SlideShare una empresa de Scribd logo
1 de 22
Top-Down Network Design

            Chapter Three

   Characterizing the Existing Internetwork



       Copyright 2010 Cisco Press & Priscilla Oppenheimer
What’s the Starting Point?
• According to Abraham Lincoln:
  – “If we could first know where we are and
    whither we are tending, we could better judge
    what to do and how to do it.”
Where Are We?
• Characterize the existing internetwork in
  terms of:
  – Its infrastructure
       • Logical structure (modularity, hierarchy, topology)
       • Physical structure
  –   Addressing and naming
  –   Wiring and media
  –   Architectural and environmental constraints
  –   Health
Get a Network Map
  Medford                                                                              Roseburg
Fast Ethernet                                                                         Fast Ethernet
  50 users                                                                              30 users
                             Frame Relay              Frame Relay
                            CIR = 56 Kbps            CIR = 56 Kbps
                               DLCI = 5                 DLCI = 4




                                           Gigabit                            Grants Pass
                                                                                  HQ
                                          Ethernet                              Gigabit
            Grants Pass                                                        Ethernet
                 HQ
            Fast Ethernet
              75 users
                                                                                           FEP
                                                                                      (Front End
                                                                                      Processor)

                                                                                             IBM
                                                                                       Mainframe
                                     T1

                                                             Web/FTP server
         Eugene
         Ethernet                                                    T1           Internet
         20 users
Characterize Addressing and
             Naming
• IP addressing for major devices, client
  networks, server networks, and so on
• Any addressing oddities, such as
  discontiguous subnets?
• Any strategies for addressing and naming?
  – For example, sites may be named using airport
    codes
     • San Francisco = SFO, Oakland = OAK
Discontiguous Subnets

                              Area 0
                             Network
                           192.168.49.0

Router A                                                Router B


          Area 1                                 Area 2
   Subnets 10.108.16.0 -                  Subnets 10.108.32.0 -
       10.108.31.0                            10.108.47.0
Characterize the Wiring and
                Media
•   Single-mode fiber
•   Multi-mode fiber
•   Shielded twisted pair (STP) copper
•   Unshielded-twisted-pair (UTP) copper
•   Coaxial cable
•   Microwave
•   Laser
•   Radio
•   Infra-red
Campus Network Wiring
                         Horizontal        Work-Area
                          Wiring            Wiring

                                      Wallplate
            Telecommunications
               Wiring Closet




 Vertical
 Wiring
(Building
Backbone)




                                   Main Cross-Connect Room                   Intermediate Cross-Connect Room
                                  (or Main Distribution Frame)              (or Intermediate Distribution Frame)




                                                                  Campus
                 Building A - Headquarters                       Backbone                  Building B
Architectural Constraints
• Make sure the following are sufficient
  –   Air conditioning
  –   Heating
  –   Ventilation
  –   Power
  –   Protection from electromagnetic interference
  –   Doors that can lock
Architectural Constraints

• Make sure there’s space for:
  –   Cabling conduits
  –   Patch panels
  –   Equipment racks
  –   Work areas for technicians installing and
      troubleshooting equipment
Issues for Wireless Installations

•   Reflection
•   Absorption
•   Refraction
•   Diffraction
Check the Health of the Existing
         Internetwork
•   Performance
•   Availability
•   Bandwidth utilization
•   Accuracy
•   Efficiency
•   Response time
•   Status of major routers, switches, and
    firewalls
Characterize Availability

                           Date and Duration   Cause of Last   Fix for Last
             MTBF   MTTR   of Last Major       Major           Major
                           Downtime            Downtime        Downtime


Enterprise


Segment 1


Segment 2


Segment n
Network Utilization in Minute
             Intervals
                         Network Utilization

  16:40:00

  16:43:00

  16:46:00

  16:49:00

  16:52:00

  16:55:00                                                     Series1
Time
  16:58:00

  17:01:00

  17:04:00

  17:07:00

  17:10:00
             0   1   2       3                 4   5   6   7
                                 Utilization
Network Utilization in Hour
               Intervals
                                 Network Utilization


  13:00:00



  14:00:00



  15:00:00                                                                     Series1
Time


  16:00:00



  17:00:00


             0   0.5   1   1.5        2              2.5   3   3.5   4   4.5
                                       Utilization
Bandwidth Utilization by
                    Protocol
             Relative      Absolute                  Multicast
                                         Broadcast
             Network       Network                   Rate
                                         Rate
             Utilization   Utilization


Protocol 1


Protocol 2


Protocol 3


Protocol n
Characterize Packet Sizes
Characterize Response Time

          Node A   Node B   Node C   Node D


            X
Node A

                    X
Node B


Node C                        X


Node D                                 X
Check the Status of Major
Routers, Switches, and Firewalls
•   show buffers
•   show environment
•   show interfaces
•   show memory
•   show processes
•   show running-config
•   show version
Tools
•   Protocol analyzers
•   Multi Router Traffic Grapher (MRTG)
•   Remote monitoring (RMON) probes
•   Cisco Discovery Protocol (CDP)
•   Cisco IOS NetFlow technology
•   CiscoWorks
Summary
• Characterize the existing internetwork before
  designing enhancements
• Helps you verify that a customer’s design
  goals are realistic
• Helps you locate where new equipment will
  go
• Helps you cover yourself if the new network
  has problems due to unresolved problems in
  the old network
Review Questions
• What factors will help you decide if the existing
  internetwork is in good enough shape to support new
  enhancements?
• When considering protocol behavior, what is the
  difference between relative network utilization and
  absolute network utilization?
• Why should you characterize the logical structure of
  an internetwork and not just the physical structure?
• What architectural and environmental factors should
  you consider for a new wireless installation?

Más contenido relacionado

La actualidad más candente

Network management
Network managementNetwork management
Network managementElena Benson
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerationsnikshaikh786
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer serverAbenezer Abiti
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking RequirementsSteven Cahill
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkRutwik Jadhav
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 

La actualidad más candente (20)

Network management
Network managementNetwork management
Network management
 
Chapter13
Chapter13Chapter13
Chapter13
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerations
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
5. what is network cabling
5. what is network cabling5. what is network cabling
5. what is network cabling
 
Firewalls
FirewallsFirewalls
Firewalls
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Chapter11
Chapter11Chapter11
Chapter11
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 

Similar a Chapter03

Chapter 3 networking by amareshow12
Chapter 3 networking by amareshow12Chapter 3 networking by amareshow12
Chapter 3 networking by amareshow12Assosa University
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookMuhammad Shafiq
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comULLPTT
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.comULLPTT
 
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」Sho Shimizu
 
( คิง ) หน่วยที่ 1ความหมายและความสำคัญ
( คิง ) หน่วยที่ 1ความหมายและความสำคัญ( คิง ) หน่วยที่ 1ความหมายและความสำคัญ
( คิง ) หน่วยที่ 1ความหมายและความสำคัญKin Kanin
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5rajrayala
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Vsat day-2008-comtech
Vsat day-2008-comtechVsat day-2008-comtech
Vsat day-2008-comtechSSPI Brasil
 
Resilient Network Design Concepts Educat
Resilient Network Design Concepts EducatResilient Network Design Concepts Educat
Resilient Network Design Concepts EducatSamGrandprix
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Editiondznet
 
9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)Jeff Green
 
Power point presentation
Power point presentationPower point presentation
Power point presentationrajasekarsankar
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System DesignMrirfan
 

Similar a Chapter03 (20)

Chapter 3 networking by amareshow12
Chapter 3 networking by amareshow12Chapter 3 networking by amareshow12
Chapter 3 networking by amareshow12
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management book
 
To Infiniband and Beyond
To Infiniband and BeyondTo Infiniband and Beyond
To Infiniband and Beyond
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Chapter8 6up
Chapter8 6upChapter8 6up
Chapter8 6up
 
FTTH
FTTHFTTH
FTTH
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
 
( คิง ) หน่วยที่ 1ความหมายและความสำคัญ
( คิง ) หน่วยที่ 1ความหมายและความสำคัญ( คิง ) หน่วยที่ 1ความหมายและความสำคัญ
( คิง ) หน่วยที่ 1ความหมายและความสำคัญ
 
pps Matters
pps Matterspps Matters
pps Matters
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Vsat day-2008-comtech
Vsat day-2008-comtechVsat day-2008-comtech
Vsat day-2008-comtech
 
Resilient Network Design Concepts Educat
Resilient Network Design Concepts EducatResilient Network Design Concepts Educat
Resilient Network Design Concepts Educat
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Edition
 
9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System Design
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Chapter03

