SlideShare a Scribd company logo
1 of 27
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.0
Creating the Network
Design
Designing and Supporting Computer Networks – Chapter 5
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Objectives
 Analyze business goals and application requirements
to determine what factors affect the network design
 Utilize the hierarchical design model to develop a
cost-effective network design that matches the
organization’s requirements
 Select the appropriate WAN connectivity option to
meet the organization’s requirements
 Incorporate wireless connectivity into the LAN design,
based on the results of the wireless survey
 Incorporate security into the LAN/WAN design,
including placement of firewalls, IDS, and ACLs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Analyze Business Goals and Application
Requirements
 List business goals that must be met by the new design
 Decide which design elements must be present in the
final design
 Explore alternatives to constraints
 Make trade-offs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Analyze Business Goals and Application
Requirements
Strategies for scalability:
 Access Layer modules
 Expandable, modular equipment
 Broadcast limitation
 Multiple links
 Localized VLANs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Analyze Business Goals and Application
Requirements
Availability requirements:
 Affordable implementation, maximum protection from
failure
 Availability for e-commerce
 Security monitoring system
 IP telephone system
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Analyze Business Goals and Application
Requirements
Performance requirements:
 Transaction-processing
 Video distribution and monitoring
 IP telephone voice quality
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Analyze Business Goals and Application
Requirements
Security requirements:
 Use of firewalls
 VPNs
 Intrusion prevention
systems
 Endpoint security
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Analyze Business Goals and Application
Requirements
Design trade-offs:
 Accommodate business goals
 Eliminate or complicate other improvements
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Utilize the Hierarchical Design Model to
Develop a Cost-Effective Network Design
Access Layer requirements:
 Connectivity for existing devices and new devices
 VLANs to separate voice, security, wireless, and
normal data services
 Redundancy
 QoS
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Utilize the Hierarchical Design Model to
Develop a Cost-Effective Network Design
 Capabilities of existing technology
 Limitations of existing equipment
 Power requirements
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Utilize the Hierarchical Design Model to
Develop a Cost-Effective Network Design
Distribution layer requirements:
 Redundant components and links
 High-density routing
 Traffic filtering
 QoS implementation
 High-bandwidth connectivity
 Fast convergence
 Route summarization
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Utilize the Hierarchical Design Model to
Develop a Cost-Effective Network Design
Core Layer requirements:
 High-speed connectivity
 Routed interconnections
 High-speed redundant
links
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Utilize the Hierarchical Design Model to
Develop a Cost-Effective Network Design
 Create the logical LAN diagram, including the locations
of servers and services
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Select the Appropriate WAN Connectivity
Option
 Determine WAN services needed for remote sites
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Select the Appropriate WAN Connectivity
Option
 Select the appropriate WAN connectivity method and
identify the equipment required to support it
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Select the Appropriate WAN Connectivity
Option
 Backing up the Frame Relay link
 Supporting remote workers
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Select the Appropriate WAN Connectivity
Option
 Evaluate IP addressing and routing methodologies for
WAN traffic based on company requirements
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Incorporate Wireless Connectivity into
the LAN Design
 Identify the appropriate wireless equipment and
capabilities to meet specific design requirements
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Incorporate Wireless Connectivity into
the LAN Design
Integrating wired and wireless solutions:
 Lightweight Access Points (LAPs)
 Wireless LAN controllers
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Incorporate Wireless Connectivity into
the LAN Design
Factors influencing availability in a wireless network:
 Location of the AP
 Signal strength of the AP
 Number of users
 Dynamic reconfiguration
 Centralization
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Incorporate Wireless Connectivity into
the LAN Design
Create an IP address scheme for a wireless LAN:
 Layer 3 roaming
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Incorporate Security into the LAN/WAN
Design
 Determine the source and nature of potential threats
 Draw a diagram of the placement of security functions
and filters
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Primary categories of security services:
 Infrastructure protection
 Secure connectivity
 Threat detection, defense, and mitigation
Incorporate Security into the LAN/WAN
Design
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Incorporate Security into the LAN/WAN
Design
Design and implement the appropriate access filters to
meet a specific network security requirement:
 Firewall rule sets
 Access control lists
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Incorporate Security into the LAN/WAN
Design
Include access control lists and firewall rules in the
design documentation:
 Provide evidence that the security policy is
implemented
 Ensure that when changes are made, existing rules are
known
 Assist in troubleshooting
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Summary
 For each business goal, the designer determines what
network changes are necessary.
 Converged networks carry a combination of data, voice,
and video traffic.
 Designing WAN connectivity requires evaluation of the
telecommunications services available in the
customer’s area.
 Unified wireless network solutions offer advanced
features.
 The network designer must identify which data is at risk
and what the potential sources of attacks are.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27

More Related Content

What's hot

CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
Irsandi Hasan
 
Chapter 7
Chapter 7 Chapter 7
Chapter 7
ali raza
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6
Irsandi Hasan
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
Irsandi Hasan
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
Irsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
shah_ril1512
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
shah_ril1512
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
Irsandi Hasan
 
Cisco orientation
Cisco orientationCisco orientation
Cisco orientation
ali raza
 
CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7
Irsandi Hasan
 
Inside Cisco IT: Secure and Simplified Cloud Services with ACI
Inside Cisco IT: Secure and Simplified Cloud Services with ACIInside Cisco IT: Secure and Simplified Cloud Services with ACI
Inside Cisco IT: Secure and Simplified Cloud Services with ACI
Cisco IT
 

What's hot (20)

CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 
Chapter 7
Chapter 7 Chapter 7
Chapter 7
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
 
Cisco orientation
Cisco orientationCisco orientation
Cisco orientation
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7CCNA Discovery 4 - Chapter 7
CCNA Discovery 4 - Chapter 7
 
Inside Cisco IT: Secure and Simplified Cloud Services with ACI
Inside Cisco IT: Secure and Simplified Cloud Services with ACIInside Cisco IT: Secure and Simplified Cloud Services with ACI
Inside Cisco IT: Secure and Simplified Cloud Services with ACI
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
 
Week2 2
Week2 2Week2 2
Week2 2
 
Aci presentation
Aci presentationAci presentation
Aci presentation
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 

Viewers also liked

Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
ali raza
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
ali raza
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
ali raza
 
Chapter 4 overview
Chapter 4 overviewChapter 4 overview
Chapter 4 overview
ali raza
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
ali raza
 
Chapter 7 overview
Chapter 7 overviewChapter 7 overview
Chapter 7 overview
ali raza
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
ali raza
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
ali raza
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
Irsandi Hasan
 
Data Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseData Center Network Trends - Lin Nease
Data Center Network Trends - Lin Nease
HPDutchWorld
 

Viewers also liked (11)

Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Chapter 4 overview
Chapter 4 overviewChapter 4 overview
Chapter 4 overview
 
VPN Security
VPN SecurityVPN Security
VPN Security
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Chapter 7 overview
Chapter 7 overviewChapter 7 overview
Chapter 7 overview
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
Data Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseData Center Network Trends - Lin Nease
Data Center Network Trends - Lin Nease
 

Similar to Chapter 5

CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
Irsandi Hasan
 
CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2
Irsandi Hasan
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
Irsandi Hasan
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
Irsandi Hasan
 

Similar to Chapter 5 (20)

CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2CCNA Discovery 4 - Chapter 2
CCNA Discovery 4 - Chapter 2
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
 
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
Week2 3
Week2 3Week2 3
Week2 3
 
Quotation- General Phalanx
Quotation- General PhalanxQuotation- General Phalanx
Quotation- General Phalanx
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
Week2 1
Week2 1Week2 1
Week2 1
 
Tharun Resume
Tharun ResumeTharun Resume
Tharun Resume
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
 
operational-telecom-network-connected-pipeline-design-guide.pdf
operational-telecom-network-connected-pipeline-design-guide.pdfoperational-telecom-network-connected-pipeline-design-guide.pdf
operational-telecom-network-connected-pipeline-design-guide.pdf
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Chapter 5

