Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network design WAN topology Topic 5. Agenda Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link.

Similar presentations


Presentation on theme: "Network design WAN topology Topic 5. Agenda Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link."— Presentation transcript:

1 Network design WAN topology Topic 5

2 Agenda Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link types

3 Enterprise Composite Network Model A hierarchal and scalable blue-print for network designers Enterprise campus – The elements for network operation within one campus (building) – Designed to provide high availability, scalability, and flexibility – Includes a campus backbone, a server farm, building access and building distribution modules and a network management module Enterprise edge – Efficient and secure communication between the enterprise campus and remote locations, business partners, mobile users, and the Internet – Aggregates connectivity, provides traffic filtering and inspection and routing to the enterprise campus – Includes WAN, VPN, internet access, and e-commerce modules Service provider edge – Enables communication with other networks – Uses different WAN technologies and Internet service providers (ISPs)

4 Enterprise Composite Network Model

5 Service Providers Tier 1 provider – National or international backbone with at least DS-3, OC-3 to OC-48 connectivity – All its routes from bilateral peering arrangements – 24/7 network operations center – Customers are primarily other providers, but it may support a large enterprise also Tier 2 Provider – Regional or national presence – High bandwidth backbones and 24/7 operations – Buys transit (discounted) from a Tier 1 provider for traffic that goes outside the region – Gets all its regional routes through peering arrangements. Tier 3 Provider – Typically a regional provider for a small or medium-sized region – Buys transit from multiple upstream providers – Runs a default-free routing table Tier 4 and Tier 5 Providers – Metropolitan provider multi-homed to two regional providers – Small, single-homed provider that connects end users via dialup, cable modem, or wireless service

6 Enterprise edge module Edge distribution – Interface to the enterprise network – Web security appliances and Intrusion Prevention appliances E-commerce – DMZ security zones with internet facing servers, network services such as DNS, FTP and NTP, email, websites and web portal – Separates internal and external services such as DNS, intranet and collaboration services Internet connectivity – Safe and secure access to internet for corporate users, and remote users Remote access VPN – Corporate access to remote users such as tele-workers and mobile workers WAN – Wan networks such as Frame Relay and ATM to other sites – Site-to-site VPNs for branch and partner sites – Protection services such as Intrusion Protection services

7 Inner switch – Provide connectivity between core and campus VLANs and firewall Firewall – Stateful access control and deep packet inspection – Controlling user’s internet bound traffic – Protecting public services in DMZ Outer switches – Provides connectivity between the firewall and the edge router Edge routers – Route traffic from enterprise to the internet via one or more ISPs – Security such as ACLs and uRPF Remote access appliances – Terminate remote-access VPNs such as SSL and Ipsec VPNs Components

8 Design goals for the edge Availability Eliminate any single point of failure on the network – Redundancy High availability for internet, extranet, and virtual private network (VPN) with redundant interfaces, standby devices, redundant links and devices Reliability by duplicating any required component whose failure could disable critical applications – a channel service unit (CSU), a power supply, a WAN trunk, internet connectivity – Affordability Trade-offs may be required

9 Design goals for the edge Backup paths – How much capacity does the backup path support? – How quickly will the network begin to use the backup path? – Common for a backup path to have less capacity than a primary path and use different technologies – Automatic failover is necessary for mission-critical applications – What about the cable to the ISP – often the weakest link Multi-homing the internet connection – Providing an enterprise network with more than one entry into the Internet. Circuit diversity – Different carriers sometimes use the same facilities – Ensure that your backup really is a backup

10 Design goals for the edge Management – Configurations – Monitor traffic flows – Monitor protocol and process efficiency – Security baselines Device access Routing security Device resilience Policy enforcement

11 Designing process What are the business and technical goals for the Enterprise Edge? – Who are the user communities? – What is the health of the existing network? – Where are the traffic flows? What technologies? What topology? What link type?

12 Security and remote access Business and technical goals – Confidentiality and privacy – Integrity – Availability Security technologies – Security zones, ACLs and network address translation – Access control AAA services Auditing – Protection Application inspection Monitoring and intrusion protection – Privacy Encryption Remote access – Remote access VPNS, SSL and Ipsec VPNS – Site-to-site VPNS

13 WAN topologies Full mesh – Every router is connected to every other router for complete redundancy – Good performance because there is just a single link delay between any two sites – The number of links in a full-mesh topology is (N * (N – 1)) / 2 – Expensive to deploy and maintain, hard to optimize, troubleshoot, and upgrade – Scalability limits for groups of routers that broadcast routing updates or service advertisements (20% broadcast rule) Partial mesh – Not every router is connected to every other router – Compromise solution Partial redundancy Less cost Less performance as some destinations might require traversing intermediate links Hub and spoke (Star) – Common hierarchical design – Destinations are reached via the ‘hub’ Peer – No redundancy, least expensive, easiest setup

14 Choosing a WAN link connection What is the purpose of the WAN? What is the geographic scope? What are the traffic requirements? Type, volume, quality and security Should the WAN use a private or public infrastructure? For a private WAN, should it be dedicated or switched? For a public WAN, what type of VPN access do you need? Which connection options are available locally? What is the cost of the available connection options?

15 WAN link connection methods Private – Dedicated Leased lines Point-to-Point and Point-to-Multipoint PPP HDLC – Switched Circuit Switched, PSTN, ISDN Packet Switched, Frame Relay, X.25, ATM (cells) Public – Internet DSL, cable, broadband wireless Satellite Metro Ethernet

16 Leased lines Permanent dedicated connections leased from carrier – T1 1.544 Mb/s – T3 44.736 Mb/s – E1 2.048 Mb/s (Australia) – E3 34.064 Mb/s (Australia) A router serial port is required for each leased line connection. A CSU/DSU and the actual circuit from the service provider are also required. – CSU/DSU is a Channel Service Unit/Data Service Unit that terminates T1/E1 carrier lines Lower latency and jitter No call setup required

17 Public networks DSL – Always-on connection technology that uses existing PSTN infrastructure and DSL access multiplexer (DSLAM) at the provider location – Varying data rates of up to 8.192 Mb/s and distance limitations Cable – Always-on connection that uses existing cable TV infrastructure – Bandwidth shared by users Broadband wireless – WiMax – High-speed broadband service over metro distances for many users – Provides broad coverage like a cell phone network Satellite – Rural users, upload speed is about one-tenth of download speed – Satellite dish, two modems (uplink and downlink), and coaxial cables Metro Ethernet – Reduced expenses and administration – Easy integration with existing networks

18 Circuit switching Establishes a circuit between hosts before communication can start Initial very fast call setup to establish a dedicated circuit or path which cannot be used by others until call tear down ISDN – Time-division multiplexed (TDM) digital signals – Uses 64 kb/s bearer channels (B) for carrying voice or data and a signaling, delta channel (D) for call setup and call management – Basic Rate Interface (BRI)-ISDN is intended for the home and small enterprise and provides two 64 kb/s B channels and a 16 kb/s D channel – Primary Rate Interface (PRI)-ISDN provides 30 B channels and one D channel, for an E1 link of 2.048 Mb/s ISDN links are used by enterprises as an extra capacity and backup link

19 Packet switching Packets are routed individually and can follow different paths to destination and arrive out of order Connection oriented packet switching verifies the existence of the destination with a 3-way handshake Frame Relay – Permanent and shared connectivity for voice and data traffic using virtual circuits (up to 4 Mbp/s) – Frame Relay is ideal for connecting enterprise LANs Asynchronous Transfer Mode (ATM) – Small, fixed-length cells carrying data, voice and video traffic over private and public networks

20 Physical WAN serial standards Standards to define how to transmit and receive signals – EIA/TIA-232 – EIA/TIA-449 – EIA-530 – High-Speed Serial Interface (HSSI) – V.24 – V.35 – X.25 – X.21 – G.703

21 Agenda Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link types


Download ppt "Network design WAN topology Topic 5. Agenda Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link."

Similar presentations


Ads by Google