  • 1. Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. What’s the Starting Point? • According to Abraham Lincoln: – “If we could first know where we are and whither we are tending, we could better judge what to do and how to do it.”
  • 3. Where Are We? • Characterize the existing internetwork in terms of: – Its infrastructure • Logical structure (modularity, hierarchy, topology) • Physical structure – Addressing and naming – Wiring and media – Architectural and environmental constraints – Health
  • 4. Get a Network Map Medford Roseburg Fast Ethernet Fast Ethernet 50 users 30 users Frame Relay Frame Relay CIR = 56 Kbps CIR = 56 Kbps DLCI = 5 DLCI = 4 Gigabit Grants Pass HQ Ethernet Gigabit Grants Pass Ethernet HQ Fast Ethernet 75 users FEP (Front End Processor) IBM Mainframe T1 Web/FTP server Eugene Ethernet T1 Internet 20 users
  • 5. Characterize Addressing and Naming • IP addressing for major devices, client networks, server networks, and so on • Any addressing oddities, such as discontiguous subnets? • Any strategies for addressing and naming? – For example, sites may be named using airport codes • San Francisco = SFO, Oakland = OAK
  • 6. Discontiguous Subnets Area 0 Network 192.168.49.0 Router A Router B Area 1 Area 2 Subnets 10.108.16.0 - Subnets 10.108.32.0 - 10.108.31.0 10.108.47.0
  • 7. Characterize the Wiring and Media • Single-mode fiber • Multi-mode fiber • Shielded twisted pair (STP) copper • Unshielded-twisted-pair (UTP) copper • Coaxial cable • Microwave • Laser • Radio • Infra-red
  • 8. Campus Network Wiring Horizontal Work-Area Wiring Wiring Wallplate Telecommunications Wiring Closet Vertical Wiring (Building Backbone) Main Cross-Connect Room Intermediate Cross-Connect Room (or Main Distribution Frame) (or Intermediate Distribution Frame) Campus Building A - Headquarters Backbone Building B
  • 9. Architectural Constraints • Make sure the following are sufficient – Air conditioning – Heating – Ventilation – Power – Protection from electromagnetic interference – Doors that can lock
  • 10. Architectural Constraints • Make sure there’s space for: – Cabling conduits – Patch panels – Equipment racks – Work areas for technicians installing and troubleshooting equipment
  • 11. Issues for Wireless Installations • Reflection • Absorption • Refraction • Diffraction
  • 12. Check the Health of the Existing Internetwork • Performance • Availability • Bandwidth utilization • Accuracy • Efficiency • Response time • Status of major routers, switches, and firewalls
  • 13. Characterize Availability Date and Duration Cause of Last Fix for Last MTBF MTTR of Last Major Major Major Downtime Downtime Downtime Enterprise Segment 1 Segment 2 Segment n
  • 14. Network Utilization in Minute Intervals Network Utilization 16:40:00 16:43:00 16:46:00 16:49:00 16:52:00 16:55:00 Series1 Time 16:58:00 17:01:00 17:04:00 17:07:00 17:10:00 0 1 2 3 4 5 6 7 Utilization
  • 15. Network Utilization in Hour Intervals Network Utilization 13:00:00 14:00:00 15:00:00 Series1 Time 16:00:00 17:00:00 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 Utilization
  • 16. Bandwidth Utilization by Protocol Relative Absolute Multicast Broadcast Network Network Rate Rate Utilization Utilization Protocol 1 Protocol 2 Protocol 3 Protocol n
  • 18. Characterize Response Time Node A Node B Node C Node D X Node A X Node B Node C X Node D X
  • 19. Check the Status of Major Routers, Switches, and Firewalls • show buffers • show environment • show interfaces • show memory • show processes • show running-config • show version
  • 20. Tools • Protocol analyzers • Multi Router Traffic Grapher (MRTG) • Remote monitoring (RMON) probes • Cisco Discovery Protocol (CDP) • Cisco IOS NetFlow technology • CiscoWorks
  • 21. Summary • Characterize the existing internetwork before designing enhancements • Helps you verify that a customer’s design goals are realistic • Helps you locate where new equipment will go • Helps you cover yourself if the new network has problems due to unresolved problems in the old network
  • 22. Review Questions • What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? • When considering protocol behavior, what is the difference between relative network utilization and absolute network utilization? • Why should you characterize the logical structure of an internetwork and not just the physical structure? • What architectural and environmental factors should you consider for a new wireless installation?

Notas del editor

  1. Reflection. Reflection causes the signal to bounce back on itself. The signal can interfere with itself in the air and affect the receiver’s ability to discriminate between the signal and noise in the environment. Reflection is caused by metal surfaces such as steel girders, scaffolding, shelving units, steel pillars, and metal doors. Implementing a Wireless LAN (WLAN) across a parking lot can be tricky because of metal cars that come and go. Absorption. Some of the electromagnetic energy of the signal can be absorbed by the material in objects through which it passes, resulting in a reduced signal level. Water has significant absorption properties, and objects such as trees or thick wooden structures can have a high water content. Implementing a WLAN in a coffee shop can be tricky if there are large canisters of liquid coffee. Coffee-shop WLAN users have also noticed that people coming and going can affect the signal level. (On StarTrek, a non-human character once called a human “an ugly giant bag of mostly water”!) Refraction. When an RF signal passes from a medium with one density into a medium with another density, the signal can be bent, much like light passing through a prism. The signal changes direction and may interfere with the non-refracted signal. It can take a different path and encounter other, unexpected obstructions, and arrive at recipients damaged or later than expected. As an example, a water tank not only introduces absorption, but the difference in density between the atmosphere and the water can bend the RF signal. Diffraction. Diffraction, which is similar to refraction, results when a region through which the RF signal can pass easily is adjacent to a region in which reflective obstructions exist. Like refraction, the RF signal is bent around the edge of the diffractive region and can then interfere with that part of the RF signal that is not bent.
  2. Relative usage specifies how much bandwidth is used by the protocol in comparison to the total bandwidth currently in use on the segment. Absolute usage specifies how much bandwidth is used by the protocol in comparison to the total capacity of the segment (for example, in comparison to 100 Mbps on Fast Ethernet).