  • 1. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.0 Creating the Network Design Designing and Supporting Computer Networks – Chapter 5
  • 2. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Objectives  Analyze business goals and application requirements to determine what factors affect the network design  Utilize the hierarchical design model to develop a cost-effective network design that matches the organization’s requirements  Select the appropriate WAN connectivity option to meet the organization’s requirements  Incorporate wireless connectivity into the LAN design, based on the results of the wireless survey  Incorporate security into the LAN/WAN design, including placement of firewalls, IDS, and ACLs
  • 3. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Analyze Business Goals and Application Requirements  List business goals that must be met by the new design  Decide which design elements must be present in the final design  Explore alternatives to constraints  Make trade-offs
  • 4. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Analyze Business Goals and Application Requirements Strategies for scalability:  Access Layer modules  Expandable, modular equipment  Broadcast limitation  Multiple links  Localized VLANs
  • 5. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Analyze Business Goals and Application Requirements Availability requirements:  Affordable implementation, maximum protection from failure  Availability for e-commerce  Security monitoring system  IP telephone system
  • 6. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Analyze Business Goals and Application Requirements Performance requirements:  Transaction-processing  Video distribution and monitoring  IP telephone voice quality
  • 7. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7 Analyze Business Goals and Application Requirements Security requirements:  Use of firewalls  VPNs  Intrusion prevention systems  Endpoint security
  • 8. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8 Analyze Business Goals and Application Requirements Design trade-offs:  Accommodate business goals  Eliminate or complicate other improvements
  • 9. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9 Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design Access Layer requirements:  Connectivity for existing devices and new devices  VLANs to separate voice, security, wireless, and normal data services  Redundancy  QoS
  • 10. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10 Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design  Capabilities of existing technology  Limitations of existing equipment  Power requirements
  • 11. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11 Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design Distribution layer requirements:  Redundant components and links  High-density routing  Traffic filtering  QoS implementation  High-bandwidth connectivity  Fast convergence  Route summarization
  • 12. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12 Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design Core Layer requirements:  High-speed connectivity  Routed interconnections  High-speed redundant links
  • 13. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13 Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design  Create the logical LAN diagram, including the locations of servers and services
  • 14. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14 Select the Appropriate WAN Connectivity Option  Determine WAN services needed for remote sites
  • 15. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15 Select the Appropriate WAN Connectivity Option  Select the appropriate WAN connectivity method and identify the equipment required to support it
  • 16. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16 Select the Appropriate WAN Connectivity Option  Backing up the Frame Relay link  Supporting remote workers
  • 17. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17 Select the Appropriate WAN Connectivity Option  Evaluate IP addressing and routing methodologies for WAN traffic based on company requirements
  • 18. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18 Incorporate Wireless Connectivity into the LAN Design  Identify the appropriate wireless equipment and capabilities to meet specific design requirements
  • 19. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19 Incorporate Wireless Connectivity into the LAN Design Integrating wired and wireless solutions:  Lightweight Access Points (LAPs)  Wireless LAN controllers
  • 20. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20 Incorporate Wireless Connectivity into the LAN Design Factors influencing availability in a wireless network:  Location of the AP  Signal strength of the AP  Number of users  Dynamic reconfiguration  Centralization
  • 21. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21 Incorporate Wireless Connectivity into the LAN Design Create an IP address scheme for a wireless LAN:  Layer 3 roaming
  • 22. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22 Incorporate Security into the LAN/WAN Design  Determine the source and nature of potential threats  Draw a diagram of the placement of security functions and filters
  • 23. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23 Primary categories of security services:  Infrastructure protection  Secure connectivity  Threat detection, defense, and mitigation Incorporate Security into the LAN/WAN Design
  • 24. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24 Incorporate Security into the LAN/WAN Design Design and implement the appropriate access filters to meet a specific network security requirement:  Firewall rule sets  Access control lists
  • 25. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25 Incorporate Security into the LAN/WAN Design Include access control lists and firewall rules in the design documentation:  Provide evidence that the security policy is implemented  Ensure that when changes are made, existing rules are known  Assist in troubleshooting
  • 26. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26 Summary  For each business goal, the designer determines what network changes are necessary.  Converged networks carry a combination of data, voice, and video traffic.  Designing WAN connectivity requires evaluation of the telecommunications services available in the customer’s area.  Unified wireless network solutions offer advanced features.  The network designer must identify which data is at risk and what the potential sources of attacks are.
  • 27. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27