itec 275 computer networks – switching, routing, and wans week 5 robert d’andrea some slides...

87
ITEC 275 ITEC 275 Computer Networks – Computer Networks – Switching, Routing, and Switching, Routing, and WANs WANs Week 5 Week 5 Robert D’Andrea Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Upload: brittany-grant

Post on 22-Dec-2015

224 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

ITEC 275ITEC 275 Computer Networks – Switching, Computer Networks – Switching,

Routing, and WANsRouting, and WANs

Week 5Week 5Robert D’AndreaRobert D’Andrea

Some slides provide by Priscilla Oppenheimer and used with permission

Page 2: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

AgendaAgenda• Learning Activities

– Network Design Document, logical design, and top-down network design methodology.

– Hierarchical Network Design, network topology consisting of many interrelated components. This task might be easier to divide and conquer the problem and develop it.

– Spanning Tree Protocol, fast convergence network routers.– VLANs, small bandwidths to switches rather than

broadcasting.– Redundancy, provides availability, performance, and

scalability.– VPNs, use a third party communication media securring

data.

Page 3: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Documenting Your DesignDocumenting Your Design• If you are given a request for proposal (RFP),

respond to the request in the exact format that the RFP specifies

• If no RFP, you should still write a design document– Describe your customer’s requirements and how your

design meets those requirements– Document the budget for the project– Explain plans for implementing the design

Page 4: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Typical RFP Response TopicsTypical RFP Response Topics• A network topology for the new design

• Information on the protocols, technologies, and products that form the design

• An implementation plan

• A training plan

• Support and service information and plan

• Prices and payment options

• Qualifications of the responding vendor or supplier

• Recommendations from other customers

• Legal contractual terms and conditions

Page 5: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Contents of a Network Design Contents of a Network Design DocumentDocument

• Executive summary• Project goal• Project scope• Design requirements• Current state of the network• New logical and physical design• Results of network design testing• Implementation plan• Project budget

Page 6: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Design RequirementsDesign Requirements

• Business goals explain the role the network design will play in helping an organization succeed

• Technical goals include scalability, performance, security, manageability, usability, adaptability, and affordability

Page 7: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Logical and Physical DesignLogical and Physical Design• Logical design

– Topology– Models for addressing and naming– Switching and routing protocols– Security strategies– Network management strategies

• Physical design– Actual technologies and devices

Page 8: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Implementation PlanImplementation Plan• Recommendations for deploying the network design

• Project schedule– Including any dates and times for service provider

installations

• Any plans for outsourcing

• Training

• Risks

• A fallback plan if the implementation should fail

• A plan for evolving the design as new requirements arise

Page 9: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Possible AppendixesPossible Appendixes• Detailed topology maps• Device configurations• Addressing and naming details• Network design testing results• Contact information• Pricing and payment options• More information about the company that is

presenting the design– Annual reports, product catalogs, press releases

• Legal contractual terms and conditions

Page 10: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

TopologyTopology• A branch of mathematics concerned with those

properties of geometric configurations that are unaltered by elastic deformations such as stretching or twisting

• A term used in the computer networking field to describe the structure of a network

Page 11: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

What is a Topology?What is a Topology?

Definition of TopologyA topology is a map of an internetwork

that indicates network, segments, interconnection points, and user communities. The purpose of the map is to show the geometry of the network, not the physical geography or technical implementation.

Page 12: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

External Network TopologyExternal Network Topology

Page 13: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Internal Network TopologyInternal Network Topology

Page 14: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Detail Description of External Network TopologyDetail Description of External Network Topology

Page 15: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

What is Convergence?What is Convergence?

Definition of Convergence

The speed and ability of a group of internetworking devices running a specific routing protocol to agree on the topology of an un-internetwork after a change in the topology.

Page 16: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Convergence is Voice, Data, and VideoConvergence is Voice, Data, and Video

Page 17: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Scope of ConvergenceScope of Convergence

Page 18: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Network Topology Design ThemesNetwork Topology Design Themes

• Hierarchy

• Redundancy

• Modularity

• Well-defined entries and exits

• Protected perimeters

Page 19: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Why Use a Hierarchical Model?Why Use a Hierarchical Model?• Reduces workload on network devices

– Avoids devices having to communicate with too many other devices (reduces “CPU adjacencies”)

• Constrains broadcast domains• Enhances simplicity and understanding• Facilitates changes• Facilitates scaling to a larger size

Page 20: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Why Use a Hierarchical Model?Why Use a Hierarchical Model?When networks grow without a plan or purpose, they develop into an unstructured format. According to Dr. Peter Welcher, the author of network design and technology articles for Cisco World, the unstructured design becomes a fur-ball network.

