* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download WAN topology
Multiprotocol Label Switching wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Net neutrality wikipedia , lookup
Computer security wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Network tap wikipedia , lookup
Wireless security wikipedia , lookup
Net neutrality law wikipedia , lookup
Airborne Networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
TV Everywhere wikipedia , lookup
Service-oriented architecture implementation framework wikipedia , lookup
Network design WAN topology Topic 5 Agenda • • • • • • • Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link types Enterprise Composite Network Model • A hierarchal and scalable blue-print for network designers • Enterprise campus – The elements for network operation within one campus (building) – Designed to provide high availability, scalability, and flexibility – Includes a campus backbone, a server farm, building access and building distribution modules and a network management module • Enterprise edge – Efficient and secure communication between the enterprise campus and remote locations, business partners, mobile users, and the Internet – Aggregates connectivity, provides traffic filtering and inspection and routing to the enterprise campus – Includes WAN, VPN, internet access, and e-commerce modules • Service provider edge – Enables communication with other networks – Uses different WAN technologies and Internet service providers (ISPs) Enterprise Composite Network Model Service Providers • Tier 1 provider – – – – • Tier 2 Provider – – – – • National or international backbone with at least DS-3, OC-3 to OC-48 connectivity All its routes from bilateral peering arrangements 24/7 network operations center Customers are primarily other providers, but it may support a large enterprise also Regional or national presence High bandwidth backbones and 24/7 operations Buys transit (discounted) from a Tier 1 provider for traffic that goes outside the region Gets all its regional routes through peering arrangements. Tier 3 Provider – Typically a regional provider for a small or medium-sized region – Buys transit from multiple upstream providers – Runs a default-free routing table • Tier 4 and Tier 5 Providers – Metropolitan provider multi-homed to two regional providers – Small, single-homed provider that connects end users via dialup, cable modem, or wireless service Enterprise edge module • • • • • Edge distribution – Interface to the enterprise network – Web security appliances and Intrusion Prevention appliances E-commerce – DMZ security zones with internet facing servers, network services such as DNS, FTP and NTP, email, websites and web portal – Separates internal and external services such as DNS, intranet and collaboration services Internet connectivity – Safe and secure access to internet for corporate users, and remote users Remote access VPN – Corporate access to remote users such as tele-workers and mobile workers WAN – Wan networks such as Frame Relay and ATM to other sites – Site-to-site VPNs for branch and partner sites – Protection services such as Intrusion Protection services Components • Inner switch – Provide connectivity between core and campus VLANs and firewall • Firewall – Stateful access control and deep packet inspection – Controlling user’s internet bound traffic – Protecting public services in DMZ • Outer switches – Provides connectivity between the firewall and the edge router • Edge routers – Route traffic from enterprise to the internet via one or more ISPs – Security such as ACLs and uRPF • Remote access appliances – Terminate remote-access VPNs such as SSL and Ipsec VPNs Design goals for the edge • Availability • Eliminate any single point of failure on the network – Redundancy • High availability for internet, extranet, and virtual private network (VPN) with redundant interfaces, standby devices, redundant links and devices • Reliability by duplicating any required component whose failure could disable critical applications – a channel service unit (CSU), a power supply, a WAN trunk, internet connectivity – Affordability • Trade-offs may be required Design goals for the edge • Backup paths – How much capacity does the backup path support? – How quickly will the network begin to use the backup path? – Common for a backup path to have less capacity than a primary path and use different technologies – Automatic failover is necessary for mission-critical applications – What about the cable to the ISP – often the weakest link • Multi-homing the internet connection – Providing an enterprise network with more than one entry into the Internet. • Circuit diversity – Different carriers sometimes use the same facilities – Ensure that your backup really is a backup Design goals for the edge • Management – Configurations – Monitor traffic flows – Monitor protocol and process efficiency – Security baselines • • • • Device access Routing security