All Heading Design

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Lesson 1 Network Design

 Introduction to Network • A Good Network Design • Design Principles • Network Designing


Tasks • Modular Network Design

Hierarchical Network Design: Access Layer, Distribution Layer, Core Layer

Cisco Enterprise Composite Network Model: Enterprise Campus, Enterprise Edge, Service Provider Edge

Enterprise Campus: i. Campus Infrastructure module ii. Management module iii. Server module iv. Edge
Distribution module

Lesson 2 SWITCHING DESIGN

Switching- Introduction • Switching Types • Spanning Tree Protocol • VLAN

The switching types are 1. Layer 2 switching 2. Layer 3 Switching

SPANNING TREE PROTOCOL, Redundancy Issues,

STP Operation, STP Terminology, STP in LAN, STP States, STP Options, Rapid STP, VLAN- A Glance, VLAN
Membership, VLAN Trunk, VLAN and STP, PVST, MISTP

Lesson 3 Switching Design - Part 2

• Virtual Trunking Protocol • Multilayer Switching • Cisco Express Forwarding • Switching Security •
Switching Design consideration

VLAN Trunking Protocol-VTP, Switches in VTP : Server Mode Client Mode transparent Mode.

VTP pruning, Inter VLAN Routing: I. By using multiple physical interfaces, II. By using single physical
interfaces

Multilayer Switching: Multilayer switching and Cisco Express Forwarding.

MLS Components: MLS Route Processor (MLS-RP), MLS Switching Engine (MLS-SE), Multilayer Switching
Protocol (MLSP)

MLS Operation, Cisco Express Forwarding, CEF-Components, FIB, Adjacency Table

Switching Security: The two type of Switch securities are i. Catalyst native security , ii. Catalyst hardware
security

Catalyst native security: Catalyst native security-Built in Security, Catalyst switches – PVLAN, Catalyst
Hardware security, Switching Design Considerations, Cisco current campus design recommendations.

Lesson 4 Switching Design - Part 2

Virtual Trunking Protocol

• Multilayer Switching

• Cisco Express Forwarding


• Switching Security

• Switching Design consideration

VLAN Trunking Protocol-VTP, Switches in VTP: Server Mode Client Mode transparent Mode.

VTP pruning, Inter VLAN Routing: i. By using multiple physical interfaces, II. By using single physical
interfaces

Multilayer Switching: Multilayer switching and Cisco Express Forwarding.

MLS Components: MLS Route Processor (MLS-RP), MLS Switching Engine (MLS-SE), Multilayer Switching
Protocol (MLSP)

Cisco Express Forwarding (CEF) Components: The Forwarding Information Base, Adjacency table, FIB,
Adjacency Table

Switching Security: i. Catalyst native security , ii. Catalyst hardware security

Catalyst switches – PVLAN, Catalyst Hardware security, Switching Design Considerations, Cisco current
campus design recommendations.

Lesson 5 IPv4 ROUTING DESIGN- IP Addressing

IP Addressing Introduction

• IPv4 Address Design

– Determining the required number of IP Addresses

– Private and Public IP Address

– Subnet Mask for Routing

– Hierarchical IP address design.

• IP Multicast

IP Address Classes, IP Address - A Glance, VLSM, Importance of IP Addressing,

IPv4 Address Design: – Determining the required number of IP Addresses – Private and Public IP Address
• Private IP and Public IP- Meaning. • NAT – Subnet Mask for Routing • How routers use subnet mask •
Determining the subnet mask to use – Hierarchical IP address design

NAT Configuration, NAT Table, NAT-One to one Translation, NAT- Address Overloading, Subnet Mask for
Routing, Determining the Subnet Mask to Use- In class practice, In class practice – Answer

Hierarchical IP Address Design and Summarization, IP Address Summarization, Route summarization,

Not Summarizing the Routes, Summarizing the Routes, Route Summarization on a Nonoctet Boundary,
Calculating Summary Route- Nonoctet Boundary, IP Multicast, IGMP and CGMP and PIM

Lecture 6
IPv4 ROUTING DESIGN- IP Routing Protocols

• Classification of Routing Protocols

• Routing Protocols

• Routing Protocol Metrics

• Convergence Time

• Routing Protocol Comparison

• Routing Protocol Selection

• Virtual Routing

Interior and Exterior Routing Protocols, Distance Vector Routing Protocol, Link-State and Hybrid Routing
Protocols, Distance Vector, Link-State, and Hybrid Routing Protocols, Routing loops, Flat and Hierarchical
Routing Protocols, Classful and Classless Routing Protocols, Classful Routing Protocol - Design
Implications

Routing Protocol Metrics factors:- Load, Reliability.

Convergence Time, Convergence in Routing Protocols., Route Summarization with Routing Protocols.

