Chapter 2
Chapter 2
CHAPTER 2
Structuring and Modularizing the Network
Implementing a core layer reduces the complexity of the network,making it easier to manage and
troubleshoot.
The core layer design enables the efficient,high-speed transfer of data between one section of the
network and another. The primary design goals at the core layer are as follows:
Provide 100% uptime, Maximize throughput, and Facilitate network growth.
Technologies used at the core layer include the following:
Routers or multilayer switchesthat combine routing and switching in the same device
Routing protocols that scale well and converge quickly,such as Enhanced Interior GatewayRouting
Protocol (EIGRP)and Open Shortest Path First (OSPF) Protocol
Redundant Links
Implementing redundant links at the core layer ensures that network devices can find alternate paths to
send data in the event of a failure. When Layer 3 devices are placed at the core layer,these redundant
links can be used for load balancing in addition to providing backup. In a flat,Layer 2 network
design,Spanning Tree Protocol (STP) disables redundant links unless a primary link fails. This STP
behavior prevents load balancing over the redundant links. To perform this redundancy most core layers
in a network are wired in either a full-meshor partial-mesh topology.
Preventing Failures
Failures at the core layer can potentially affect all users of the network. Therefore, preventing
failures becomes a daunting task. The network designer has to incorporate features or additions to
the design to minimize or eliminate the effects of a core layer failure. The users on a network do not
want to wait to complete their daily tasks because of a lack of care in the design.The network
designer must strive to provide a network that is resistant to failures and that can recover quickly in
the event of a failure. Core routers and switches can contain the following:
Dual power supplies and fans
A modular chassis-based design
Additional management modules
Redundant components increase the cost,but they are usually well worth the investment. Core layer devices
should havehot-swappable components whenever possible. Larger enterprises often install generators and
large uninterruptible power supply (UPS) devices. These devices prevent minor power outages from causing
large-scale network failures.
installed, and documented. Plan a back-out strategy to return the network to its previous state in case
changes are not successful.
Trunks
Trunk links areoften configured between access and distribution layer networking devices. Trunks are
used to carry traffic that belongs to multiple VLANs between devices over the same link. The network
designer considers the overall VLAN strategy and network traffic patterns when designing the
trunklinks.
Distribution Layer Topology
Distribution layer networks are usually wired in a partial-mesh topology. This topology provides
enough redundant paths to ensure that the network can survive a link or device failure. When the
distribution layer devices are located in the same wiring closet or data center,they are
interconnected using gigabit links. When the devices are separated by longer distances,fiber cable is
used. Switches that support multiple high-speed fiber connections can be expensive,so careful
planning is necessary to ensure that enough fiber ports are available to provide the desired
bandwidth and redundancy.
access points. Ethernet over copper wiring poses distance limitations. Therefore, one of the primary
concerns when designing the access layer of a campus infrastructure is the physical location of the
equipment.
Wiring Closets
Wiring closets can be actual closets or small telecommunication rooms that act as the termination
point for infrastructure cabling within buildings or within floors of a building. The placement and
physical size of the wiring closets depends on network size and expansion plans.
The wiring closet equipment provides power to end devices such as IP phones and wireless access points.
Many access layer switches have Power-over-Ethernet (PoE) functionality.
The access, distribution, and core layers can appear within each module of the Cisco Enterprise
Architecture. The modularity built into the architecture allows flexibility in network design and facilitates
implementation and troubleshooting. Before the details of the architecture itself are introduced, an overview
of the evolution of enterprise networks is provided.
An efficient method of solving and scaling a complex task is to break it into smaller, more specialized tasks.
Networks can easily be broken down smaller because they have natural physical, logical, and functional
boundaries. The Cisco Enterprise Architecture reduces the enterprise network into further physical, logical,
and functional boundaries, to scale the hierarchical model. Now, rather than designing networks using only
the hierarchical model, networks can be designed using this Cisco Enterprise Architecture, with hierarchy
(access, distribution, and core) included in the various modules, as required.
