Module 4: Designing Routing and Switching Requirements.

Slides:



Advertisements
Similar presentations
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Advertisements

v3.1 CIS151 Module 2 JEOPARDY K. MartinG. Valencia.
OSI Model Overview Application (Upper) Layers Session Presentation Application.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
1 Chapter 8 Local Area Networks - Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Local Area Networks Part II. 2 Introduction Many times it is necessary to connect a local area network to another local area network or to a wide area.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Networking Components
OSI Model Routing Connection-oriented/Connectionless Network Services.
Module 3: Planning and Troubleshooting Routing and Switching.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 1 Overview Review Overview of demonstration network
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Chapter 8 Local Area Networks: Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
Module 2: Planning and Optimizing a TCP/IP Physical and Logical Network.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Company LOGO Networking Components Hysen Tmava LTEC 4550.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Networks and Protocols CE Week 2a. Network hardware.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Security fundamentals Topic 10 Securing the network perimeter.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Data Communications & Computer Networks, Second Edition1 Chapter 8 Local Area Networks: Internetworking.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
NETWORK DEVICES Department of CE/IT.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Defining Network Infrastructure and Network Security Lesson 8.
Virtual Private Network
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Connecting Network Components
Networking Devices.
Local Area Networks Yiannos Mylonas.
Chapter 3 Computer Networking Hardware
Planning and Troubleshooting Routing and Switching
Virtual Private Network (VPN)
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
COMMON LAYER 2 DEVICES AND FUNCTIONALITIES.
Presentation transcript:

Module 4: Designing Routing and Switching Requirements

Connectivity Requirements Branch Office Corporate Headquarters Web Server Internet Server LAN Remote User VPN Wireless User Locally Remotely Across the Internet Evaluate how users connect

Types of Network Devices DeviceOSI layerDefinition Hub Physical (layer 1) Extends the network by retransmitting the signal Does not process the data Switch Data-link (layer 2) Forwards frames according to the destination MAC address Supports simultaneous conversations without collisions Router Network (layer 3) Used to link WANs and dissimilar LANs Sends packets based on logical addressing Layer 3 switch Network (layers 2 and 3) Is a limited-purpose hardware-based IP router with bridging capabilities Also performs layer 2 switching

Reasons for Using Routers Use routers to: Isolate networks from each other Provide a start for a secure network implementation Traditional uses of routers Connecting WANs Segmenting LANs

Internet Security and Acceleration for Internet Connectivity Intranet ISA Server maps to ISA has additional features over NAT: Application traffic monitoring Internet content caching User-based control

Strategies for Designing Firewalls Bastion host Web Server LAN Multi-homed firewall LAN Web Server Back-to-back firewall Web Server LAN Internet

Strategies for Designing Extranet OptionDescription VPN Encrypted communication over the Internet Dial-up Computer communication over phone lines Secure Web server Authenticated access to a Web server RPC over HTTP RPC communication tunnelled in HTTP for an application Terminal services Remote access to an application ADFS Active Directory authentication for Web applications

Determining Connection Methods Connection methodUse when: Leased lines Security is important Speed and reliability are required No budget constraints Tunneling Security is important No modem infrastructure Demand-dial -on demand Limited traffic Per-instance fee pricing structure Demand-dial -persistent Ample traffic Flat fee pricing structure

Selecting a Site-to-Site VPN Tunnel VPN tunnel type Criteria VPN with PPTP tunnel is used if: All routers support PPTP passthrough User-based authentication is sufficient Support for non-IP protocols is required VPN with L2TP/IPSec tunnel is used if: All routers support passthrough of IPSec Computer-based authentication is required Support for non-IP protocols is required VPN with IPSec in tunnel mode is used if: All routers support passthrough of IPSec Only computer-based authentication is required Support for only TCP/IP is required

Factors Affecting Network Performance Factors affecting network performance Bandwidth Latency Throughput Capacity Wire speed Utilization Jitter Jabber Bottleneck Collisions Efficiency Frame rate

Network Upgrade Considerations When determining how to upgrade a network, consider: Current utilization rates at various times of day Appropriate target utilization rates Flow of traffic through the network Future growth Potential repercussions

Calculating Actual Data Throughput Actual data throughput formula ADT = net utilization * efficiency rating * wire speed Net utilization = (utilization - collisions) Efficiency rating based on frame size Actual Data Throughput (ADT) shows you how much usable data is actually being carried on the network Adding nodes and header information affects throughput You should measure throughput after data transmission

What Is Quality of Service? Quality of Service (QoS): Prioritizes network traffic for network routing by adding a DSCP value Uses throttling to limit bandwidth usage on a host Can be based on: Sending application Source or destination IPv4 or IPv6 addresses Protocol (TCP or UDP) Source or destination ports

What Is a QOS Policy? A QoS policy: Is defined as part of a Group Policy Can be applied to users or computers Can include specific IPv4 or IPv6 addresses or networks to apply to Lets you define a DSCP value for network traffic Lets you define a throttle rate for network traffic