Top-Down Network Design: Chapter Three
Top-Down Network Design: Chapter Three
Chapter Three
1
Characterizing the Existing Internetwork
The logical topology illustrates the architecture of the network, which can be hierarchical or
flat, structured or unstructured, layered or not, and other possibilities.
The logical topology also describes methods for connecting devices in a geometric shape
(for example, a star, ring, bus, hub and spoke, or mesh).
When characterizing the logical topology, look for “ticking time bombs” or implementations
that might hinder scalability.
redundant network equipment and cabling but the servers are all single-homed
The logical topology can affect your ability to upgrade a network. For example, a flat
topology does not scale as well as a hierarchical topology.
Get a Network Map
8
Medford Roseburg
Fast Ethernet Fast Ethernet
50 users 30 users
Frame Relay Frame Relay
CIR = 56 Kbps CIR = 56 Kbps
DLCI = 5 DLCI = 4
IBM
Mainframe
T1
Web/FTP server
Eugene
Ethernet T1 Internet
20 users
Developing a Modular Block Diagram
9 based on Cisco Enterprise Composite
Network Model
10 Characterize Addressing and Naming
IP addressing for major devices, client networks, server networks,
and so on
Any addressing oddities, such as discontiguous subnets?
Any strategies for addressing and naming?
For example, sites may be named using airport codes
San Francisco = SFO, Oakland = OAK
11 Discontiguous Subnets
Area 0
Network
192.168.49.0
Router A Router B
Area 1 Area 2
Subnets 10.108.16.0 - Subnets 10.108.32.0 -
10.108.31.0 10.108.47.0
Characterize the Wiring and Media
12
Single-mode fiber
Multi-mode fiber
Shielded twisted pair (STP) copper
Unshielded-twisted-pair (UTP) copper
Coaxial cable
Microwave
Laser
Radio
Infra-red
13 Campus Network Wiring
Horizontal Work-Area
Wiring Wiring
Wallplate
Telecommunications
Wiring Closet
Vertical
Wiring
(Building
Backbone)
Campus
Building A - Headquarters Backbone Building B
14 Architectural Constraints
Make sure the following are sufficient
Air conditioning
Heating
Ventilation
Power
Protection from electromagnetic interference
Doors that can lock
15 Architectural Constraints
Enterprise
Segment 1
Segment 2
Segment n
21 Network Utilization in Minute Intervals
Network Utilization
16:40:00
16:43:00
16:46:00
16:49:00
16:52:00
Time
16:55:00 Series1
16:58:00
17:01:00
17:04:00
17:07:00
17:10:00
0 1 2 3 4 5 6 7
Utilization
22 Network Utilization in Hour Intervals
Network Utilization
13:00:00
14:00:00
Time
15:00:00 Series1
16:00:00
17:00:00
Protocol 1
Protocol 2
Protocol 3
Protocol n
24 Characterize Packet Sizes
25 Characterize Response Time
X
Node A
Node B
X
Node C
Node D X
X
26 Check the Status of Major Routers,
Switches, and Firewalls
show buffers
show environment
show interfaces
show memory
show processes
show running-config
show version
27 Tools
Protocol analyzers
Multi Router Traffic Grapher (MRTG)
Remote monitoring (RMON) probes
Cisco Discovery Protocol (CDP)
Cisco IOS NetFlow technology
CiscoWorks
28 Summary
Characterize the existing internetwork before designing
enhancements
Helps you verify that a customer’s design goals are realistic
Helps you locate where new equipment will go
Helps you cover yourself if the new network has problems due to
unresolved problems in the old network
29 Review Questions
What factors will help you decide if the existing
internetwork is in good enough shape to support
new enhancements?
When considering protocol behavior, what is the
difference between relative network utilization and
absolute network utilization?
Why should you characterize the logical structure
of an internetwork and not just the physical
structure?
What architectural and environmental factors
should you consider for a new wireless installation?