Connectivity, Remote Access and VPN and,WAN and MAN and Site-to-Site VPN module.
providers (ISP). The modules within the Service Provider functional area are: Internet Service Provider,
PSTN and Frame Relay/ATM module
Internet Service Provider Module
This module represents enterprise IP connectivity to an ISP network for basic access to the Internet or for
enabling Enterprise Edge services, such as those in the E-commerce, Remote Access and VPN, and Internet
Connectivity modules. Enterprises can connect to two or more ISPs to provide redundant connections to the
Internet. The physical connection between the ISP and the enterprise can use any of the WAN technologies.
Public Switched Telephone Network Module
The PSTN module represents all nonpermanent WAN connections.The PSTN module represents the dialup
infrastructure for accessing the enterprise network using ISDN, analog, and wireless telephony (cellular)
technologies. Enterprises can also use this infrastructure to back up existing WAN links; WAN backup
connections are generally established on demand and torn down after an idle timeout.
Frame Relay/ATM Module
This module covers all WAN technologies for permanent connectivity with remote locations.
Traditional Frame Relay and ATM are still used; however, despite the module's name, it also represents
many modern technologies. The technologies in this module include the following:
Frame Relay is a connection-oriented, packet-switching technology designed to efficiently transmit data
traffic at data rates of up to those used by E3 and T3 connections. Its capability to connect multiple
remote sites across a single physical connection reduces the number of point-to-point physical
connections required to link sites.E3 is a European standard with a bandwidth of 34.368 megabits per second
(Mbps). T3 is a North American standard with a bandwidth of 44.736 Mbps.
ATM is a higher-speed alternative to Frame Relay. It is a high-performance, cell-oriented, switching and
multiplexing technology for carrying different types of traffic.
Remote Enterprise Modules
The three modules supporting remote enterprise locations are the Enterprise Branch, the Enterprise Data
Center, and the Enterprise Teleworker.
Enterprise Branch Module
This module extends the enterprise by providing each location with a resilient network architecture with
integrated security, Cisco Unified Communications, and wireless mobility.A branch office is sometimes
called a remote site, remote office, or sales office. Branch office users must be able to connect to the central
site to access company information. The Enterprise Branch module typically uses a simplified version of the
Campus Infrastructure module design.
Enterprise Data Center Module
This module has an architecture that is similar to the campus Server Farm module discussed earlier. The
Enterprise Data Center network architecture allows the network to evolve into a platform that enhances the
application, server, and storage solutions and equips organizations to manage increased security, cost, and
regulatory requirements while providing the ability to respond quickly to changing business environments.
Compiled By Chalachew A. 10 | P a g e
Network Design Chapter 2
solutions provide simple and safe access for teleworkers to the corporate network site, according to the
needs of the users at the sites.
For example, through intelligent network classification, the network distinguishes and identifies traffic
based on application content and context. Advanced network services use the traffic classification to
regulate performance, ensure security, facilitate delivery, and improve manageability.
Network applications such as IP telephony support the entire enterprise network environment from the
teleworker to the campus to the data center. These applications are enabled by critical network services and
provide a common set of capabilities to support the application’s networkwide requirements, including
security, high availability, reliability, flexibility, responsiveness, and compliancy.
Recall the layers of the SONA interactive services layer includes both application networking services
and infrastructure services.
For example, the following infrastructure services enhance classic network functions to support
today's applications environments by mapping the application's requirements to the resources that they
require from the network:
Security services: Ensure that all aspects of the network are secure, from devices connecting to the
network to secured transport to data theft prevention
Mobility services: Allow users to access network resources regardless of their physical location
Storage services: Provide distributed and virtual storage across the infrastructure
Voice and collaboration services: Deliver the foundation by which voice can be carried across the
network, such as security and high availability
Compute services: Connect and virtualize compute resources based on the application
Identity services: Map resources and policies to the user and device
The following sections explore some of the infrastructure services and application networking services.
Security Services in a Modular Network Design
Compiled By Chalachew A. 11 | P a g e
Network Design Chapter 2
Security is an infrastructure service that increases the network's integrity by protecting network resources
and users from internal and external threats. Security both in the Enterprise Campus (internal security) and
at the Enterprise Edge (from external threats) is important. An enterprise should include several layers of
protection so that a breach at one layer or in one network module does not mean that other layers or modules
are also compromised; Cisco calls deploying layered security defense-in-depth.
