Top-Down Network Design Second Edition By Priscilla Oppenheimer Publisher : Cisco Press Pub Date : May 27, 2004 ISBN : 1-58705-152-4 Pages : 600 A systems analysis approach to enterprise network design Master techniques for checking the health of an existing network to develop a baseline for measuring performance of a new network design Explore solutions for meeting QoS requirements, including ATM traffic management, IETF controlled-load and guaranteed services, IP multicast, and advanced switching, queuing, and routing algorithms Develop network designs that provide the high bandwidth and low delay required for real-time applications such as multimedia, distance learning, and videoconferencing Table of • Contents • Index Identify the advantages and disadvantages of various switching and routing protocols, including transparent bridging, Inter-Switch Link (ISL), IEEE 802.1Q, IGRP, EIGRP, OSPF, and BGP4 Effectively incorporate new technologies into enterprise network designs, including VPNs, wireless networking, and IP Telephony Top-Down Network Design, Second Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and manageable Using illustrations and realworld examples, it teaches a systematic method for network design that can be applied to campus LANs, remote-access networks, WAN links, and large-scale internetworks You will learn to analyze business and technical requirements, examine traffic flow and QoS requirements, and select protocols and technologies based on performance goals You will also develop an understanding of network performance factors such as network utilization, throughput, accuracy, efficiency, delay, and jitter Several charts and job aids will help you apply a top-down approach to network design This Second Edition has been revised to include new and updated material on wireless networks, virtual private networks (VPNs), network security, network redundancy, modularity in network designs, dynamic addressing for IPv4 and IPv6, new network design and management tools, Ethernet scalability options (including 10-Gbps Ethernet, Metro Ethernet, and Long-Reach Ethernet), and networks that carry voice and data traffic Top-Down Network Design, Second Edition, has a companion website at http://www.topdownbook.com, which includes updates to the book, links to white papers, and supplemental information about design resources This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers Top-Down Network Design Second Edition By Priscilla Oppenheimer Publisher : Cisco Press Table of Pub Date : May 27, 2004 • ISBN : 1-58705-152-4 Contents Pages : 600 • Index Copyright About the Author About the Technical Reviewers Acknowledgments Icons Used in This Book Command Syntax Conventions Introduction Changes for the Second Edition Objectives Organization Part II: Logical Network Design Part IV: Testing, Optimizing, and Documenting Your Network Design Audience Part I: Identifying Your Customer's Needs and Goals Part III: Physical Network Design Companion Website Part I Identifying Your Customer's Needs and Goals Chapter 1 Analyzing Business Goals and Constraints Using a Top-Down Network Design Methodology Analyzing Business Goals Business Goals Checklist Analyzing Business Constraints Summary Chapter 2 Analyzing Technical Goals and Tradeoffs Scalability Availability Security Usability Affordability Technical Goals Checklist Network Performance Manageability Adaptability Making Network Design Tradeoffs Summary Chapter 3 Characterizing the Existing Internetwork Checking the Health of the Existing Internetwork Network Health Checklist Characterizing the Network Infrastructure Tools for Characterizing the Existing Internetwork Summary Chapter 4 Characterizing Network Traffic Characterizing Traffic Flow Characterizing Traffic Load Characterizing Quality of Service Requirements Summary Characterizing Traffic Behavior Network Traffic Checklist Summary for Part I Part II Logical Network Design Chapter 5 Designing a Network Topology Hierarchical Network Design Redundant Network Design Topologies Designing a Campus Network Design Topology Secure Network Design Topologies Modular Network Design Designing the Enterprise Edge Topology Summary Chapter 6 Designing Models for Addressing and Naming Guidelines for Assigning Network Layer Addresses Using a Hierarchical Model for Assigning Addresses Summary Designing a Model for Naming Chapter 7 Selecting Switching and Routing Protocols Making Decisions as Part of the Top-Down Network Design Process Selecting Routing Protocols Summary Selecting Bridging and Switching Protocols A Summary of IP, AppleTalk, and IPX Routing Protocols Chapter 8 Developing Network Security Strategies Network Security Design Modularizing Security Design Security Mechanisms Summary Chapter 9 Developing Network Management Strategies Network Management Design Network Management Processes Selecting Protocols for Network Management Summary Network Management Architectures Selecting Tools for Network Management Summary for Part II Part III Physical Network Design Chapter 10 Selecting Technologies and Devices for Campus Networks LAN Cabling Plant Design LAN Technologies An Example of a Campus Network Design Selecting Internetworking Devices for a Campus Network Design Summary Chapter 11 Selecting Technologies and Devices for Enterprise Networks Remote-Access Technologies Selecting Remote-Access Devices for an Enterprise Network Design An Example of a WAN Design WAN Technologies Summary Summary for Part III Part IV Testing, Optimizing, and Documenting Your Network Design Chapter 12 Testing Your Network Design Using Industry Tests Tools for Testing a Network Design Building and Testing a Prototype Network System An Example of a Network Design Testing Scenario Summary Chapter 13 Optimizing Your Network Design Optimizing Bandwidth Usage with IP Multicast Technologies Optimizing Network Performance to Meet Quality of Service Requirements Cisco Internetwork Operating System Features for Optimizing Network Performance Summary Reducing Serialization Delay Chapter 14 Documenting Your Network Design Responding to a Customer's Request for Proposal Contents of a Network Design Document Summary Appendix A Characterizing Network Traffic When Workstations Boot Novell NetWare Packets AppleTalk Packets TCP/IP DHCP Packets NetBIOS with WINS Packets TCP/IP Packets NetBIOS (NetBEUI) Packets SNA Packets Appendix B References and Recommended Reading Glossary A B C E G - H J - K - L N Q - R T V D F I M O - P S U W X - Z Index Copyright Copyright © 2004 Cisco Systems, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing June 2004 Library of Congress Cataloging-in-Publication Number: 2003107988 Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Cisco Press or Cisco Systems, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Warning and Disclaimer This book is designed to provide information about top-down network design Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information is provided on an "as is" basis The authors, Cisco Press, and Cisco Systems, Inc shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc Corporate and Government Sales Cisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact: U.S Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com For sales outside of the U.S please contact: international@pearsoned.com Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community Readers' feedback is a natural continuation of this process If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at feedback@ciscopress.com Please make sure to include the book title and ISBN in your message We greatly appreciate your assistance Credits Publisher John Wait Editor-in-Chief John Kane Cisco Representative Anthony Wolfenden Cisco Press Program Manager Nannette M Noble Manager, Marketing Communications Production Manager Patrick Kanouse Development Editor Jill Batistick Project Editor Ginny Bess Munroe Copy Editor Keith Cline Technical Editors Matthew H Birkner Blair Buchanan Dr Peter J Welcher Team Coordinator Tammi Barnett Book and Cover Designer Louisa Adair Composition Octal Publishing, Inc TSpec (traffic specification) 2nd TTL (time-to-live) field tunneling IPv4 to IPv6 addresses twin-axial cables (twinax) twinax cables type-of-service QoS 2nd 3rd 4th DS (Differentiated Services) field 2nd field 2nd [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] U reference point ISDN 2nd UBR (unspecified bit rate) ATM Forum 2nd UDLD (Unidirectional Link Detection) 2nd UDP (User Datagram Protocol) flow control traceroute packet umbrella NMSs Umqua Systems, Inc design testing example background information conclusions 2nd 3rd current network 2nd DS-1 circuit 2nd FDDI backbone traffic 2nd 3rd 4th 5th goals 2nd methods 2nd network applications 2nd Oracle user data 2nd 3rd 4th 5th unicast addresses IPv6 aggregatable global 2nd 3rd IPv4 in IPv6 2nd link-local 2nd site-local 2nd Unidirectional Link Detection (UDLD) 2nd UNIX RIP daemon unshielded copper cables unshielded twisted-pair cables (UTP cables) categories 2nd unspecified bit rate [See UBR] UplinkFast 2nd upstream bandwidth cable modems uptime availability reliability usability documenting technical goals 2nd user communities documenting designs Klamath Paper Products WAN 2nd LANs design example 2nd User Datagram Protocol [See UDP] User History Collection group RMON2 users remote access device 2nd 3rd securing services 2nd traffic flow 2nd utilization existing networks 2nd 3rd bandwidth measures 2nd performance 2nd 3rd 4th 5th UTP cables (unshielded twisted-pair cables) categories 2nd [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] variable-length subnet masking [See VLSM] (VLSM) variance IGRP (Interior Gateway Routing Protocol) load sharing variance measurements VDSL (Very-High-Bit-Rate DSL) version logging vertical wiring 2nd 3rd Very-High-Bit-Rate DSL (VDSL) videoconferencing traffic virtual private networking [See VPNs] virtual private networks [See VPNs] Virtual Router Redundancy Protocol (VRRP) virtual routers Vivinet Assessor (NetIQ) VLAN Trunk Protocol (VTP) 2nd VLAN Trunking Protocol (VTP) VLANs campus network topology 2nd 3rd 4th design 2nd 3rd hierarchical topology distribution layer limiting broadcast domains switches switching protocols 2nd DISL (Dynamic Inter-Switch Link) 2nd IEEE 802.1Q document 2nd ISL (Inter-Switch Link) 2nd VTP (VLAN Trunk Protocol) 2nd VLSM (variable-length subnet masking) 2nd 3rd voice networks GoS (grade of service) requirements 2nd Voice over IP networks [See VoIP networks] voice-grade cabling VoIP networks (Voice over IP networks) traffic flow 2nd 3rd VPNs (virtual private networking) (virtual private networks) concentrators 2nd encryption enterprise edge topology 2nd remote-access 2nd 3rd site-to-site 2nd 3rd security 2nd 3rd 4th software securing wireless networks 2nd 3rd VRRP (Virtual Router Redundancy Protocol) VTP (VLAN Trunk Protocol) 2nd (VLAN Trunking Protocol) [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] WAN Survival Guide Wandering Valley Community College (WVCC) LANs design example background information 2nd business goals 2nd current network 2nd 3rd 4th 5th 6th 7th 8th 9th 10th data stores 2nd network applications 2nd redesign 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th technical goals 2nd user communities 2nd WANDL, Inc Network-Planning and Analysis Tool [See NPAT] WANs 2nd 3rd 4th (wide area networks) 2nd (wide-area networks) accuracy goals ATM (Asynchronous Transfer Mode) 2nd Ethernet over ATM 2nd bandwidth 2nd 3rd cable modem 2nd challenges 2nd 3rd design example background information 2nd business goals 2nd current network 2nd 3rd 4th 5th data stores 2nd network applications 2nd technical goals 2nd topology 2nd 3rd 4th user communities 2nd device selection central sites 2nd 3rd 4th 5th remote users 2nd 3rd DSL (Digital Subscriber Line) 2nd ADSL PPP implementation 2nd supported services 2nd flat topologies 2nd Frame Relay 2nd ATM (Asynchronous Transfer Mode) 2nd congestion 2nd 3rd hub-and-spoke topology 2nd split horizon subinterfaces 2nd traffic control 2nd 3rd ISDN (Integrate Services Digital Network) 2nd 3rd components 2nd 3rd ISDNs (Integrated Services Digital Network) leased lines 2nd operation affordability optimum utilization PPP (Point-to-Point Protocol) 2nd CHAP (Challenge Handshake Authentication Protocol) 2nd MPPP (Multilink PPP) 2nd PAP (Password Authentication Protocol) 2nd redundant 2nd circuit diversity 2nd routers 2nd servers service providers 2nd 3rd 4th SONET (Synchronous Optical Network) 2nd 3rd wave-division multiplexing (WDM) wave-division multiplexing (WDM) WDM (wave-division multiplexing) WDM (wave-division multiplexing) websites Frame Relay Forum Zeroconf Weighted Fair Queuing (WFQ) 2nd Weighted Random Early Detection (WRED) 2nd weighted-fair queuing (WFQ) Welcherm, Dr Peter fur-ball networks WEP keys (Wired Equivalent Privacy keys) WFQ (Weighted Fair Queuing) 2nd WFQ (weighted-fair queuing) Wi-Fi Protected Access (WPA) 2nd wide area networks [See WANs] wide wavelength-division multiplexing (WWDM) wide-area networks 2nd [See WANs] [See WANs] WildPackets AiroPeek analyzer windowing traffic efficiency 2nd 3rd 4th windows sizing 2nd WINS booting 2nd NetBT 2nd integrating DNS 2nd Wired Equivalent Privacy keys [See WEP keys] wireless access points LANs devices 2nd wireless cells wireless networks security 2nd authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th data privacy 2nd 3rd 4th 5th 6th 7th wireless site surveys 2nd 3rd 4th 5th wiring existing networks 2nd 3rd 4th environmental constraints 2nd 3rd 4th 5th 6th 7th 8th wirless networks LANs design example 2nd 3rd 4th WLANs campus network topology 2nd access points 2nd 3rd 4th multiple access points 2nd redundant access points 2nd 3rd LANs redesign example 2nd 3rd 4th work-area wiring 2nd workstation-to-router redundancy 2nd AppleTalk 2nd IP 2nd 3rd 4th GLBP (Gateway Load Balancing Protocol) 2nd HSRP (Hot Standby Router Protocol) 2nd 3rd 4th Novell NetWare 2nd workstations initialization 2nd 3rd World Wide Web public server access WPA (Wi-Fi Protected Access) 2nd WRED (Weighted Random Early Detection) 2nd WWDM (wide wavelength-division multiplexing) [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] X Windows X_Hlt430507403 X_Hlt430507914 XOR operation EtherChannel [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] your address (yiaddr) fields [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Zero Configuration Networking [See Zeroconf] Zeroconf (Zero Configuration Networking) IP dynamic addressing 2nd website ZIP (Zone Information Protocol) 2nd ZIP queries ZIP storms Zone Information Protocol (ZIP) 2nd zone information tables ... Characterizing Traffic Behavior Network Traffic Checklist Summary for Part I Part II Logical Network Design Chapter 5 Designing a Network Topology Hierarchical Network Design Redundant Network Design Topologies Designing a Campus Network Design Topology... Redundant Network Design Topologies Designing a Campus Network Design Topology Secure Network Design Topologies Modular Network Design Designing the Enterprise Edge Topology Summary Chapter 6 Designing Models for Addressing and Naming... technologies, and building successful careers Top- Down Network Design Second Edition By Priscilla Oppenheimer Publisher : Cisco Press Table of Pub Date : May 27, 2004 • ISBN : 1-58705-152-4 Contents Pages