

Top-Down Network Design

Characterizing Traffic Behavior

101

Broadcast/Multicast Behavior

Network Efficiency
Frame Size

101

102

103

Windowing and Flow Control
Error-Recovery Mechanisms

103
104

Characterizing Quality of Service Requirements
ATM QoS Specifications

105

106

Constant Bit Rate Service Category

107

Real-time Variable Bit Rate Service Category

107


Non-real-time Variable Bit Rate Service Category
Unspecified Bit Rate Service Category
Available Bit Rate Service Category

107

108

108

Guaranteed Frame Rate Service Category

108

IETF Integrated Services Working Group QoS Specifications
Controlled-Load Service
Guaranteed Service

109

110

110

IETF Differentiated Services Working Group QoS Specifications
Grade of Service Requirements for Voice Applications
Documenting QoS Requirements
Network Traffic Checklist
Summary


Design Scenario

114
115

Summary for Part I

Chapter 5

114

114

Review Questions

Part II

113

115

Logical Network Design

117

Designing a Network Topology
Hierarchical Network Design

119


120

Why Use a Hierarchical Network Design Model?
Flat Versus Hierarchical Topologies
Flat WAN Topologies

122

Flat LAN Topologies

123

122

Mesh Versus Hierarchical-Mesh Topologies
Classic Three-Layer Hierarchical Model
Core Layer

127

Distribution Layer

127

125

124

121


112

111


xi

Access Layer

128

Guidelines for Hierarchical Network Design
Redundant Network Design Topologies
Backup Paths

131

Load Sharing

132

Modular Network Design

128

130

133

Cisco SAFE Security Reference Architecture


133

Designing a Campus Network Design Topology

135

Spanning Tree Protocol

135

Spanning Tree Cost Values

136

Rapid Spanning Tree Protocol

137

RSTP Convergence and Reconvergence
Selecting the Root Bridge

139

Scaling the Spanning Tree Protocol
Virtual LANs

140

141


Fundamental VLAN Designs
Wireless LANs

138

142

144

Positioning an Access Point for Maximum Coverage
WLANs and VLANs

146

Redundant Wireless Access Points

146

Redundancy and Load Sharing in Wired LANs
Server Redundancy

Workstation-to-Router Redundancy
Hot Standby Router Protocol

150

152

Gateway Load Balancing Protocol


153

Designing the Enterprise Edge Topology
Redundant WAN Segments
Circuit Diversity

153

153

154

Multihoming the Internet Connection
Virtual Private Networking
Site-to-Site VPNs

147

148

154

157

158

Remote-Access VPNs

159


Service Provider Edge

160

Secure Network Design Topologies
Planning for Physical Security

162
162

Meeting Security Goals with Firewall Topologies

162

145


xii

Top-Down Network Design

Summary

163

Review Questions
Design Scenario
Chapter 6


165
165

Designing Models for Addressing and Numbering
Guidelines for Assigning Network Layer Addresses

167

168

Using a Structured Model for Network Layer Addressing
Administering Addresses by a Central Authority
Distributing Authority for Addressing

170

Using Dynamic Addressing for End Systems
IP Dynamic Addressing

168

169

170

171

IP Version 6 Dynamic Addressing
Zero Configuration Networking


174
175

Using Private Addresses in an IP Environment
Caveats with Private Addressing
Network Address Translation

175

177

177

Using a Hierarchical Model for Assigning Addresses

178

Why Use a Hierarchical Model for Addressing and Routing?
Hierarchical Routing

179

Classless Interdomain Routing

179

Classless Routing Versus Classful Routing
Route Summarization (Aggregation)
Route Summarization Example
Route Summarization Tips

Discontiguous Subnets
Mobile Hosts

180

181

182

183

183

184

Variable-Length Subnet Masking

185

Hierarchy in IP Version 6 Addresses
Link-Local Addresses

186

187

Global Unicast Addresses

188


IPv6 Addresses with Embedded IPv4 Addresses
Designing a Model for Naming

189

Distributing Authority for Naming
Guidelines for Assigning Names

190

191

Assigning Names in a NetBIOS Environment
Assigning Names in an IP Environment
The Domain Name System

193

193

192

189

178


xiii

Dynamic DNS Names


194

IPv6 Name Resolution

195

Summary

195

Review Questions
Design Scenario
Chapter 7

196
197

Selecting Switching and Routing Protocols

199

Making Decisions as Part of the Top-Down Network Design Process
Selecting Switching Protocols

201

Switching and the OSI Layers
Transparent Bridging


202

202

Selecting Spanning Tree Protocol Enhancements
PortFast

203

204

UplinkFast and BackboneFast

204

Unidirectional Link Detection

205

LoopGuard

206

Protocols for Transporting VLAN Information
IEEE 802.1Q

207

207


Dynamic Trunk Protocol

208

VLAN Trunking Protocol

208

Selecting Routing Protocols

209

Characterizing Routing Protocols

209

Distance-Vector Routing Protocols
Link-State Routing Protocols
Routing Protocol Metrics

210

212

214

Hierarchical Versus Nonhierarchical Routing Protocols
Interior Versus Exterior Routing Protocols

214


Classful Versus Classless Routing Protocols

214

Dynamic Versus Static and Default Routing

215

On-Demand Routing

216

Scalability Constraints for Routing Protocols
Routing Protocol Convergence
IP Routing

216

217

218

Routing Information Protocol

218

Enhanced Interior Gateway Routing Protocol
Open Shortest Path First


Intermediate System-to-Intermediate System
Border Gateway Protocol

219

221
225

224

214

200


xiv

Top-Down Network Design

Using Multiple Routing Protocols in an Internetwork

225

Routing Protocols and the Hierarchical Design Model
Redistribution Between Routing Protocols
Integrated Routing and Bridging
A Summary of Routing Protocols
Summary

227


229

230

231

Review Questions
Design Scenario
Chapter 8

231
232

Developing Network Security Strategies
Network Security Design

233

233

Identifying Network Assets
Analyzing Security Risks

234
234

Analyzing Security Requirements and Tradeoffs
Developing a Security Plan


236

Components of a Security Policy
Developing Security Procedures
Maintaining Security
Security Mechanisms

Authorization

237

237

238
239

239

Accounting (Auditing)
Data Encryption

240

240

Public/Private Key Encryption
Packet Filters

237


238

Physical Security
Authentication

235

235

Developing a Security Policy

Firewalls

226

241

243

244

Intrusion Detection and Prevention Systems
Modularizing Security Design

245

Securing Internet Connections
Securing Public Servers

245


246

Securing E-Commerce Servers

247

Securing Remote-Access and VPNs

248

Securing Remote-Access Technologies
Securing VPNs

244

248

249

Securing Network Services and Network Management
Securing Server Farms

251

250


xv


Securing User Services

252

Securing Wireless Networks

253

Authentication in Wireless Networks
Data Privacy in Wireless Networks
Summary

258

261

Review Questions
Design Scenario
Chapter 9

254

261
262

Developing Network Management Strategies
Network Management Design

263


Proactive Network Management

264

Network Management Processes

264

Fault Management

263

265

Configuration Management
Accounting Management

266

266

Performance Management
Security Management

266

268

Network Management Architectures


269

In-Band Versus Out-of-Band Monitoring

270

Centralized Versus Distributed Monitoring

270

Selecting Network Management Tools and Protocols
Selecting Tools for Network Management
Simple Network Management Protocol
Management Information Bases (MIB)
Remote Monitoring (RMON)
Cisco Discovery Protocol

271

271

271
272

273

274

Cisco NetFlow Accounting


276

Estimating Network Traffic Caused by Network Management
Summary

276

277

Review Questions
Design Scenario

278
278

Summary for Part II

279

Part III

Physical Network Design

Chapter 10

Selecting Technologies and Devices for Campus Networks
LAN Cabling Plant Design
Cabling Topologies

