0% found this document useful (0 votes)
21 views32 pages

Slide 3

Networking slides

Uploaded by

leatherworld.z8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views32 pages

Slide 3

Networking slides

Uploaded by

leatherworld.z8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

IT Infrastructure

Architecture
Infrastructure Building Blocks
and Concepts

Networking – Part 2
(chapter 9)
Network Virtualization (VLAN)

• VLANs enable logical grouping of network nodes on the same LAN


 Configured on network switches
 Operate at the Ethernet level
Virtual LAN (VLAN)

• VLANs:
 Allow segmenting a network at the data link layer
 Allow end stations to be grouped even if they are not physically connected to the same
switch
 Can adapt to changes in network requirements and allow simplified administration
 Enhance security by preventing traffic in one VLAN from being seen by hosts in a
different VLAN

• For VLANs to communicate with each other a router is needed


• Virtual Extensible LAN (VXLAN) is an encapsulation protocol
• VXLANs are heavily used in multi-tenant cloud environments
Virtual Routing and Forwarding (VRF)

• VRF = Virtual Routing and Forwarding


• It allows multiple instances of a routing table to coexist within the same
router
 This allows multiple virtual IP networks to be created within a single physical network
infrastructure
 VRF provides features similar to VLANs, but at layer 3 of the OSI model instead of layer
2

• A router that supports VRF can have multiple virtual routers implemented.
 One or more interfaces on the router can be part of a VRF, but none of the VRFs share
routing information. Packets are only forwarded between interfaces that are in the
same VRF

• Overlapping IP addresses can be used because the different routing


instances are independent of each other
Virtual NICs

• Virtual machines are only aware of virtual Network Interface Controllers


(NICs) provided to them
• Virtual machines running on physical machines share physical NICs
• Communications between virtual machines on the same physical machine
are routed directly in memory space by the hypervisor, without using the
physical NIC
• The hypervisor routes Ethernet packages from the virtual NIC on the
virtual machine to the physical NIC on the physical machine
Virtual switch

• Virtual NICs are connected to


virtual switches
• A virtual switch is an application
running in the hypervisor, with
most of the capabilities of a
physical network switch
• A virtual switch is dynamically
configured
 Ports in the virtual switch are
configured at runtime
 The number of ports on the switch is
in theory unlimited
Software Defined Networking

• Software Defined Networking (SDN) allows networks to be defined and


controlled using software external to the physical networking devices
• A set of physical network switches can be programmed as a virtual
network:
 Hierarchical
 Complex
 Secured

• A virtual network can easily be changed without touching the physical


network components
Software Defined Networking

• Control plane resides


centrally
• Data plane (the physical
switches) remain
distributed
Software Defined Networking

• SDN can be controlled from a single management console


• Provides open APIs that can be used to manage the network using third
party software
• In an SDN, the distributed data plane devices are only forwarding network
packets based on ARP or routing rules that are preloaded into the devices
by the SDN controller in the control plane
 This allows the physical devices to be much simpler and more cost effective

• Good examples of SDN are implemented by the public cloud providers


 AWS has Virtual Private Clouds (VPCs)
 Azure has Virtual Networks (VNETs)
 GCP has Virtual Private Cloud
Network Function Virtualization

• Network Function Virtualization (NFV) is a way to virtualize networking


devices
 Firewalls
 VPN gateways
 Load balancers

• NFV appliances are implemented as virtual machines running applications


that perform the network functions
• NFV virtual appliances can be created and configured dynamically and on-
demand using APIs
• Example:
 Deploy a new firewall as part of a script that creates a number of connected virtual
machines in a cloud environment
Layered network topology

• A network infrastructure should be


built up in layers
 Improve availability and performance
 Provides scalability
 Provides deterministic routing
 Avoids unmanaged ad-hoc data streams

• Provides high availability


 Because the layering provides multiple
paths to any piece of equipment
Layered network topology

• Core layer
 This is the center of the network

• Distribution layer
 An intermediate layer between the core layer in the datacenter and the access switches
in the patch closets
 Combines the access layer data and sends its combined data to one or two ports on the
core switches

• Access layer
 Connect workstations and servers to the distribution layer
 For servers, located at the top of the individual server racks or in blade enclosures
 For workstations, placed in patch closets in various parts of the building
Spine and Leaf topology
• In an SDN, a simple physical network is used that
can be programmed to act as a complex virtual
network
• Such a network can be organized in a spine and
leaf topology
• Characteristics:
 The spine switches are not interconnected
 Each leaf switch is connected to all spine switches
 Each server is connected to two leaf switches
 The connections between spine and leaf switches typically
have ten times the bandwidth of the connectivity between
the leaf switches and the servers
Spine and Leaf topology

• Benefits:
 Highly scalable
 There are no interconnects between the spine switches
 Simple to scale
 Just add spine or leaf servers
 With today’s high density switches, many physical servers can be connected using
relatively few switches
 Each server is always exactly four hops away from every other server
 Leads to a very predictable latency
Network teaming

• Network teaming is also known as:


 Link aggregation
 Port trunking
 Network bonding

• Provides a virtual network connection using multiple physical cables for


high availability and increased bandwidth
• Network teaming bonds physical NICs together to form a logical network
team
Spanning Tree Protocol (STP)

• STP is an Ethernet level protocol that runs on switches


• Guarantees that only one path is active between two network endpoints at any
given time
• Redundant paths are automatically activated when the active path experiences
problems
• Ensures no loops are created when redundant paths are available in the network
• A disadvantage of using the spanning tree protocol is that it is not using half of
the network links in a network, since it blocks redundant paths
• Shortest Path Bridging (SPB) allows all paths to be active simultaneously, enables
much larger topologies, supports faster convergence times, and improves
efficiency by allowing traffic to be load balanced across all paths
 While STP can take 30 to 60 seconds to respond to a topology change, SPB can respond to
changes in less than a second
Spanning Tree Protocol
Multihoming