Device resilience Policy enforcement Designing process • What are the business and technical goals for the Enterprise Edge? – Who are the user communities? – What is the health of the existing network? – Where are the traffic flows? • What technologies? • What topology? • What link type? Security and remote access • Business and technical goals – Confidentiality and privacy – Integrity – Availability • Security technologies – Security zones, ACLs and network address translation – Access control • AAA services • Auditing – Protection • Application inspection • Monitoring and intrusion protection – Privacy • Encryption • Remote access – Remote access VPNS, SSL and Ipsec VPNS – Site-to-site VPNS WAN topologies • • • • Full mesh – Every router is connected to every other router for complete redundancy – Good performance because there is just a single link delay between any two sites – The number of links in a full-mesh topology is • (N * (N – 1)) / 2 – Expensive to deploy and maintain, hard to optimize, troubleshoot, and upgrade – Scalability limits for groups of routers that broadcast routing updates or service advertisements (20% broadcast rule) Partial mesh – Not every router is connected to every other router – Compromise solution • Partial redundancy • Less cost • Less performance as some destinations might require traversing intermediate links Hub and spoke (Star) – Common hierarchical design – Destinations are reached via the ‘hub’ Peer – No redundancy, least expensive, easiest setup Choosing a WAN link connection • What is the purpose of the WAN? • What is the geographic scope? • What are the traffic requirements? Type, volume, quality and security • Should the WAN use a private or public infrastructure? • For a private WAN, should it be dedicated or switched? • For a public WAN, what type of VPN access do you need? • Which connection options are available locally? • What is the cost of the available connection options? WAN link connection methods • Private – Dedicated • Leased lines Point-to-Point and Point-to-Multipoint PPP HDLC – Switched • Circuit Switched, PSTN, ISDN • Packet Switched, Frame Relay, X.25, ATM (cells) • Public – Internet • DSL, cable, broadband wireless • Satellite • Metro Ethernet Leased lines • Permanent dedicated connections leased from carrier – – – – T1 T3 E1 E3 1.544 Mb/s 44.736 Mb/s 2.048 Mb/s (Australia) 34.064 Mb/s (Australia) • A router serial port is required for each leased line connection. • A CSU/DSU and the actual circuit from the service provider are also required. – CSU/DSU is a Channel Service Unit/Data Service Unit that terminates T1/E1 carrier lines • Lower latency and jitter • No call setup required Public networks • DSL – Always-on connection technology that uses existing PSTN infrastructure and DSL access multiplexer (DSLAM) at the provider location – Varying data rates of up to 8.192 Mb/s and distance limitations • Cable – Always-on connection that uses existing cable TV infrastructure – Bandwidth shared by users • Broadband wireless – WiMax – High-speed broadband service over metro distances for many users – Provides broad coverage like a cell phone network • Satellite – Rural users, upload speed is about one-tenth of download speed – Satellite dish, two modems (uplink and downlink), and coaxial cables • Metro Ethernet – Reduced expenses and administration – Easy integration with existing networks Circuit switching • Establishes a circuit between hosts before communication can start • Initial very fast call setup to establish a dedicated circuit or path which cannot be used by others until call tear down • ISDN – Time-division multiplexed (TDM) digital signals – Uses 64 kb/s bearer channels (B) for carrying voice or data and a signaling, delta channel (D) for call setup and call management – Basic Rate Interface (BRI)-ISDN is intended for the home and small enterprise and provides two 64 kb/s B channels and a 16 kb/s D channel – Primary Rate Interface (PRI)-ISDN provides 30 B channels and one D channel, for an E1 link of 2.048 Mb/s • ISDN links are used by enterprises as an extra capacity and backup link Packet switching • Packets are routed individually and can follow different paths to destination and arrive out of order • Connection oriented packet switching verifies the existence of the destination with a 3-way handshake • Frame Relay – Permanent and shared connectivity for voice and data traffic using virtual circuits (up to 4 Mbp/s) – Frame Relay is ideal for connecting enterprise LANs • Asynchronous Transfer Mode (ATM) – Small, fixed-length cells carrying data, voice and video traffic over private and public networks Physical WAN serial standards • Standards to define how to transmit and receive signals – – – – – – – – – EIA/TIA-232 EIA/TIA-449 EIA-530 High-Speed Serial Interface (HSSI) V.24 V.35 X.25 X.21 G.703 Agenda • • • • • • • Enterprise topology Functions and components Security Design goals Physical standards Topologies WAN link types