Routing Information Protocol, Versions 1 and 2, Interior Gateway Routing Protocol and Enhanced IGRP,

Open Shortest Path First, Integrated Intermediate System-to-Intermediate System, link-state classless, S-
IS Network, Border Gateway Protocol Version 4, Routing Protocol Comparison,

Routing Protocol Selection- Choosing Your Routing Protocol: Core Layer, Distribution layer, The access
layer

Redistribution, Filtering, and Administrative Distance

Virtual Routing

Lecture 7

Wireless LAN Design

Wireless Technology- Overview

• Wireless Security • Wireless Management • Wireless Design Consideration

Wireless Standards, Wireless Components: i. Wireless Access Points, ii. Wireless Client Devices

User Workstations and Laptops: Ad-Hoc Network, PDAs, Wireless IP Phones

Wireless Security: Wireless Security Issues

Wireless Threat Mitigation: Basic Wireless Security: i. SSIDs, ii. Wired Equivalent Privacy (WEP), iii. Media
Access Control (MAC) address verification

Enhanced Wireless Security: 802.1x, Wi-Fi Protected Access, 802.11i


Wireless Intrusion Detection, Wireless Management: • RF management services • Interference
detection • Assisted site survey • RF scanning and monitoring

Cisco Integrated Wireless Network

Wireless Design Considerations: 1. Site Survey, 2. WLAN Roaming, 3. Point-to-Point Bridging

Design Considerations for Wireless IP Phones

Lecture 8

QoS Design and Network Management

Qos Design • Introduction • QoS Requirements • QoS Models • QoS Tools

Network Management • Introduction • Network Management protocols and Tools • SLC and SLA

Network Delay

QoS Requirements for Voice, Data, Video, and Other Traffic

QoS Models: IntServ and DiffServ.

QoS Tools

The following sections explore these QoS tools: • Classification and Marking • Policing and Shaping •
Congestion Avoidance • Congestion Management • Link-Specific Tools • AutoQoS

Network Management Protocols and

Tools

• Simple Network Management Protocol (SNMP)

• Management Information Base (MIB)

• Remote Monitoring (RMON)

• Cisco NetFlow

• Syslog

• CiscoWor

Network Management Terminology

Lecture 9

Voice Transport Design- Part 1

Voice Transport- Introduction

VoIP Components

IP Telephony Components
Voice Coding and Compression Techniques,

Voice communication – Advantages, Digitization

Digitization: 1. VoIP, 2. Using IP phones to digitize and packetize the voice., VoIP and IP Telephony

Conversation and Control Traffic

QoS, VoIP Components, IP Telephony Components, IP infrastructure, IP Phones, Video Telephony, Call
Processing, Applications, Voice Gateway, Voice Coding and Compression Techniques, Voice Activity
Detection, Compressed Real-Time Transport Protocol.

Lecture 10

Voice Transport Design- Part 2

Overview

• Bandwidth Requirements

• IP Telephony Design

– Single-Site IP Telephony Design

– Multisite Centralized IP Telephony Design

• Voice Security

– Security Concerns

– Mitigation

Grade of service (GoS), Erlangs, Centum call seconds (CCSs), Busy-hour traffic (BHT), Trunk Capacity

Calculation of Trunk Capacity or Bandwidth: Trunk capacity = Number of simultaneous calls to be


supported * Bandwidth required per call.

Voice packet size = Layer 2 header size + IP/UDP/RTP header size +Voice payload size

Voice packets per second (pps) = Codec bit rate / Voice payload size

Bandwidth per call = Voice packet size (bits) * Voice pps.

Signalling Traffic Bandwidth

IP Telephony Design: Single-Site IP Telephony Design, Multisite Centralized IP Telephony Design

Multisite Distributed IP Telephony Design, Voice Security

IP Telephony Network Security Concerns: • Access attacks • Denial-of-service attacks

Mitigating to Protect IP Telephony: Threat defense, Secure communication, Trust and identity

Lecture 11
Designing a network

Overview

Case Study_ Collecting Data

– Case study - Analyzing Background Information and Context.

– Case study - Understanding Network Requirements.

Case Study_ Solution

– Design Model

– Switching

– Security

– IP Addressing and Routing Protocol

– E-Mail

– QoS and Voice

– Wireless

– Network Management

– Future Considerations

Network Requirements After Acquisitions Are Complete.

SOLUTION

Solution to the case study introduced now includes the following sections:

• Design Model

• Switching

• Security

• IP Addressing and Routing Protocol

• E-Mail

• QoS and Voice

• Wireless

• Network Management

• Future Considerations

Lecture 12
Enabling Technologies

Overview

• Testing and Documenting Network Design

• Cloud Computing

• IPv6

Relative importance for a typical document

Documentation

Layer 3 diagram

Circuit number table

IP address allocation table

Rack layout diagram

Wi-Fi diagram

Cloud Computing

• Deployment Models • Service Models

Service Models are the reference models on which the Cloud

Computing is based. These can be categorized into three

basic service models as listed below:

• Infrastructure as a Service (IaaS)

• Platform as a Service (PaaS)

• Software as a Service (SaaS)

Cloud Computing – Advantages

• Lower computer costs

• Improved performance:

• Reduced software costs

• Instant software updates

• Improved document format compatibility

• Unlimited storage capacity

• Increased data reliability

• Universal document access


• Latest version availability

• Easier group collaboration

• Device independence

Cloud Computing – Disadvantage

• Requires a constant Internet connection

• Does not work well with low-speed connections

• Features might be limited

• Can be slow

• Stored data can be lost

• Stored data might not be secure

Why IPv6?

• Deficiency of IPv4

• Address space exhaustion

• New types of service → Integration

– Multicast

– Quality of Service

– Security

– Mobility (MIPv6)

• Header and format limitations

Advantages of IPv6 over IPv4


• Larger address space

• Better header format

• New options

• Allowance for extension

• Support for resource allocation

• Support for more security

• Support for mobility

Traffic Class

IPv6 Flow Label


• Related sequence of packets

• Needing special handling

• Identified by src & dest addr + flow label

• Router treats flow as sharing attributes

– E.g. path, resource allocation, discard requirements,

accounting, security

• May treat flows differently

– Buffer sizes, different forwarding precedence, different

quality of service

• Alternative to including all information in every header.

Payload Length

IPv6 Packet (PDU) Structure

IPv6 Header Format

You might also like