SlideShare une entreprise Scribd logo
1  sur  201
Télécharger pour lire hors ligne
Fundamental of Network Analysis &
Design
Lecture Notes - 1 2
 What is a Network?
 Network Characteristics
 Generations of Networking
 What is “Network Design”?
 Network Development Life Cycle (NDLC)
 Top-Down Network Design
 PDIOO Network Life Cycle
 AndThenWhat?
Lecture Notes - 1 3
 Management view
 Technical view
Lecture Notes - 1 4
 A network is a UTILITY
▪ Computers and their users are customers of the network utility
▪ Utilities don’t bring money into the organization, it’s EXPENSES
 The network must accommodate the needs of customers
▪ As computer usage increases so does the requirements of the
network utility
 Resources will be used to manage the network
 The Network Utility is NOT free!
Lecture Notes - 1 5
 Try to show a direct correlation between the network design
project and the company’s business
▪ “Because you want a faster network” is not good enough, the
question that management sends back is WHY DO I NEED A
FASTER ONE?
What you should say to the manager?
 As a network designer, you need to explain to management
how the network design, even with the high expense, can
save money or improve the company’s business
▪ If users cannot log on to your commerce site, they will try your
competitor, and you have lost sales
▪ If you cannot get the information your customers are asking
about due to a network that is down, they may go to your
competitor
Lecture Notes - 1 6
 A “Network” really can be thought of
as three parts and they all need to be
considered when working on a
network design project:
▪ Connections
▪ Communications/Protocols
▪ Services
 Connections
▪ Provided by Hardware that ties things together
▪ Wire/Fiber/Wireless Transport Mechanisms
▪ Routers
▪ Switches/Hubs
▪ Computers
 Communications/Protocols
▪ Provided by Software
▪ A common language for 2 systems to
communicate with each other
▪ TCP/IP (Internet/Windows NT)
▪ IPX / SPX (Novell Netware 4)
▪ AppleTalk
▪ Other Network OS
 Services
▪ The Heart of Networking
▪ Cooperation between 2 or more systems to
perform some function - Applications
▪ telnet
▪ FTP
▪ HTTP
▪ SMTP
Lecture Notes - 1 8
 Based on a set of general rules
▪ Is the network down or up?
▪ “Bridge when you can, route when you must”
▪ Can’t deal with scalability & complexity?
Lecture Notes - 1 9
Applications Message
Length
Message
arrival rate
Delay need Reliability
need
Interactive
terminals
Short Low Moderate Very high
File transfer Very long Very low Very low Very high
Hi-resolution
graphics
Very long Low to
moderate
High Low
Packetized
voice
Very short Very high High Low
Lecture Notes - 1 10
Word Processing
File Transfers
Real-Time Imaging
100s Kbps Few Mbps
Few Mbps 10s Mbps
10s Mbps 100s Mbps
Transaction Processing
100 Bytes Few Kbps
Lecture Notes - 1 11
Video standard Bandwidth per
user
WAN services
Digital video
interactive
1.2 Mbps DS1 lines ISDN
H11, Frame
Relay, ATM
Motion JPEG 10 to 240 Mbps ATM 155 or 622
Mbps
MPEG-1 1.5 Mbps DS1 lines ISDN
H11, Frame
Relay, ATM
MPEG-2 4~6 Mbps DS2, DS3, ATM
at DS3 rate
Lecture Notes - 1 12
 LAN, MAN andWAN
 Switching and routing
 Technologies: Ethernet, FDDI, ATM …
 Wireless/Mobile networking
 Internetworking
 Applications
 Service quality
 Security concerns
Lecture Notes - 1 14
Lecture Notes - 1 16
Response Time Cost
Business Growth
Reliability
Lecture Notes - 1 17
WAN
Campus
Traffic
Patterns
Dial in Users
Security
WWW
Access
Users
Network
Management
Addressing
 A complete process that matches
business needs to available technology to
deliver a system that will maximize an
organization’s success
▪ In the LAN area it is more than just buying a few
devices
▪ In theWAN area it is more than just calling the
phone company
 A focus is placed on understanding data flow, data types,
and processes that access or change the data.
 A logical model is developed before the physical model.
▪ The logical model represents the basic building blocks, divided by
function, and the structure of the system.
▪ The physical model represents devices and specific technologies and
implementations.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Layer 1
Layer 7
Layer 6
Layer 5
Layer 4
Layer 3
Layer 2
Before we
go
further….
 Analyze business and technical goals
first
 Explore divisional and group structures
to find out who the network serves and
where they reside
 Determine what (& how) applications
will run on the network and how those
applications behave on a network
 Focus on above layer to down
Analyze
requirements
Develop
logical
design
Develop
physical
design
Test, optimize,
and document
design
Monitor and
optimize
network
performance
Implement
and test
network
 Phase 1 – Analyze Requirements
▪ Analyze business goals and constraints
▪ Analyze technical goals and tradeoffs
▪ Characterize the existing network
▪ Characterize the existing and future possible
network traffic
 Phase 2 – Logical Network Design
▪ Design a network topology
▪ Design models for addressing and naming
▪ Select switching and routing protocols
▪ Develop network security strategies
▪ Develop network management strategies
 The logical network Diagram will be used to represent how
your network connections are using the layer of the OSI,
and will help to understand your IP addressing.
 Phase 3 – Physical Network Design
▪ Select technologies and devices for campus
networks
▪ Select technologies and devices for enterprise
networks
 The physical network Diagram is created by the
administrator to represent the physical layout of the
network.Vital documentation needed to capture a wide
variety of information in your network.
 Phase 4 –Testing, Optimizing, and
Documenting the Network Design
▪ Test the network design
▪ Optimize the network design
▪ Document the network design
Lecture Notes - 1 38
 What is a Network?
 Network Characteristics
 Generations of Networking
 What is “Network Design”?
 Network Development Life Cycle (NDLC)
 Top-Down Network Design
 PDIOO Network Life Cycle
 AndThenWhat?
Lecture Notes - 1 39
 Plan:
▪ Network requirements are identified in this phase
▪ Analysis of areas where the network will be installed
▪ Identification of users who will require network services
 Design:
▪ Accomplish the logical and physical design, according to
requirements gathered during the Plan phase
 Implement:
▪ Network is built according to the Design specifications
▪ Implementation also serves to verify the design
Lecture Notes - 1 40
 Operate:
▪ Operation is the final test of the effectiveness of the design
▪ The network is monitored during this phase for performance
problems and any faults, to provide input into the Optimize phase
 Optimize:
▪ Based on proactive network management which identifies and
resolves problems before network disruptions arise
▪ The optimize phase may lead to a network redesign
▪ if too many problems arise due to design errors, or
▪ as network performance degrades over time as actual use and
capabilities diverge
▪ Redesign may also be required when requirements change
significantly
Lecture Notes - 1 41
 Retire:
▪ When the network, or a part of the network, is out-of-date, it may
be taken out of production
▪ Although Retire is not incorporated into the name of the life cycle
(PDIOO), it is nonetheless an important phase
 Understanding Goals
 Understanding Priorities
 UnderstandingConstraints
 Information Gathering
 MeetingCustomer
 Define the Scope
 Gather more Detail Information
 StatingApplication to be developed
 Increase revenue
 Reduce operating costs
 Improve communications
 Shorten product development cycle
 Expand into worldwide markets
 Build partnerships with other companies
 Offer better customer support or new
customer services
 Mobility
 Security
 Resiliency (fault tolerance)
 Business continuity after a disaster
 Network projects must be prioritized
based on fiscal goals
 Networks must offer the low delay
required for real-time applications such as
VoIP
 UnderstandingGoals
 Understanding Priorities
 Understanding Constraints
 Information Gathering
 MeetingCustomer
 Define the Scope
 Gather more Detail Information
 StatingApplication to be developed
 Budget
 Staffing
 Schedule
 Politics and policies
 Before meeting with the client, whether
internal or external, collect some basic
business-related information
 Such as
▪ Products produced/Services supplied
▪ Financial viability
▪ Customers, suppliers, competitors
▪ Competitive advantage
 Try to get
▪ A concise statement of the goals of the
project
▪ What problem are they trying to solve?
▪ How will new technology help them be
more successful in their business?
▪ What must happen for the project to
succeed?
 What will happen if the project is a failure?
▪ Is this a critical business function?
▪ Is this project visible to upper management?
▪ Who’s on your side?
 Discover any biases
▪ For example
▪ Will they only use certain company’s
products?
▪ Do they avoid certain technologies?
▪ Do the data people look down on the
voice people or vice versa?
▪ Talk to the technical and
management staff
▪ Get a copy of the organization chart
▪ This will show the general structure of the organization
▪ It will suggest users to account for
▪ It will suggest geographical locations to account for
▪ Get a copy of the security policy
▪ How does the policy affect the new design?
▪ How does the new design affect the policy?
▪ Is the policy so strict that you (the network designer)
won’t be able to do your job?
▪ Start cataloging network assets that security
should protect
▪ Hardware, software, applications, and data
▪ Less obvious, but still important, intellectual
property, trade secrets, and a company's reputation
 Small in scope?
▪ Allow sales people to access network via aVPN
 Large in scope?
▪ An entire redesign of an enterprise network
 Use the OSI model to clarify the scope
▪ New financial reporting application versus new routing
protocol versus new data link (wireless, for example)
 Does the scope fit the budget, capabilities of staff
and consultants, schedule?
 Applications
▪ Now and after the project is completed
▪ Include both productivity applications and system
management applications
 User communities
 Data stores
 Protocols
 Current logical and physical architecture
 Current performance
Name of
Application
Type of
Application
New
Application?
Criticality Comments
 Scalability
 Availability
 Performance
 Security
 Manageability
 Usability
 Adaptability
 Affordability
 Scalability refers to the ability to grow
 Try to review on…
▪ Number of sites to be added
▪ What will be needed at each of these sites
▪ How many users will be added
▪ How many more servers will be added
 Availability can be expressed as a percent
uptime per year, month, week, day, or
hour, compared to the total time in that
period
▪ For example:
▪ 24/7 operation
▪ Network is up for 165 hours in the 168-hour week
▪ Availability is 98.21%
 Some enterprises may want 99.999% or
“Five Nines” availability
 Common performance factors include
▪ Bandwidth
▪ Throughput
▪ Offered load
▪ Accuracy
▪ Efficiency
▪ Delay (latency) and delay variation
▪ Response time
 Common performance factors include
▪ Bandwidth
 Common performance factors include
▪ Throughput
Bandwidth
Bandwidth
Throughput
 Common performance factors include
▪ Offered l
▪ The offered load is a measure of traffic in the
queue
 Common performance factors include
▪ Accuracy
 Common performance factors include
▪ Efficiency
 Common performance factors include
▪ Delay (latency)
 Common performance factors include
▪ Response time
 Efficiency – (Overhead minimization)
▪ How much overhead is required to deliver an
amount of data?
▪ How large can packets be?
▪ Larger better for efficiency (and goodput)
▪ But too large means too much data is lost if a packet
is damaged
▪ How many packets can be sent in one bunch without
an acknowledgment?
Small Frames (Less Efficient)
Large Frames (More Efficient)
 ResponseTime
▪ Time user get
feedback from the
time user request
something
▪ Most users expect
to see something
on the screen in 100
to 200 milliseconds
 Propagation delay → [inside the cable  →]
▪ A signal travels in a cable at about 2/3 the
speed of light in a vacuum
 Transmission delay (also known as
serialization delay) → [from pc to cable  →]
▪ Time to put digital data onto a transmission
line
▪ For example, it takes about 5 ms to output a 1,024
byte packet on a 1.544 MbpsT1 line
 Packet-switching delay
 Queuing delay
 Focus on requirements first
 Detailed security planning later (Chapter 8)
 Identify network assets
▪ All network assets must be secured
 Analyze security risks
 Hardware
 Software
 Applications
 Data
 Intellectual property
 Trade secrets
 Company’s reputation
 Problem of the network:
▪ Data can be intercepted, analyzed, altered, or
deleted
▪ User passwords can be compromised
▪ Device configurations can be changed
 Performance management
 Fault management
 Configuration management
 Security management
 Accounting management
 Usability: the ease of use with which network
users can access the network and services
 Networks should make users’ jobs easier
 Some design decisions will have a negative
affect on usability:
▪ Strict security, for example
 Avoid incorporating any design elements
that would make it hard to implement
new technologies in the future
 Make it easy to upgrade!
 A network should carry the maximum
amount of traffic possible for a given
financial cost
 Characterize the existing internetwork in
terms of:
▪ Its infrastructure
▪ Logical structure (application, modularity, hierarchy,
topology)
▪ Physical structure
▪ Addressing and naming
▪ Wiring and media
▪ Architectural and environmental constraints
▪ Health
1. Get a network map
2. Characterize addressing and naming
3. Manage subnet
4. Characterize wiring and media
5. Finding the architectural constraint
6. Finding the wireless issues
7. Checking network health
Gigabit
Ethernet
Eugene
Ethernet
20 users
Web/FTP server
Grants Pass
HQ
16 Mbps
Token Ring
FEP
(Front End
Processor)
IBM
Mainframe
T1
Medford
Fast Ethernet
50 users
Roseburg
Fast Ethernet
30 users
Frame Relay
CIR = 56 Kbps
DLCI = 5
Frame Relay
CIR = 56 Kbps
DLCI = 4
Grants Pass
HQ
Fast Ethernet
75 users
Internet
T1
 IP addressing for major devices, client
networks, server networks, and so on
 Any strategies for addressing and naming?
▪ FLSM orVLSM
Area 1
Subnets 10.108.16.0 -
10.108.31.0
Area 0
Network
192.168.49.0
Area 2
Subnets 10.108.32.0 -
10.108.47.0
Router A Router B
 Single-mode fiber
 Multi-mode fiber
 Shielded twisted pair (STP) copper
 Unshielded-twisted-pair (UTP) copper
 Coaxial cable
 Microwave
 Laser
 Radio
 Infra-red
Telecommunications
Wiring Closet
Horizontal
Wiring
Work-Area
Wiring
Wallplate
Main Cross-Connect Room
(or Main Distribution Frame)
Intermediate Cross-Connect Room
(or Intermediate Distribution Frame)
Building A - Headquarters Building B
Vertical
Wiring
(Building
Backbone)
Campus
Backbone
Telecommunications
Wiring Closet
Horizontal
Wiring
Work-Area
Wiring
Wallplate
Main Cross-Connect Room
(or Main Distribution Frame)
Intermediate Cross-Connect Room
(or Intermediate Distribution Frame)
Building A - Headquarters Building B
Vertical
Wiring
(Building
Backbone)
Campus
Backbone
 Make sure the following are sufficient
▪ Air conditioning
▪ Heating
▪ Ventilation
▪ Power
▪ Protection from electromagnetic interference
▪ Doors that can lock
 Make sure there’s space for:
▪ Cabling conduits
▪ Patch panels
▪ Equipment racks
▪ Work areas for technicians installing and
troubleshooting equipment
 Reflection
 Absorption
 Refraction
 Diffraction
 Performance
 Availability
 Bandwidth utilization
 Accuracy
 Efficiency
 Response time
 Status of major routers, switches, and
firewalls
 Protocol analyzers
 Multi RouterTraffic Grapher (MRTG)
 Remote monitoring (RMON) probes
 Cisco Discovery Protocol (CDP)
 Cisco IOS NetFlow technology
 CiscoWorks
 Cisco IOS ServiceAssurance Agent (SAA)
 Cisco Internetwork Performance Monitor (IPM)
 show buffers
 show environment
 show interfaces
 show memory
 show processes
 show running-config
 show version
 AvailabilityTable
 Network Utilization Graph
 Bandwidth UtilizationTable
 Packet Size DistributionTable
 ResponseTimeTable
Enterprise
Segment 1
Segment 2
Segment n
MTBF MTTR
Date and Duration of
Last Major
Downtime
Cause of Last
Major
Downtime
MTBF: Mean Time Between Failures
MTTR: Mean Time To Repair
Network Utilization
0 1 2 3 4 5 6 7
17:10:00
17:07:00
17:04:00
17:01:00
16:58:00
16:55:00
16:52:00
16:49:00
16:46:00
16:43:00
16:40:00
Time
Utilization
Series1
Network Utilization
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5
17:00:00
16:00:00
15:00:00
14:00:00
13:00:00
Time
Utilization
Series1
Protocol 1
Protocol 2
Protocol 3
Protocol n
Relative
Network
Utilization
Absolute
Network
Utilization
Broadcast
Rate
Multicast
Rate
Node A
Node B
Node C
Node D
Node A Node B Node C Node D
X
X
X
X
 Identifying NetworkTraffic Factor
 Traffic Flow Documentation
 Types ofTraffic Flow
 Traffic Load
 Traffic Behavior
 Network Efficiency
 Traffic flow
▪ Where the data go while propagating
 Location of traffic sources and data stores
▪ The sources of sender and reciever
 Traffic load
▪ The capacity of data in the line
 Traffic behavior
▪ How the data transferred
 Identifying NetworkTraffic Factor
 Traffic Flow Documentation
 Types ofTraffic Flow
 Traffic Load
 Traffic Behavior
 Network Efficiency
 User CommunitiesTable
 Data StoresTable
 Traffic FlowTable
 Traffic Flow Diagram
 Network ApplicationTraffic Characteristics
User
Community
Name
Size of
Community
(Number of
Users)
Location(s) of
Community
Application(s)
Used by
Community
User
Community
Name
Size of
Community
(Number of
Users)
Location(s) of
Community
Application(s)
Used by
Community
Based on User Level
Administrator
Technical User
Management User
End User
User
Community
Name
Size of
Community
(Number of
Users)
Location(s) of
Community
Application(s)
Used by
Community
Based on Department
IT Dept
CEO Dept
HR Dept
Acct Dept
Operational Dept
Data Store Location Application(s) Used by User
Community(or
Communities)
Data Store Location Application(s) Used by User
Community(or
Communities)
Types of Data
HR Data
Stock Data
Email Data
Website Data
Destination 1 Destination 2 Destination 3 Destination
MB/sec MB/sec MB/sec MB/sec
Source 1
Source 2
Source 3
Source n
Time taken for data flow
from point to point
Administration
Business and
Social Sciences
Math and
Sciences
50 PCs 25 Macs
50 PCs
50 PCs
30 PCs
30 Library Patrons (PCs)
30 Macs and 60 PCs in
Computing Center
Library and Computing Center
App 1 108 Kbps
App 2 60 Kbps
App 3 192 Kbps
App 4 48 Kbps
App 7 400 Kbps
Total 808 Kbps
App 1 48 Kbps
App 2 32 Kbps
App 3 96 Kbps
App 4 24 Kbps
App 5 300 Kbps
App 6 200 Kbps
App 8 1200 Kbps
Total 1900 Kbps
App 1 30 Kbps
App 2 20 Kbps
App 3 60 Kbps
App 4 16 Kbps
Total 126 Kbps
App 2 20 Kbps
App 3 96 Kbps
App 4 24 Kbps
App 9 80 Kbps
Total 220 Kbps
Arts and
Humanities
Server Farm
10-Mbps Metro
Ethernet to Internet
Name of
Application
Type of
Traffic
Flow
Protocol(s)
Used by
Application
User
Communities
That Use the
Application
Data Stores
(Servers, Hosts,
and so on)
Approximate
Bandwidth
Requirements
QoS
Requirements
Name of
Application
Type of
Traffic
Flow
Protocol(s)
Used by
Application
User
Communities
That Use the
Application
Data Stores
(Servers, Hosts,
and so on)
Approximate
Bandwidth
Requirements
QoS
Requirements
App 1 Streaming RTSP End User, Client 3 250kb
App 2
App 3
App 4
 Identifying NetworkTraffic Factor
 Traffic Flow Documentation
 Types ofTraffic Flow
 Traffic Load
 Traffic Behavior
 Network Efficiency
 Terminal/host
 Client/server
 Thin client
 Peer-to-peer
 Server/server
 Distributed computing
 Identifying NetworkTraffic Factor
 Traffic Flow Documentation
 Types ofTraffic Flow
 Traffic Load
 Traffic Behavior
 Network Efficiency
Example:
 Terminal screen: 4 Kbytes
 Simple e-mail: 10 Kbytes
 Simple web page: 50 Kbytes
 High-quality image: 50,000 Kbytes
 Database backup: 1,000,000 Kbytes or more
And many more types of objects
 To calculate whether capacity is sufficient,
you should know:
▪ The number of stations
▪ The average time that a station is idle between
sending frames
▪ The time required to transmit a message once
medium access is gained
 Identifying NetworkTraffic Factor
 Traffic Flow Documentation
 Types ofTraffic Flow
 Traffic Load
 Traffic Behavior
 Network Efficiency
 Broadcasts
▪ All ones data-link layer destination address
▪ FF: FF: FF: FF: FF: FF
▪ Doesn’t necessarily use huge amounts of bandwidth
▪ But does disturb every CPU in the broadcast domain
 Multicasts
▪ First bit sent is a one
▪ 01:00:0C:CC:CC:CC (Cisco Discovery Protocol)
▪ Should just disturb NICs that have registered to receive
it
▪ Requires multicast routing protocol on internetworks
 Identifying NetworkTraffic Factor
 Traffic Flow Documentation
 Types ofTraffic Flow
 Traffic Load
 Traffic Behavior
 Network Efficiency
 Frame size
 Protocol interaction
 Windowing and flow control
 Error-recovery mechanisms
 Topology
 Hierarchical Network Design
 Types of Network
 Redundancy
 VLAN
 Good Design
• A term used in the computer networking field to
describe the architectural structure of a network
Campus C
Building C-1 Building C-2
Campus C Backbone
Linear Array
Torus
Torus arranged to use sh
Linear Array
Torus Ring
Linear Array
Torus
Torus arranged to use sh
Linear Array
Linear Array
Torus
Torus arranged to use sh
Torus Ring
2D Grid 3D Corbel
 Embed multiple logical dimension in one
physical dimension using long wires or
wireless frequencies
 Fatter links (really more of them) as you
go up
 Topology
 Hierarchical Network Design
 Types of Network
 Redundancy
 VLAN
 Good Design
Enterprise WAN
Backbone
Campus A Campus B
Campus C
Building C-1 Building C-2
Campus C Backbone
Core Layer
Distribution
Layer
Access Layer
 A core layer of high-end routers and switches
that are optimized for availability and speed
 A distribution layer of routers and switches
that implement policies and segment traffic
 An access layer that connects users via hubs,
switches, and other devices
 Hierarchy
 Redundancy
 Modularity
 Well-defined
entries and exits
 Hierarchy
 Redundancy
 Modularity
 Well-defined
entries and exits
 Hierarchy
 Redundancy
 Modularity - Modularity is the degree to which
a system's components may be separated and
recombined.
 Well-defined
entries and exits
 Hierarchy
 Redundancy
 Modularity
 Well-defined
entries and exits
 Hierarchy
 Redundancy
 Modularity
 Well-defined
entries and
exits
 Hierarchy
 Redundancy
 Modularity
 Well-defined
entries and
exits
 Hierarchy
 Redundancy
 Modularity
 Well-defined
entries and
exits
 Reduces workload on network devices
▪ Avoids devices having to communicate with
too many other devices (reduces “CPU
adjacencies”)
 Constrains broadcast domains
 Enhances simplicity and understanding
 Facilitates changes
 Facilitates scaling to a larger size
 Reduces workload on network devices
▪ Avoids devices having to communicate with
too many other devices (reduces “CPU
adjacencies”)
 Constrains broadcast domains
 Enhances simplicity and understanding
 Facilitates changes
 Facilitates scaling to a larger size
and the IMPACT
 Topology
 Hierarchical Network Design
 Types of Network
 Redundancy
 VLAN
 Good Design
 Campus (LAN) Network
 Enterprise (Interconnecting LAN-to-WAN)
Network
 Use a hierarchical, modular approach
 Minimize the size of bandwidth domains
 Minimize the size of broadcast domains
 Provide redundancy
▪ Mirrored servers
▪ Multiple ways for workstations to reach a router
for off-net communications
 Server farm
 Network management module
 Edge distribution module for connectivity
to the rest of the world
 Campus infrastructure module:
▪ Building access submodule
▪ Building distribution submodule
▪ Campus backbone
 Topology
 Hierarchical Network Design
 Types of Network
 Redundancy
 VLAN
 Good Design
Host A
Host B
LAN X
LAN Y
Switch 1 Switch 2
X
Host A
Host B
LAN X
LAN Y
Switch 1 Switch 2
 Topology
 Hierarchical Network Design
 Types of Network
 Redundancy
 VLAN
 Good Design
 An emulation of a standard LAN that
allows data transfer to take place without
the traditional physical restraints placed
on a network
 A set of devices that belong to an
administrative group
 Designers useVLANs to constrain
broadcast traffic
Switch A
Station A1 Station A2 Station A3
Network A
Switch B
Station B1 Station B2 Station B3
Network B
Real LANs
Station A1 Station A2 Station A3
VLAN A
Station B1 Station B2 Station B3
VLAN B
Virtual LANs
Switch A
Station B1 Station B2 Station B3
Switch B
Station B4 Station B5 Station B6
Station A1 Station A2 Station A3 Station A4 Station A5 Station A6
VLAN B
VLAN A
VLAN B
VLAN A
 A wireless LAN (WLAN) is often
implemented as aVLAN
 Facilitates roaming
 Users remain in the sameVLAN and IP
subnet as they roam, so there’s no need to
change addressing information
 Topology
 Hierarchical Network Design
 Types of Network
 Redundancy
 VLAN
 Good Design
 When you already know how to add a new
building, floor,WAN link, remote site, e-
commerce service, and so on
 When new additions cause only local change,
to the directly-connected devices
 When your network can double or triple in size
without major design changes
 When troubleshooting is easy because there
are no complex protocol interactions to wrap
your brain around
 What to secure?
 What to secure?
 Security defense in depth
▪ Network security should be multilayered with
many different techniques used to protect the
network
 Belt-and-suspenders approach
▪ Don’t get caught with your pants down.
▪ Covers it!
 What to secure?
 Cisco SAFE Security Reference Model addresses
security in every module of a modular network
architecture.