Internal Security
Strongly protecting the internal Enterprise Campus by including security functions in each individual
element is important for the following reasons:
If the security established at the Enterprise Edge fails, an unprotected Enterprise Campus is
vulnerable. Deploying several layers of security increases the protection of the Enterprise Campus,
where the most strategic assets usually reside.
Relying on physical security is not enough. For example, as a visitor to the organization, a potential
attacker could gain physical access to devices in the Enterprise Campus.
Often external access does not stop at the Enterprise Edge; some applications require at least indirect
access to the Enterprise Campus resources. Strong security must protect access to these resources.
The following are some recommended security practices in each module:
At the Building Access layer, access is controlled at the port level using the data link layer
information. Some examples are filtering based on media access control addresses and IEEE 802.1X
port authentication.
The Building Distribution layer performs filtering to keep unnecessary traffic from the Campus
Core. This packet filtering can be considered a security function because it does prevent some
undesired access to other modules. Given that switches in the Building Distribution layer are
typically multilayer switches (and are therefore Layer 3–aware), this is the first place on the data
path in which filtering based on network layer information can be performed.
The Campus Core layer is a high-speed switching backbone and should be designed to switch
packets as quickly as possible; it should not perform any security functions, because doing so would
slow down the switching of packets.
The Server Farm module's primary goal is to provide application services to end users and devices.
The Server Farm module typically includes network management systems to securely manage all
devices and hosts within the enterprise architecture. For example, syslog provides important
information on security violations and configuration changes by logging security-related events
(authentication and so on). An authentication, authorization, and accounting (AAA) security server
also works with a one-time password (OTP) server to provide a high level of security to all local and
remote users. AAA and OTP authentication reduces the likelihood of a successful password attack.
IPS and IDS
IDSs act like an alarm system in the physical world. When an IDS detects something it considers an attack,
it either takes corrective action or notifies a management system so that an administrator can take action.
Intrusion prevention solutions form a core element of a successful security solution because they detect and
block attacks, including worms, network viruses, and other malware through inline intrusion prevention,
innovative technology, and identification of malicious network activity.
Authentication, Authorization, and Accounting (AAA)
AAA is a crucial aspect of network security that should be considered during the network design. An AAA
server handles the following:
Authentication—Who? Authentication checks the user's identity, typically through a username and
password combination.
Compiled By Chalachew A. 12 | P a g e
Network Design Chapter 2
Authorization—What? After the user is authenticated, the AAA server dictates what activity the
user is allowed to perform on the network.
Accounting—When? The AAA server can record the length of the session, the services accessed
during the session, and so forth.
External Threats
When designing security in an enterprise network, the Enterprise Edge is the first line of defense at which
potential outside attacks can be stopped. The Enterprise Edge is like a wall with small doors and strong
guards that efficiently control any access. The following four attack methods are commonly used in attempts
to compromise the integrity of the enterprise network from the outside:
IP spoofing: An IP spoofing attack occurs when a hacker uses a trusted computer to launch an attack
from inside or outside the network. The hacker uses either an IP address that is in the range of a
network's trusted IP addresses or a trusted external IP address that provides access to specified
resources on the network.
Password attacks: Using a packet sniffer to determine usernames and passwords is a simple password
attack; however, the term password attack usually refers to repeated brute-force attempts to identify
username and password information. Trojan horse programs are another method that can be used to
determine this information. A hacker might also use IP spoofing as a first step in a system attack by
violating a trust relationship based on source IP addresses. First, however, the system would have to be
configured to bypass password authentication so that only a username is required.
DoS attacks: DoS attacks are different from most other attacks because they are not generally targeted
at gaining access to a network or its information. Rather, these attacks focus on making a service
unavailable for normal use. They are typically accomplished by exhausting some resource limitation on
the network or within an operating system or application. When involving specific network server
applications, such as a web server or an FTP server, these attacks focus on acquiring and keeping open
all the available connections supported by that server, thereby effectively locking out valid users of the
server or service. DoS attacks are also implemented using common Internet protocols, such as TCP and
Internet Control Message Protocol (ICMP).