Page 21: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Why Use a Hierarchical Model?Why Use a Hierarchical Model?What are the disadvantages of fur-ball topology?

•Too many CPU adjacencies – the network devices communicate with too many other devices (broadcast packets).

•Workload required of the CPU on the device can be overloading.

•Affected devices are routers, workstations, and servers.

Page 22: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Why Use a Hierarchical Model?Why Use a Hierarchical Model?When trying to meet a customers business and technical goals for a corporate network design, it might be necessary to recommend a network topology of many interrelated components. The task is made easier if you can “divide and conquer” the job and develop the design in independent layers.Network design experts can develop a hierarchical network design model in layers to better understand and select the discrete layers.

Page 23: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Hierarchical Network DesignHierarchical Network DesignEnterprise WAN

BackboneCampus A Campus B

Campus C

Building C-1 Building C-2

Campus C Backbone

Core Layer

Distribution Layer

Access Layer

Page 24: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Cisco’s Hierarchical Design Cisco’s Hierarchical Design ModelModel

• A core layer of high-end routers and switches that are optimized for availability and speed. Avoid connecting packet filters or network monitors at this layer.

• A distribution layer of routers and switches that implement policies and segment traffic. This is a demarcation point between access and core layer of the network.

Page 25: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Cisco’s Hierarchical Design Cisco’s Hierarchical Design ModelModel

• An access layer that connects users via hubs, switches, routers, and other devices. Switches are usually implemented at the access layer in campus networks to divide up bandwidth domains to meet the demands of applications that need a lot of bandwidth or cannot handle the delay associated with sharing a bandwidth.

A network design guideline would be to design the access layer first, then the distribution, and core layer.

Page 26: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Cisco’s Hierarchical Design Cisco’s Hierarchical Design ModelModel

• Controlling a Network Diameter

Provides low and predictable latency.

Predict routing paths

Traffic flows

Capacity requirements

Page 27: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Flat Versus HierarchyFlat Versus Hierarchy

Flat Loop Topology

Headquarters in Medford

Grants Pass Branch Office

Ashland Branch Office

Klamath Falls Branch Office

Headquarters in Medford

Ashland Branch Office

Klamath Falls Branch Office

Grants Pass Branch Office

White City Branch Office

Hierarchical Redundant Topology

Page 28: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Flat Network TopologyFlat Network Topology

Page 29: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Mesh Versus Hierarchical-Mesh Mesh Versus Hierarchical-Mesh TopologiesTopologies

• Mesh TopologiesFull-mesh topology provides complete redundancy and good performance. There is only a single link delay between two sites. Costly to implement a full-mesh topology.Partial-mesh topology has fewer connections between sites. To reach another switch or router, traffic flow would experience more traversing of intermediate links.

Page 30: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Mesh Mesh DesignsDesigns

Partial-Mesh Topology

Full-Mesh Topology

Page 31: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

A Partial-Mesh Hierarchical DesignA Partial-Mesh Hierarchical DesignHeadquarters (Core Layer)

Branch Offices (Access Layer)

Regional Offices

(Distribution Layer)

Page 32: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Company StructureCompany Structure• Small and Medium-Sized Companies

Recommend a hierarchical model that reflects a hub-and-spoke topology. Usually, corporate headquarters or a data center form the center hub. Links extended from the hub connect to remote offices and telecommuters’ locations.

See slide Hub-and-Spoke Hierarchical Topology

Page 33: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

A Hub-and-Spoke Hierarchical TopologyA Hub-and-Spoke Hierarchical TopologyCorporate

Headquarters

Branch Office Branch OfficeHome Office

Page 34: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Scope of AccessScope of Access

• Control Access Layer DiameterThe most likely place for network design violations to occur are at the access layer. Users and network administrators are more likely to add networks to the internetwork and connect remote networks together. This is known as adding a chain.

Avoid backdoors. A backdoor connection is a connection between devices in the same layer. A hub is considered a backdoor.

Page 35: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Avoid Chains and BackdoorsAvoid Chains and Backdoors

Core Layer

Distribution Layer

Access Layer

ChainBackdoor

Page 36: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

How Do You Know When You Have a How Do You Know When You Have a Good Design?Good Design?

• When you already know how to add a new building, floor, WAN link, remote site, e-commerce service, and so on

• When new additions cause only local change, to the directly-connected devices

• When your network can double or triple in size without major design changes

• When troubleshooting is easy because there are no complex protocol interactions to wrap your brain around

Page 37: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Flat Network UseFlat Network Use• A flat network topology is adequate for small

networks. Each network device functions the same, and the network is not divided into layers or modules. A flat network is easy to design.Flat network designers are most difficult when

there is network growth, and the lack of hierarchy makes trouble shooting more difficult.

Page 38: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Flat WAN NetworksFlat WAN Networks• Flat WAN Topologies

A WAN for a small company consists of a few sites connected in a loop. Each site has it’s own WAN router, routing protocols can converge quickly, and communication with any other site can recover when a link fails.

Caveat: If only one link fails, recovery is possible. If two or more links fail, recovery is more difficult.

The flat loop topology goals are low cost and reasonably good availability.

See slide -Flat verses Hierarchical.

Page 39: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Flat LAN NetworksFlat LAN Networks• Flat LAN Topologies

In the 1990s, a typical LAN configuration was to connect PCs and servers to one or more hubs. The PCs and servers implemented a media-access control process like token passing or carrier sense multiple access with collision detection (CSMA/CD) to control access to a shared bandwidth. This configuration had the potential to negatively affect delay and throughput for other devices.

Today, designers recommend connecting PCs and servers to the data link layer (Layer 2) switches .

Page 40: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Layer 2 ConfigurationLayer 2 Configuration• Characterizing Layer 2 Network Traffic

Devices connected in a switched or bridged network are all in the same broadcast domain. Switches forward broadcasting frames out from every port. Routers on the other hand, separate segments into separate broadcast domains. The recommended limit for devices connected to one single broadcast domain is a couple hundred devices. Broadcasted traffic needs to be limited and watched closely on flat loop topologies, otherwise frames can be dropped or lost.

Rule of Thumb – limit broadcast traffic to 20% of the traffic on each link.

Page 41: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

CISCO SAFE Security ArchitectureCISCO SAFE Security ArchitectureCisco SAFE is a security reference architecture

that provides prescriptive validated design guides that address how organizations can plan, design, and deploy security solutions that meet the unique requirements of different places in the network, such as campuses, the Internet edge, branches, and data centers.These defense-in-depth blueprints also provide best practices for securing critical data and transactions as they travers the entire networked infrastructure.

Page 42: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Cisco’s SAFE Security Reference Cisco’s SAFE Security Reference ArchitectureArchitecture

Page 43: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Campus Topology DesignCampus Topology Design• Use a hierarchical, modular approach• Minimize the size of bandwidth domains• Minimize the size of broadcast domains• Provide redundancy

– Backup paths– Mirrored servers– Mirror stored data– Multiple ways for workstations to reach a router

for off-net communications

Page 44: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Campus Topology DesignCampus Topology Design

• Cisco SAFE Security Reference Architecture- Used to simplify the complexity of a large internetwork- SAFE is concerned with security-Defense-in-depth approach were multiple layers of protection are strategically located through-out the network.-See page 134 for major design modules

Page 45: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

A Simple Campus Redundant DesignA Simple Campus Redundant DesignHost A

Host B

LAN X

LAN Y

Switch 1 Switch 2

Page 46: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Bridges and Switches use Spanning-Tree Bridges and Switches use Spanning-Tree Protocol (STP) to Avoid LoopsProtocol (STP) to Avoid Loops

X

Host A

Host B

LAN X

LAN Y

Switch 1 Switch 2

Page 47: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

What is Spanning Tree Protocol?What is Spanning Tree Protocol?Spanning Tree Protocol (STP) is a layer2 protocol that prevents logical loops in switched networks that have redundant links.

Redundancy in a network may appear to be harmless and needed to maintain connectivity with other devices. One problem occurs when a broadcast frame is sent on the network. Device A sends an ARP request to find the MAC address of device B. The ARP request is sent as a broadcast. Both switches receive the broadcast and both switches flood the broadcast to all of its other connected ports. The end result is a broadcast storm.

Page 48: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

What is Spanning Tree Protocol?What is Spanning Tree Protocol?A second problem occurs with redundant topologies is a single device will receive multiple copies of the same frame.

The third problem occurs within the switch itself. The MAC address table can change rapidly and contain wrong information. What happens when neither switch has learned about devices A and B’s location? Device A sends data to device B. Each switch learns about device A is on port 1, and each records this in its MAC address table. The switches haven’t learned about device B yet. Both switches flood the frame to discover device B on their port 2.

Page 49: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

What is Spanning Tree Protocol?What is Spanning Tree Protocol?As a result, the MAC address table is overwritten. The switches previously had device A connected to port 1. Because the table changed rapidly, it might be considered unstable.

Page 50: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Bridges (Switches) Running STPBridges (Switches) Running STP• Participate with other bridges in the election of a single

bridge as the Root Bridge.

• Calculate the distance of the shortest path to the Root Bridge and choose a port (known as the Root Port) that provides the shortest path to the Root Bridge.

• For each LAN segment, elect a Designated Bridge and a Designated Port on that bridge. The Designated Port is a port on the LAN segment that is closest to the Root Bridge. (All ports on the Root Bridge are Designated Ports.)

• Select bridge ports to be included in the spanning tree. The ports selected are the Root Ports and Designated Ports. These ports forward traffic. Other ports block traffic.

Page 51: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Elect a Root Elect a Root

Bridge B Bridge C

Bridge A ID = 80.00.00.00.0C.AA.AA.AA

Bridge B ID = 80.00.00.00.0C.BB.BB.BB

Bridge C ID = 80.00.00.00.0C.CC.CC.CC

Port 1

Port 2

Port 1

Port 2

Port 1 Port 2

LAN Segment 2100-Mbps Ethernet

Cost = 19

LAN Segment 1100-Mbps Ethernet

Cost = 19

LAN Segment 3100-Mbps Ethernet

Cost = 19

RootBridge A

Lowest Bridge IDWins!

Page 52: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Determine Root PortsDetermine Root Ports

Bridge B Bridge C

RootBridge A

Bridge A ID = 80.00.00.00.0C.AA.AA.AA

Bridge B ID = 80.00.00.00.0C.BB.BB.BB

Bridge C ID = 80.00.00.00.0C.CC.CC.CC

Port 1

Port 2

Port 1

Port 2

Port 1 Port 2

LAN Segment 2100-Mbps Ethernet

Cost = 19

LAN Segment 1100-Mbps Ethernet

Cost = 19

LAN Segment 3100-Mbps Ethernet

Cost = 19

Root Port Root Port

Lowest CostWins!

Page 53: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Determine Designated PortsDetermine Designated Ports

Bridge B Bridge C

RootBridge A

Bridge A ID = 80.00.00.00.0C.AA.AA.AA

Bridge B ID = 80.00.00.00.0C.BB.BB.BB

Bridge C ID = 80.00.00.00.0C.CC.CC.CC

Port 1

Port 2

Port 1

Port 2

Port 1 Port 2

LAN Segment 2100-Mbps Ethernet

Cost = 19

LAN Segment 1100-Mbps Ethernet

Cost = 19

LAN Segment 3100-Mbps Ethernet

Cost = 19

Root Port Root Port

Designated Port Designated Port

Designated Port Lowest Bridge IDWins!

Page 54: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Bridge B Bridge C

RootBridge A

Bridge A ID = 80.00.00.00.0C.AA.AA.AA

Bridge B ID = 80.00.00.00.0C.BB.BB.BB

Bridge C ID = 80.00.00.00.0C.CC.CC.CC

Port 1

Port 2

Port 1

Port 2

Port 1 Port 2

LAN Segment 2100-Mbps Ethernet

Cost = 19

LAN Segment 1100-Mbps Ethernet

Cost = 19

LAN Segment 3100-Mbps Ethernet

Cost = 19

Root Port Root Port

Designated Port Designated Port

Designated Port Blocked Port

X

Prune Topology into a Tree!Prune Topology into a Tree!

Page 55: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

React to ChangesReact to Changes

Bridge B Bridge C

RootBridge A

Bridge A ID = 80.00.00.00.0C.AA.AA.AA

Bridge B ID = 80.00.00.00.0C.BB.BB.BB

Bridge C ID = 80.00.00.00.0C.CC.CC.CC

Port 1

Port 2

Port 1

Port 2

Port 1 Port 2

LAN Segment 2LAN Segment 1

LAN Segment 3

Root Port Root Port

Designated Port Designated Port

Designated Port Becomes Disabled

Blocked Port Transitions to Forwarding State

Page 56: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Scaling the Spanning Tree ProtocolScaling the Spanning Tree Protocol

• Keep the switched network small– It shouldn’t span more than seven switches

• Use Bridge Protocol Data Units (BPDU) skew detection on Cisco switches

• Use IEEE 802.1w– Provides rapid reconfiguration of the spanning

tree– Also known as RSTP

Page 57: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Rapid Spanning Tree ProtocolRapid Spanning Tree Protocol• Bridge port states

- Discarding is a port that is neither learning MAC addresses nor forwarding user’s frames.- Learning is a port that is learning MAC addresses to populate the MAC address table, but has not yet forwarded user frames- Forwarding is a port that is learning MAC addresses and forwarding user frames.

Page 58: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Rapid Spanning Tree ProtocolRapid Spanning Tree Protocol• Converged switched network Bridge port roles

- Root port assigned on a non-root bridge, provides lowest cost path to the root bridge.- Designated assigned on a port attached to a LAN, provides lowest cost path to the root bridge.- Alternate assigned to a port that offers an alternative path in the direction of the root bridge to that provided by the bridge’s root port. Considered a discarded port

Page 59: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Rapid Spanning Tree ProtocolRapid Spanning Tree Protocol- Backup assigned to a port on a

designated bridge that acts as a backup path provided by a designated port in the direction of the leaves of the spanning tree.

- Disabled assigned to a port that is not operational or is excluded from the

active topology by network management. Considered a discarded port.

Page 60: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Rapid Spanning Tree ProtocolRapid Spanning Tree ProtocolRSTP converges quicker than STP (50

seconds) to a tree topology where the lowest-cost paths are forwarding frames. RSTP archives rapid transition to the forwarding state on edge ports, root ports, and point-to-point links. Edge and root ports can transition to forwarding without transmitting or receiving messages from other bridges.

Page 61: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Rapid Spanning Tree ProtocolRapid Spanning Tree Protocol• Port Modes

Full-duplex mode port assumed to be point-to-point. Modern switched networks utilize this mode mostly.Half-duplex mode port considered a shared port by default.

Page 62: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Rapid Spanning Tree ProtocolRapid Spanning Tree Protocol• Root Bridge

High speed ReliableCentered in network topologyA switch with the lowest bridge ID

Priority fieldMAC address the lowest MAC address of a switch or bridge

Page 63: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Selecting a Root BridgeSelecting a Root BridgeControl which switch becomes the root bridge.•Reliable•High-speed switch in the center of the topology•If switches are to elect the root on their own, you will have little control of the direction that traffic flows and the amount of frame-forwarding delay in your network.

Page 64: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Selecting a Root BridgeSelecting a Root BridgeControl which switch becomes the root bridge.•Control of the root bridge is critical because a slow bridge can become the root bridge.•If high-speed ports are accidentally removed from the spanning tree it is possible for low-speed ports to take their place because they are closer to the root bridge.

Page 65: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Selecting a Root BridgeSelecting a Root BridgeThe root bridge is the switch with the lowest bridge ID.There are two parts to the bridge ID.

1. Priority field2. MAC address of the switch

If all priorities are set to their default value, the switch with the lowest MAC address becomes root.Manual control of the root bridge is important to maintain high throughput on switched networks.

Page 66: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Virtual LANs (VLANs)Virtual LANs (VLANs)

• An emulation of a standard LAN that allows data transfer to take place without the traditional physical restraints placed on a network

• A set of devices that belong to an administrative group

• Designers use VLANs to constrain broadcast traffic

Page 67: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

VLANs versus Real LANsVLANs versus Real LANs

Switch A

Station A1 Station A2 Station A3

Network A

Switch B

Station B1 Station B2 Station B3

Network B

Page 68: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

A Switch with VLANsA Switch with VLANsStation A1 Station A2 Station A3

VLAN A

Station B1 Station B2 Station B3

VLAN B

Page 69: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

VLANs Span SwitchesVLANs Span Switches

Switch A

Station B1 Station B2 Station B3

Switch B

Station B4 Station B5 Station B6

Station A1 Station A2 Station A3 Station A4 Station A5 Station A6

VLAN B

VLAN A

VLAN B

VLAN A

Page 70: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

WLANs and VLANsWLANs and VLANs• A wireless LAN (WLAN) is often implemented

as a VLAN• Facilitates roaming• Users remain in the same VLAN and IP subnet

as they roam, so there’s no need to change addressing information

• Also makes it easier to set up filters (access control lists) to protect the wired network from wireless users