281


284

284

Building-Cabling Topologies

285

283


xvi

Top-Down Network Design

Campus-Cabling Topologies
Types of Cables

285

LAN Technologies

289

Ethernet Basics

290

Ethernet and IEEE 802.3


285

290

Ethernet Technology Choices

291

Half-Duplex and Full-Duplex Ethernet
100-Mbps Ethernet
Gigabit Ethernet

292

292

293

10-Gbps Ethernet

295

Selecting Internetworking Devices for a Campus Network Design
Criteria for Selecting Campus Internetworking Devices

300

Optimization Features on Campus Internetworking Devices
Example of a Campus Network Design


299

302

303

Background Information for the Campus Network Design Project
Business Goals
Technical Goals

304
304

Network Applications
User Communities

305

306

Data Stores (Servers)

307

Current Network at WVCC

307

Traffic Characteristics of Network Applications

Summary of Traffic Flows

310

311

Performance Characteristics of the Current Network
Network Redesign for WVCC

312

313

Optimized IP Addressing and Routing for the Campus Backbone
Wireless Network

Design Scenario

317
317

Selecting Technologies and Devices for Enterprise Networks
Remote-Access Technologies
PPP

315

316

Review Questions


Chapter 11

313

314

Improved Performance and Security for the Edge of the Network
Summary

303

320

321

Multilink PPP and Multichassis Multilink PPP

321

Password Authentication Protocol and Challenge Handshake
Authentication Protocol 322

319


xvii

Cable Modem Remote Access


323

Challenges Associated with Cable Modem Systems
Digital Subscriber Line Remote Access
Other DSL Implementations
PPP and ADSL

324

325

326

326

Selecting Remote-Access Devices for an Enterprise
Network Design 327
Selecting Devices for Remote Users

327

Selecting Devices for the Central Site
WAN Technologies

328

328

Systems for Provisioning WAN Bandwidth
Leased Lines


330

Synchronous Optical Network
Frame Relay

329

331

332

Frame Relay Hub-and-Spoke Topologies and Subinterfaces
Frame Relay Congestion Control Mechanisms
Frame Relay Traffic Control

335

Frame Relay/ATM Interworking
ATM

335

336

337

Ethernet over ATM
Metro Ethernet


337

338

Selecting Routers for an Enterprise WAN Design
Selecting a WAN Service Provider
Example of a WAN Design

339

340

341

Background Information for the WAN Design Project
Business and Technical Goals
Network Applications
User Communities

343

Data Stores (Servers)
Current Network

342

343
344

344


Traffic Characteristics of the Existing WAN
WAN Design for Klamath Paper Products
Summary

348

Review Questions
Design Scenario

349
349

Summary for Part III

350

345
346

341

333


xviii

Top-Down Network Design

Part IV

Chapter 12

Testing, Optimizing, and Documenting Your Network Design
Testing Your Network Design
Using Industry Tests

353

354

Building and Testing a Prototype Network System

355

Determining the Scope of a Prototype System

355

Testing a Prototype on a Production Network

356

Writing and Implementing a Test Plan for Your Network Design
Developing Test Objectives and Acceptance Criteria
Determining the Types of Tests to Run
Writing Test Scripts

358

Implementing the Test Plan


361

361

Tools for Testing a Network Design

362

362

Examples of Network Testing Tools

363

CiscoWorks Internetwork Performance Monitor
WANDL Network Planning and Analysis Tools
OPNET Technologies

364

365

NetPredict’s NetPredictor

365

365

366


Review Questions
Design Scenario
Chapter 13

364

364

NetIQ Voice and Video Management Solution
Summary

359

360

Documenting the Project Timeline

Ixia Tools

357

357

Documenting Network Equipment and Other Resources

Types of Tools

351


366
366

Optimizing Your Network Design

367

Optimizing Bandwidth Usage with IP Multicast Technologies
IP Multicast Addressing

369

Internet Group Management Protocol
Multicast Routing Protocols

370

370

Distance Vector Multicast Routing Protocol
Protocol Independent Multicast
Reducing Serialization Delay

371

371

372

Link-Layer Fragmentation and Interleaving


373

Compressed Real-Time Transport Protocol

374

368


xix

Optimizing Network Performance to Meet Quality of Service
Requirements 374
IP Precedence and Type of Service
IP Differentiated Services Field
Resource Reservation Protocol

375
376

377

Common Open Policy Service Protocol
Classifying LAN Traffic

379

379


Cisco IOS Features for Optimizing Network Performance
Switching Techniques

380

Classic Methods for Layer 3 Packet Switching
NetFlow Switching

Cisco Express Forwarding
Queuing Services

382

383

First-In, First-Out Queuing
Priority Queuing

384

Custom Queuing

384

Weighted Fair Queuing

383

385


Class-Based Weighted Fair Queuing
Low-Latency Queuing

388

Weighted Random Early Detection
389

389

Review Questions
Design Scenario
Chapter 14

388

389

Committed Access Rate
Summary

386

387

Random Early Detection
Traffic Shaping

381


382

390
391

Documenting Your Network Design

393

Responding to a Customer’s Request for Proposal
Contents of a Network Design Document
Executive Summary
Project Goal

395

396

396

Project Scope

396

Design Requirements
Business Goals

397

Technical Goals


398

397

User Communities and Data Stores

399

394

380


xx

Top-Down Network Design

Network Applications

399

Current State of the Network
Logical Design

399

400

Physical Design


400

Results of Network Design Testing
Implementation Plan
Project Schedule
Project Budget

401

402
403

Return on Investment

403

Design Document Appendix
Summary

404

Review Questions
Design Scenario

Glossary
Index

407


435

405
405

404

401


xxi

Icons Used in This Book

Communication
Server

Terminal

PC

PC with
Software

File
Server

Gateway

Catalyst

Switch

Network Cloud

Sun
Workstation

Web
Server

Router

Cisco Works
Workstation

Bridge

Multilayer
Switch

Line: Ethernet

Hub

Macintosh

Access
Server

Modem


Printer

DSU/CSU
DSU/CSU

ATM
Switch

Laptop

Line: Serial

IBM
Mainframe

Command Syntax Conventions
The conventions used to present command syntax in this book are the same conventions
used in the Cisco IOS Command Reference. The Command Reference describes these
conventions as follows:


Boldface indicates commands and keywords that are entered literally as shown. In
actual configuration examples and output (not general command syntax), boldface
indicates commands that are manually input by the user (such as a show command).



Italic indicates arguments for which you supply actual values.




Vertical bars (|) separate alternative, mutually exclusive elements.



Square brackets ([ ]) indicate an optional element.



Braces ({ }) indicate a required choice.



Braces within brackets ([{ }]) indicate a required choice within an optional element.


xxii

Top-Down Network Design

Introduction
New business practices are driving changes in enterprise networks. The transition from an
industrial to an information economy has changed how employees do their jobs, and the
emergence of a global economy of unprecedented competitiveness has accelerated the
speed at which companies must adapt to technological and financial changes.
To reduce the time to develop and market products, companies are empowering employees to make strategic decisions that require access to sales, marketing, financial, and engineering data. Employees at corporate headquarters and in worldwide field offices, and
telecommuters in home offices, need immediate access to data, regardless of whether the
data is on centralized or departmental servers.
To develop, sell, and distribute products into domestic and foreign markets, businesses

are forming alliances with local and international partners. Businesses are carefully planning their network designs to meet security goals while also offering network access to
resellers, vendors, customers, prospective customers, and contract workers located all
over the world.
To accommodate increasing requirements for remote access, security, bandwidth, scalability, and reliability, vendors and standards bodies introduce new protocols and technologies at a rapid rate. Network designers are challenged to develop state-of-the-art networks
even though the state of the art is continually changing.
Whether you are a novice network designer or a seasoned network architect, you probably have concerns about how to design a network that can keep pace with the accelerating changes in the internetworking industry. The goal of this book is to teach a systematic
design methodology that can help you meet an organization’s requirements, regardless of
the newness or complexity of applications and technologies.

Objectives
The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is
another department within your own company or an external client, this book provides
you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped
to design enterprise networks that meet a customer’s requirements for functionality,
capacity, performance, availability, scalability, affordability, security, and manageability.

Audience
This book is for you if you are an internetworking professional responsible for designing
and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and


xxiii

technologies, this book will provide you with practical advice on applying your knowledge to internetwork design.
This book also includes useful information for consultants, systems engineers, and sales
engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a topdown, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process.
Finally, this book is useful for undergraduate and graduate students in computer science
and information technology disciplines. Students who have taken one or two courses in
networking theory will find Top-Down Network Design, Third Edition, an approachable
introduction to the engineering and business issues related to developing real-world networks that solve typical business problems.


Changes for the Third Edition
Networks have changed in many ways since the second edition was published. Many
legacy technologies have disappeared and are no longer covered in the book. In addition,
modern networks have become multifaceted, providing support for numerous bandwidthhungry applications and a variety of devices, ranging from smart phones to tablet PCs to
high-end servers.
Modern users expect the network to be available all the time, from any device, and to let
them securely collaborate with coworkers, friends, and family. Networks today support
voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual
reality, and applications that we can’t even imagine that brilliant college students are busily
creating in their dorm rooms.
As applications rapidly change and put more demand on networks, the need to teach a
systematic approach to network design is even more important than ever. With that need
in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each
chapter to help students learn top-down network design.
To address new demands on modern networks, the third edition of Top-Down Network
Design also has updated material on the following topics:


Network redundancy



Modularity in network designs



The Cisco SAFE security reference architecture




The Rapid Spanning Tree Protocol (RSTP)



Internet Protocol version 6 (IPv6)



Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet



Network design and management tools


xxiv

Top-Down Network Design

Organization
This book is built around the steps for top-down network design. It is organized into four
parts that correspond to the major phases of network design.

Part I: Identifying Your Customer’s Needs and Goals
Part I covers the requirements-analysis phase. This phase starts with identifying business
goals and technical requirements. The task of characterizing the existing network, including the architecture and performance of major network segments and devices, follows.
The last step in this phase is to analyze network traffic, including traffic flow and load,
protocol behavior, and quality of service (QoS) requirements.


Part II: Logical Network Design
During the logical network design phase, the network designer develops a network topology. Depending on the size of the network and traffic characteristics, the topology can
range from simple to complex, requiring hierarchy and modularity. During this phase, the
network designer also devises a network layer addressing model and selects switching
and routing protocols. Logical design also includes security planning, network management design, and the initial investigation into which service providers can meet WAN and
remote-access requirements.

Part III: Physical Network Design
During the physical design phase, specific technologies and products that realize the logical design are selected. Physical network design starts with the selection of technologies
and devices for campus networks, including cabling, Ethernet switches, wireless access
points, wireless bridges, and routers. Selecting technologies and devices for remoteaccess and WAN needs follows. Also, the investigation into service providers, which
began during the logical design phase, must be completed during this phase.

Part IV: Testing, Optimizing, and Documenting Your Network Design
The final steps in top-down network design are to write and implement a test plan, build
a prototype or pilot, optimize the network design, and document your work with a network design proposal. If your test results indicate any performance problems, during this
phase you should update your design to include such optimization features as traffic
shaping and advanced router queuing and switching mechanisms. A glossary of networking terms concludes the book.

Companion Website
Top-Down Network Design, Third Edition, has a companion website at
www.topdownbook.com. The companion website includes updates to the book,
links to white papers, and supplemental information about design resources.


Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×