Application layer attacks: Application layer attacks typically exploit well-known weaknesses in
common software programs to gain access to a computer.Hackers perform application layer attacks
using several different methods. One of the most common methods is exploiting well-known
weaknesses in software commonly found on servers, such as SMTP, HTTP, and FTP. By exploiting
these weaknesses, hackers gain access to a computer with the permissions of the account that runs the
application.
Compiled By Chalachew A. 13 | P a g e
Network Design Chapter 2
points of failure.The key requirement in redundancy is to provide alternative paths for mission-critical
applications. Simply making the backbone fault-tolerant does not ensure high availability.
In a wireless network, many issues can arise to prevent the RF signal from reaching all parts of the facility,
including multipath distortion, hidden node problems, interference from other wireless sources, and near/far
issues. Privacy and security issues must also be considered in a wireless network. Because WLANs are
typically connected to the wired network, all the modules within the enterprise infrastructure must be
considered to ensure the success of a wireless deployment.
Compiled By Chalachew A. 15 | P a g e
Network Design Chapter 2
event occurs and when it is collected by the NMS; there is a trade-off between polling frequency and
bandwidth usage.
Protocol: SNMP is a protocol for message exchange. It uses the User Datagram Protocol (UDP)
transport mechanism to send and retrieve management information, such as MIB variables.
Managed device: A device (such as a router) managed by the manager.
Management agents: SNMP management agents reside on managed devices to collect and store a range
of information about the device and its operation, respond to the manager's requests, and generate traps
to inform the manager about certain events. SNMP traps are sent by management agents to the NMS
when certain events occur.
MIB: The management agent collects data and stores it locally in the MIB, a database of objects about
the device. Community strings, which are similar to passwords, control access to the MIB. To access or
set MIB variables, the user must specify the appropriate read or write community string; otherwise,
access is denied.
Compiled By Chalachew A. 16 | P a g e
Network Design Chapter 2
is breached; this helps reduce management traffic. RMON provides effective network fault diagnosis,
performance tuning, and planning for network upgrades.
NetFlow
Cisco NetFlow is a measurement technology that measures flows that pass through Cisco devices. NetFlow
was originally implemented only on larger devices; it is now available on other devices, including
ISRs.NetFlow answers the questions of what, when, where, and how traffic is flowing in the network.
NetFlow data can be exported to network management applications to further process the information,
providing tables and graphs for accounting and billing or as an aid for network planning. The key
components of NetFlow are the NetFlow cache or data source that stores IP flow information and the
NetFlow export or transport mechanism that sends NetFlow data to a network management collector, such
as the NetFlow Collection Engine.
NetFlow-collected data serves as the basis for a set of applications, including network traffic accounting,
usage-based network billing, network planning, and network monitoring.
CDP
CDP is a Cisco-proprietary protocol that operates between Cisco devices at the data link layer. CDP
information is sent only between directly connected Cisco devices; a Cisco device never forwards a CDP
frame.CDP enables systems that support different network layer protocols to communicate and enables
other Cisco devices on the network to be discovered. CDP provides a summary of directly connected
switches, routers, and other Cisco devices.
CDP is a media- and protocol-independent protocol that is enabled by default on each supported interface of
Cisco devices (such as routers, access servers, and switches). The physical media must support Subnetwork
Access Protocol encapsulation. Information in CDP frames includes the following:
Device ID: The name of the neighbor device and either the MAC address or the serial number of the
device.
Local Interface: The local (on this device) interface connected to the discovered neighbor.
Holdtime: The remaining amount of time (in seconds) that the local device holds the CDP
advertisement from a sending device before discarding it.
Capability List: The type of device discovered (R—Router, T—Trans Bridge, B—Source Route
Bridge, S—Switch, H—Host, I—IGMP, r—Repeater).
Platform: The device's product type.
Port Identifier (ID): The port (interface) number on the discovered neighbor on which the
advertisement is sent. This is the interface on the neighbor device to which the local device is
connected.
Address List: All network layer protocol addresses configured on the interface (or, in the case of
protocols configured globally, on the device). Examples include IP, Internetwork Packet Exchange,
and DECnet.
Compiled By Chalachew A. 17 | P a g e