Page 71: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Workstation-to-Router Workstation-to-Router CommunicationCommunication

• Proxy ARP (not a good idea)• Listen for route advertisements (not a great

idea either)• ICMP router solicitations (not widely used)• Default gateway provided by DHCP (better

idea but no redundancy)– Use Hot Standby Router Protocol (HSRP) for

redundancy

Page 72: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

HSRPHSRPHot Standby Router ProtocolHot Standby Router Protocol

Active Router

Standby Router

Virtual Router

Workstation

Enterprise Internetwork

Page 73: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Week FiveWeek FiveWhat is Multi-homing?Multi-homing is to provide more than one connection for a system to access and offer network services. In an enterprise network, multi-homing provides access to more than one entry into the Internet.Example: WAN backup and ISP redundancyIf a server has more than one network layer address.

Page 74: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Multi-homing the Internet ConnectionMulti-homing the Internet Connection

Enterprise

Enterprise

Enterprise

ISP 1

ISP 1 ISP 2

ISP 1

ISP 1 ISP 2

EnterpriseOption A

Option B

Option C

Option D

Paris NY

Paris NY

Page 75: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Security TopologiesSecurity Topologies

EnterpriseNetwork

DMZ

Web, File, DNS, Mail Servers

Internet

Page 76: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Security TopologiesSecurity Topologies

Internet

Enterprise NetworkDMZ

Web, File, DNS, Mail Servers

Firewall

Page 77: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Network SecurityNetwork SecurityDefinition of FirewallA firewall is a system or combination of systems that enforces a boundary between two or more networks.

Router with ACLFirewall should be placed within the

network topology so that all traffic from outside the protected network must pass through the firewall.

NAT (Network Address Translation)

Page 78: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

DefinitionsDefinitionsARP (Address Resolution Protocol) used to find a remote station. Traces IP addresses to MAC addresses.RARP (Reverse Address Resolution Protocol) the protocol within TCP/IP stack that maps MAC addresses to IP addresses.RIP (Routing Information Protocol) is commonly used interior gateway protocol in the Internet. RIP employees hop count as a routing metric.Root bridge is used with STP to stop network loops from occurring. The root bridge is elected to have the lowest bridge ID.

Page 79: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

DefinitionsDefinitionsStatic routing occurs when an administrator manually adds routes in each router’s routing table.Dynamic routing is when protocols are used to find and update routing tables on routers.Routing Protocols

Distance vector – RIP and IGRPLink state - OSPFHybrid - EIGRP

Page 80: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

SummarySummary• When a customer provides an RFP, make sure to

follow the prescribed format• When not bound by an RFP, develop a design

document that describes requirements, the existing network, the logical and physical design, an implementation plan, and the budget

• Be sure to include an executive summary• In some cases, you should also include appendixes

with detailed information

Page 81: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

SummarySummary

• Use a systematic, top-down approach• Plan the logical design before the physical

design• Topology design should feature hierarchy,

redundancy, modularity, and security

Page 82: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Review QuestionsReview Questions• Why is it important to document your

network design?• Why is it important to submit an RFP

proposal in the exact format prescribed?• What are the major topics in a design

document?• What are some possible appendixes for a

design document?

Page 83: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Review QuestionsReview Questions

• Why are hierarchy and modularity important for network designs?

• What are the three layers of Cisco’s hierarchical network design?

• What are the major components of Cisco’s enterprise composite network model?

• What are the advantages and disadvantages of the various options for multihoming an Internet connection?

Page 84: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

This Week’s OutcomesThis Week’s Outcomes

• Network Design Document• Hierarchical Network Design• Spanning Tree Protocol• VLANs• Redundancy• VPNs

Page 85: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Due this weekDue this week

• 4-2-1 – Simulator Tutorial and Basic IOS Command Exploration

Page 86: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Next weekNext week

• Read chapter 6 in Top-Down Network Design• Read chapter 6 in Designing Cisco

Internetwork Solutions• 5-1 – Concept questions 4• 1-5-1 – Network Design Project 1

– Switches

Page 87: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 5 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Q & AQ & A

• Questions, comments, concerns?