• Connecting a network to two different Internet Service Providers (ISPs) is


called multihoming
• Four options for multihoming:
 Single router with dual links to a single ISP
 Single router with dual links to two separate ISPs
 Dual routers, each with its own link to a single ISP
 Dual routers, each with its own link to a separate ISP

• It is not always guaranteed that multiple network paths actually run on a


different set of cables
 WAN cables are typically installed alongside highways and railway tracks
 Cables are used by multiple carrier providers
Network performance – Nielsen’s law

• Network connection speeds


for high-end home users
increase 50% per year, they
double every 21 months
• Regular bandwidths should be
2 Gbit/s in 2026, still for a
price of about $50 per month

Please note that the vertical scale is


logarithmic instead of linear
Throughput and bandwidth

• Throughput is the amount of data that is transferred through the network


during a specific time interval
• Throughput is limited by the available bandwidth
• When an application requires more throughput than a network
connection can deliver:
 Queues in the network components temporarily buffer data
 Buffered data is sent as soon as the network connection is free again
 When more data arrives than the queues can store in the buffer, packet loss occurs
Latency

• Latency is defined as the time from the start of packet transmission to the
start of packet reception
• Latency is dependent on:
 The physical distance a packet has to travel
 The number of switches and routers the packet has to pass

• Rules of thumb:
 6 ms latency per 100 km
 WANs: Each switch in the path adds 10 ms to the one-way delay
 LANs: add 1 ms for each switch
Latency

• One-way latency: the time from the source sending a packet to the
destination receiving it
• Round-trip latency: the one-way latency from source to destination plus
the one-way latency from the destination back to the source
• “ping” can be used to measure round-trip latency
Quality of Service (QoS)

• Quality of service (QoS) is the ability to provide different data flow priority
to different applications, users, or types of data
• QoS allows better service to certain important data flows compared to less
important data flows
• QoS is mainly used for real-time applications like video and audio streams
and VoIP telephony
Quality of Service (QoS)

• Four basic ways to implement QoS:


 Congestion management
 Defines what must be done if the amount of data to be sent exceeds the bandwidth of
the network link
 Packets can either be dropped or queued
 Queue management
 When queues are full, packets will be dropped
 Queue management defines criteria for dropping packets that are of lower priority before
dropping higher-priority packets
 Link efficiency
 Ensures the link is used in an optimized way
 For instance by fragmenting large packets with a low QoS, allowing packets with a high
QoS to be sent between the fragments of low QoS packets
 Traffic shaping
 Limiting the full bandwidth of streams with a low QoS to benefit streams with a high QoS
 High QoS streams have a reserved amount of bandwidth
WAN link compression

• Data compression reduces the size of data before it is transmitted over a


WAN connection
• WAN acceleration appliances:
 Provide compression
 Perform some caching of regularly used data at remote sites
Network encryption

• All data that traverses the network should be encrypted


• Encrypting data on the network is called encrypting data in transit (as
opposed to encrypting data at rest)
• Data can be encrypted between two endpoints, such as a server and a
client. This is called end-to-end encryption. An example is HTTPS for traffic
from a web server to a web browser
• Even when using end to end encryption, network traffic must always be
encrypted
• Encryption is often a feature of the network components in the datacenter
Firewalls

• Firewalls separate two or more LAN or WAN segments for security reasons
• Firewalls block all unpermitted network traffic between network segments
• Permitted traffic must be explicitly enabled by configuring the firewall to
allow it
• Firewalls can be implemented:
 In hardware appliances
 As an application on physical servers
 In virtual machines

• Host based firewalls


 Protect a server or end user computer against network based attacks
 Part of the operating system
Firewalls

• Firewalls use one or more of the following methods to control traffic:


 Packet filtering
 Data packets are analyzed using preconfigured filters
 This functionality is almost always available on routers and most operating systems
 Proxy (also known as application layer firewalls or API gateways)
 A proxy terminates the session on the application level on behalf of the server (proxy) or the
client (reverse proxy) and creates a new session to the client or server
 Stateful inspection
 Inspects the placement of each individual packet within a packet stream
 Maintains records of all connections passing through the firewall and determines whether a
packet is the start of a new connection, part of an existing connection, or is an invalid packet
Network segmentation

Segmentation

Micro segmentation
IDS/IPS

• An Intrusion Detection System (IDS) or Intrusion Prevention System (IPS)


detects and – if possible – prevents activities that compromise system
security, or are a hacking attempt
• An IDS/IPS monitors for suspicious activity and alerts the systems manager
when these activities are detected
• An IPS can stop attacks by changing firewall rules on the fly
IDS/IPS

• Two types of IDS/IPS systems:


 A Network-based IDS (NIDS) is placed at a strategic point in the network
 Monitors traffic to and from all devices on that network
 The NIDS is not part of the network flow, but just “looks at it”, to avoid detection of the NIDS
by hackers
 A Host-based IDS (HIDS) runs on individual servers or network devices
 It monitors the network traffic of that device
 It also monitors user behavior and the alteration of critical (system) files
RADIUS

• Remote Authentication Dial In User Service (RADIUS) is a networking


protocol that provides centralized user and authorization management for
network devices
 Routers
 Modem servers
 Switches
 VPN routers
 Wireless network access points

• RADIUS
 Authenticates users or devices before granting them access to a network
 Authorizes users or devices for certain network services

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy