SlideShare a Scribd company logo
1 of 22
©2014 Amir Jafari – www.amir-Jafari.com
Network Design
Agenda
©2014 Amir Jafari – www.amir-Jafari.com
 Introduction
 Analyze the Customer Requirements
 Characterize the Existing Network and Sites
 Design the Network Topology and Solutions
 Design a Network Topology
 Design a Model for Network Layer Addressing and Naming
 Select the Switching and Routing Protocols
 Network Security Design
 Network Management Design
 Optimize the Network Design
 Select Technologies and Devices
 Test the Network Design
 Document the Network Design
Introduction
©2014 Amir Jafari – www.amir-Jafari.com
 Why do we need modern network design?
 Rise of new technologies
 Traditional network boundaries have been removed
 Complexities of networks
 Reduce the time to develop and market products
 What affect Network Design?
 Business drivers
Return on investment, Regulation, Competitiveness
 Technology drivers
Removal of borders, Virtualization, Growth of applications
Introduction
©2014 Amir Jafari – www.amir-Jafari.com
 Objective
present a systematic design methodology that meet a customer’s
business and technical goals
 Network Design Methodology
Step 1. Analyze Customer Requirements
Step 2. Characterize the Existing Network and Sites
Step 3. Design the Network Topology and Solutions
Analyze the Customer
Requirements
©2014 Amir Jafari – www.amir-Jafari.com
Step 1. Identify network applications and services.
Step 2. Define the organizational goals.
Step 3. Define the possible organizational constraints.
Step 4. Define the technical goals.
Step 5. Define the possible technical constraints.
Analyze the Customer
Requirements
©2014 Amir Jafari – www.amir-Jafari.com
Characterize the Existing Network
and Sites
©2014 Amir Jafari – www.amir-Jafari.com
Step 1. Gather existing documentation and query the organization
Step 2. Perform a network audit
Step 3. Use traffic analysis
 Identifying Major Traffic Sources and Stores
 Characterizing Types of Traffic Flow for New Network Applications
 Characterizing Traffic Behavior
 Characterizing Quality of Service Requirements
Design the Network Topology and
Solutions
©2014 Amir Jafari – www.amir-Jafari.com
Top-Down Approach
Design a Network Topology
©2014 Amir Jafari – www.amir-Jafari.com
Modular
Network
Design
Design a Model for Network Layer
Addressing and Naming
©2014 Amir Jafari – www.amir-Jafari.com
 Using a Structured Model for Network Layer Addressing
 Using a Hierarchical Model for Assigning Addresses
 Administering Addresses by a Central Authority
 Using Dynamic Addressing for End Systems
 Designing a Model for Naming
Select the Switching and Routing
Protocols
©2014 Amir Jafari – www.amir-Jafari.com
Making Decisions
Select the Switching and Routing
Protocols
©2014 Amir Jafari – www.amir-Jafari.com
 Selecting Switching Protocols
VLANNIG, VLAN Trunking Protocols (ISL, Dot1q), inter-VLAN Routing,
VTP, STP, RSTP, PVST+, CEF
 Selecting Routing Protocols
 Characterizing Routing Protocols
Distance-vector, link-state, or hybrid, Interior or exterior, Classless or
classful, Fixed-length or variable-length subnet masks (VLSM), Flat or
hierarchical, IPv4 or IPv6
 Routing Protocol Metrics and Loop Prevention
 Scalability Constraints for Routing Protocols
Select the Switching and Routing
Protocols
©2014 Amir Jafari – www.amir-Jafari.com
Routing
Protocol
Comparisons
Network Security Design
©2014 Amir Jafari – www.amir-Jafari.com
 Security Strategy
 Identifying Network Assets
 Analyzing Security Risks
 Analyzing Security Requirements
 Developing a Security Plan
 Developing a Security Policy
 Developing Security Procedures
 Maintaining Security
 Security Mechanisms
Physical Security, Authentication, Authorization, Accounting (Auditing), Data
Encryption, Packet Filters, Firewalls, Intrusion Detection and Prevention Systems
 Monitoring, Analysis, and Correlation
Network Management Design
©2014 Amir Jafari – www.amir-Jafari.com
 Network Management Functional Areas
 Fault management
 Configuration management
 Accounting management
 Performance management
 Security management
 Network Management Architectures
 A managed device
 An agent
 A network management system (NMS)
 Selecting Network Management Tools and Protocols
Optimize the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
 Quality Issues in Converged Networks
 Bandwidth capacity
 End-to-end delay (both fixed and variable):
 Variation of delay (also called jitter)
 Packet loss
 QoS
The main categories of mechanism
 Classification and marking
 Congestion management
 Congestion avoidance
 Policing and shaping
 Link efficiency
Optimize the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
 QoS Models
 Best effort
 IntServ
 DiffServ
Select Technologies and
Devices
©2014 Amir Jafari – www.amir-Jafari.com
 Cabling Topologies and Types of Cable for Campus Networks
 Campus- and building-cabling topologies
 Cables between buildings
 Location of telecommunications closets
 Vertical cabling between floors
 Horizontal cabling within floors
 Criteria for Selecting Internetworking Devices
Number of ports, Processing speed, Amount of memory, Throughput in packets
per second, LAN and WAN technologies supported, Media (cabling) supported,
Support for redundant power supplies, Support for QoS features,…
Select Technologies and
Devices
©2014 Amir Jafari – www.amir-Jafari.com
 Selecting Technologies for Enterprise Networks
 Remote-access technologies
 Point-to-Point Protocol (PPP)
 Cable modems
 Digital subscriber line (DSL)
 WAN technologies
 Leased lines
 Synchronous Digital Hierarchy (SDH)
 Frame Relay
Test the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
 Pilot and Prototype Tests
 Writing and Implementing a Test Plan for the Network Design
 Tools for Testing a Network Design
Document the Network Design
©2014 Amir Jafari – www.amir-Jafari.com
 Executive Summary
 Project Goal
 Project Scope
 Design Requirements
 Current State of the Network
 Logical Design
 Network Layer Addressing and Naming
 Switching and Routing Protocols
 Security Design
 Management Design
 Quality of service (QOS)
 Technologies and Devices
References
©2014 Amir Jafari – www.amir-Jafari.com
[1] John Tiso,“Designing Cisco Network Service Architectures (ARCH)”,
Cisco Press, USA, 2012
[2] Anthony Bruno,Steve Jordan,“CCDA 640-864 Official Cert Guide”,
Cisco Press, USA, 2011
[3] Priscilla Oppenheimer,“Top-Down Network Design”, Cisco Press,
USA, 2012
[4] “Cisco SAFE Reference Guide”, Cisco Systems, Inc., USA, 2010

More Related Content

What's hot

Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
Network Administrator Project PowerPoint
Network Administrator Project PowerPointNetwork Administrator Project PowerPoint
Network Administrator Project PowerPoint
Steven Washington
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
bcdran
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 

What's hot (20)

Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Network Administrator Project PowerPoint
Network Administrator Project PowerPointNetwork Administrator Project PowerPoint
Network Administrator Project PowerPoint
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
network design and administration
network design and administrationnetwork design and administration
network design and administration
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Cabling
CablingCabling
Cabling
 

Similar to Network design

Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
ekaypour
 
SM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social MediaSM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social Media
SM Consulting Services Inc
 
Company which only knows deploying Wireless Networks & secured WIFI in India
Company which only knows deploying  Wireless Networks & secured WIFI in IndiaCompany which only knows deploying  Wireless Networks & secured WIFI in India
Company which only knows deploying Wireless Networks & secured WIFI in India
Ppawan Chauhan
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011
andrewpugh
 
Contingent Overview
Contingent OverviewContingent Overview
Contingent Overview
mstuhlreyer
 
Baker Charlie
Baker CharlieBaker Charlie
Baker Charlie
Carl Ford
 

Similar to Network design (20)

WiTech Company Profile
WiTech Company ProfileWiTech Company Profile
WiTech Company Profile
 
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
 
SM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social MediaSM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social Media
 
04b-radcliffe
04b-radcliffe04b-radcliffe
04b-radcliffe
 
Presentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfPresentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdf
 
Company which only knows deploying Wireless Networks & secured WIFI in India
Company which only knows deploying  Wireless Networks & secured WIFI in IndiaCompany which only knows deploying  Wireless Networks & secured WIFI in India
Company which only knows deploying Wireless Networks & secured WIFI in India
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 
AARNet Enterprise Services presentation at QUESTNET 2018
AARNet Enterprise Services presentation at QUESTNET 2018AARNet Enterprise Services presentation at QUESTNET 2018
AARNet Enterprise Services presentation at QUESTNET 2018
 
Metro Network Transformation
Metro Network TransformationMetro Network Transformation
Metro Network Transformation
 
cv
cvcv
cv
 
Brightcomms Company Profile
Brightcomms Company ProfileBrightcomms Company Profile
Brightcomms Company Profile
 
MobileComm Training Services
MobileComm Training ServicesMobileComm Training Services
MobileComm Training Services
 
How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN
 
Metro network transformation
Metro network transformationMetro network transformation
Metro network transformation
 
Experience the Windstream Advantage
Experience the Windstream AdvantageExperience the Windstream Advantage
Experience the Windstream Advantage
 
Routed Optical Networking by Shahnaz Mohamad, Cisco
Routed Optical Networking by Shahnaz Mohamad, CiscoRouted Optical Networking by Shahnaz Mohamad, Cisco
Routed Optical Networking by Shahnaz Mohamad, Cisco
 
Contingent Overview
Contingent OverviewContingent Overview
Contingent Overview
 
Baker Charlie
Baker CharlieBaker Charlie
Baker Charlie
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overview
 

More from Amir Jafari

More from Amir Jafari (20)

Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr grids
 
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and RoutesCCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
 
CCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco RoutersCCNA R&S-19-Operating Cisco Routers
CCNA R&S-19-Operating Cisco Routers
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol ConceptsCCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
 
CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on SwitchCCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
 
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part ICCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
 
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and ApplicationsCCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
 
CCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANsCCCNA R&S-04-Fundamentals of WANs
CCCNA R&S-04-Fundamentals of WANs
 
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsCCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
 

Recently uploaded

Scouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring methodScouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring method
vimal412355
 
Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptx
Mostafa Mahmoud
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
AshwaniAnuragi1
 

Recently uploaded (20)

Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
Overview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsOverview of Transformation in Computer Graphics
Overview of Transformation in Computer Graphics
 
Scouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring methodScouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring method
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Study of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block DiagramStudy of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block Diagram
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 

Network design

  • 1. ©2014 Amir Jafari – www.amir-Jafari.com Network Design
  • 2. Agenda ©2014 Amir Jafari – www.amir-Jafari.com  Introduction  Analyze the Customer Requirements  Characterize the Existing Network and Sites  Design the Network Topology and Solutions  Design a Network Topology  Design a Model for Network Layer Addressing and Naming  Select the Switching and Routing Protocols  Network Security Design  Network Management Design  Optimize the Network Design  Select Technologies and Devices  Test the Network Design  Document the Network Design
  • 3. Introduction ©2014 Amir Jafari – www.amir-Jafari.com  Why do we need modern network design?  Rise of new technologies  Traditional network boundaries have been removed  Complexities of networks  Reduce the time to develop and market products  What affect Network Design?  Business drivers Return on investment, Regulation, Competitiveness  Technology drivers Removal of borders, Virtualization, Growth of applications
  • 4. Introduction ©2014 Amir Jafari – www.amir-Jafari.com  Objective present a systematic design methodology that meet a customer’s business and technical goals  Network Design Methodology Step 1. Analyze Customer Requirements Step 2. Characterize the Existing Network and Sites Step 3. Design the Network Topology and Solutions
  • 5. Analyze the Customer Requirements ©2014 Amir Jafari – www.amir-Jafari.com Step 1. Identify network applications and services. Step 2. Define the organizational goals. Step 3. Define the possible organizational constraints. Step 4. Define the technical goals. Step 5. Define the possible technical constraints.
  • 6. Analyze the Customer Requirements ©2014 Amir Jafari – www.amir-Jafari.com
  • 7. Characterize the Existing Network and Sites ©2014 Amir Jafari – www.amir-Jafari.com Step 1. Gather existing documentation and query the organization Step 2. Perform a network audit Step 3. Use traffic analysis  Identifying Major Traffic Sources and Stores  Characterizing Types of Traffic Flow for New Network Applications  Characterizing Traffic Behavior  Characterizing Quality of Service Requirements
  • 8. Design the Network Topology and Solutions ©2014 Amir Jafari – www.amir-Jafari.com Top-Down Approach
  • 9. Design a Network Topology ©2014 Amir Jafari – www.amir-Jafari.com Modular Network Design
  • 10. Design a Model for Network Layer Addressing and Naming ©2014 Amir Jafari – www.amir-Jafari.com  Using a Structured Model for Network Layer Addressing  Using a Hierarchical Model for Assigning Addresses  Administering Addresses by a Central Authority  Using Dynamic Addressing for End Systems  Designing a Model for Naming
  • 11. Select the Switching and Routing Protocols ©2014 Amir Jafari – www.amir-Jafari.com Making Decisions
  • 12. Select the Switching and Routing Protocols ©2014 Amir Jafari – www.amir-Jafari.com  Selecting Switching Protocols VLANNIG, VLAN Trunking Protocols (ISL, Dot1q), inter-VLAN Routing, VTP, STP, RSTP, PVST+, CEF  Selecting Routing Protocols  Characterizing Routing Protocols Distance-vector, link-state, or hybrid, Interior or exterior, Classless or classful, Fixed-length or variable-length subnet masks (VLSM), Flat or hierarchical, IPv4 or IPv6  Routing Protocol Metrics and Loop Prevention  Scalability Constraints for Routing Protocols
  • 13. Select the Switching and Routing Protocols ©2014 Amir Jafari – www.amir-Jafari.com Routing Protocol Comparisons
  • 14. Network Security Design ©2014 Amir Jafari – www.amir-Jafari.com  Security Strategy  Identifying Network Assets  Analyzing Security Risks  Analyzing Security Requirements  Developing a Security Plan  Developing a Security Policy  Developing Security Procedures  Maintaining Security  Security Mechanisms Physical Security, Authentication, Authorization, Accounting (Auditing), Data Encryption, Packet Filters, Firewalls, Intrusion Detection and Prevention Systems  Monitoring, Analysis, and Correlation
  • 15. Network Management Design ©2014 Amir Jafari – www.amir-Jafari.com  Network Management Functional Areas  Fault management  Configuration management  Accounting management  Performance management  Security management  Network Management Architectures  A managed device  An agent  A network management system (NMS)  Selecting Network Management Tools and Protocols
  • 16. Optimize the Network Design ©2014 Amir Jafari – www.amir-Jafari.com  Quality Issues in Converged Networks  Bandwidth capacity  End-to-end delay (both fixed and variable):  Variation of delay (also called jitter)  Packet loss  QoS The main categories of mechanism  Classification and marking  Congestion management  Congestion avoidance  Policing and shaping  Link efficiency
  • 17. Optimize the Network Design ©2014 Amir Jafari – www.amir-Jafari.com  QoS Models  Best effort  IntServ  DiffServ
  • 18. Select Technologies and Devices ©2014 Amir Jafari – www.amir-Jafari.com  Cabling Topologies and Types of Cable for Campus Networks  Campus- and building-cabling topologies  Cables between buildings  Location of telecommunications closets  Vertical cabling between floors  Horizontal cabling within floors  Criteria for Selecting Internetworking Devices Number of ports, Processing speed, Amount of memory, Throughput in packets per second, LAN and WAN technologies supported, Media (cabling) supported, Support for redundant power supplies, Support for QoS features,…
  • 19. Select Technologies and Devices ©2014 Amir Jafari – www.amir-Jafari.com  Selecting Technologies for Enterprise Networks  Remote-access technologies  Point-to-Point Protocol (PPP)  Cable modems  Digital subscriber line (DSL)  WAN technologies  Leased lines  Synchronous Digital Hierarchy (SDH)  Frame Relay
  • 20. Test the Network Design ©2014 Amir Jafari – www.amir-Jafari.com  Pilot and Prototype Tests  Writing and Implementing a Test Plan for the Network Design  Tools for Testing a Network Design
  • 21. Document the Network Design ©2014 Amir Jafari – www.amir-Jafari.com  Executive Summary  Project Goal  Project Scope  Design Requirements  Current State of the Network  Logical Design  Network Layer Addressing and Naming  Switching and Routing Protocols  Security Design  Management Design  Quality of service (QOS)  Technologies and Devices
  • 22. References ©2014 Amir Jafari – www.amir-Jafari.com [1] John Tiso,“Designing Cisco Network Service Architectures (ARCH)”, Cisco Press, USA, 2012 [2] Anthony Bruno,Steve Jordan,“CCDA 640-864 Official Cert Guide”, Cisco Press, USA, 2011 [3] Priscilla Oppenheimer,“Top-Down Network Design”, Cisco Press, USA, 2012 [4] “Cisco SAFE Reference Guide”, Cisco Systems, Inc., USA, 2010

Editor's Notes

  1. Beginning course details and/or books/materials needed for a class/project.
  2. Beginning course details and/or books/materials needed for a class/project.
  3. Beginning course details and/or books/materials needed for a class/project.
  4. Beginning course details and/or books/materials needed for a class/project.
  5. Beginning course details and/or books/materials needed for a class/project.
  6. Beginning course details and/or books/materials needed for a class/project.
  7. Beginning course details and/or books/materials needed for a class/project.
  8. Beginning course details and/or books/materials needed for a class/project.
  9. Beginning course details and/or books/materials needed for a class/project.
  10. Beginning course details and/or books/materials needed for a class/project.
  11. Beginning course details and/or books/materials needed for a class/project.
  12. Beginning course details and/or books/materials needed for a class/project.
  13. Beginning course details and/or books/materials needed for a class/project.
  14. Beginning course details and/or books/materials needed for a class/project.
  15. Beginning course details and/or books/materials needed for a class/project.
  16. Beginning course details and/or books/materials needed for a class/project.
  17. Beginning course details and/or books/materials needed for a class/project.
  18. Beginning course details and/or books/materials needed for a class/project.
  19. Beginning course details and/or books/materials needed for a class/project.
  20. Beginning course details and/or books/materials needed for a class/project.
  21. Beginning course details and/or books/materials needed for a class/project.