Enterprise
Network
DMZ
Web, File, DNS, Mail Servers
Internet
Internet
Enterprise Network
DMZ
Web, File, DNS, Mail Servers
Firewall
 Internet Connections
 Remote-Access andVirtual Private Networks
 Network Services
 Server Farms
 User Services
 Wireless Networks
1. Identify network assets
2. Analyze security risks
3. Analyze security requirements and
tradeoffs
4. Develop a security plan
5. Define a security policy
6. Develop procedures for applying security
policies
7. Develop a technical implementation
strategy
8. Achieve buy-in from users, managers, and
technical staff
9. Train users, managers, and technical staff
10. Implement the technical strategy and
security procedures
11. Test the security and update it if any
problems are found
12. Maintain security
 Physical security
 Firewalls and packet filters
 Audit logs, authentication, authorization
 Well-defined exit and entry points
 Routing protocols that support
authentication
 Physical security
 Firewalls
 Authentication, authorization, and
auditing
 Encryption
 One-time passwords
 Security protocols
▪ CHAP
▪ RADIUS
▪ IPSec
 Treat each network device (routers,
switches, and so on) as a high-value host
and harden it against possible intrusions
 Require login IDs and passwords for
accessing devices
▪ Require extra authorization for risky
configuration commands
 Use SSH rather thanTelnet
 Change the welcome banner to be less
welcoming
 Deploy network and host IDSs to monitor
server subnets and individual servers
 Configure filters that limit connectivity
from the server in case the server is
compromised
 Fix known security bugs in server operating
systems
 Require authentication and authorization
for server access and management
 Limit root password to a few people
 Avoid guest accounts
 Specify which applications are allowed to
run on networked PCs in the security
policy
 Require personal firewalls and antivirus
software on networked PCs
▪ Implement written procedures that specify
how the software is installed and kept current
 Encourage users to log out when leaving
their desks
 Consider using 802.1X port-based security
on switches
 Place wireless LANs (WLANs) in their own
subnet orVLAN
▪ Simplifies addressing and makes it easier to
configure packet filters
 Require all wireless (and wired) laptops to run
personal firewall and antivirus software
 Disable beacons that broadcast the SSID, and
require MAC address authentication
▪ Except in cases where theWLAN is used by
visitors
 Hardware
 Software
 Applications
 Data
 Intellectual property
 Trade secrets
 Company’s reputation
 Hacked network devices
▪ Data can be intercepted, analyzed, altered, or
deleted
▪ User passwords can be compromised
▪ Device configurations can be changed
 Tradeoffs must be made between security
goals and other goals:
▪ Affordability
▪ Usability
▪ Performance
▪ Availability
▪ Manageability
 High-level document that
proposes what an
organization is going to do
to meet security
requirements
 Specifies time, people, and
other resources that will be
required to develop a security
policy and achieve
implementation of the policy
 How ?
 Should be based on the customer’s goals and the
analysis of network assets and risk.
 Should refer the network topology and include a list of
network services that will be provided.
 One of the most important aspects of the security plan
is a specification of the people who must involved in
implementing network security :
▪ Will specialized security administrators be hired ?
▪ How will end users and their managers get involved ?
▪ How will end users, managers and technical staff be trained on
security policies and procedures ?
 RFC 2196, “The Site Security Handbook,” a
security policy refers security policy as a:
▪ “Formal statement of the rules by which people
who are given access to an organization’s
technology and information assets must abide.”
 The policy should address
▪ Access, accountability, authentication, privacy,
and computer technology purchasing guidelines
 Security policy? informs users, managers and
technical staff of their obligations for protecting
technology and information assets.
 Who is responsible in developing the security policy ?
 Get input from managers, users, network engineers.
 After a security policy has been developed, it should
be explained to all by top management. Eg : sign a
statement indicating that they have read, understood
and agreed to abide by a policy.
 Physical security
 Authentication
 Authorization
 Accounting (Auditing)
 Data encryption
 Packet filters
 Firewalls
 Intrusion Detection Systems (IDSs)

Contenu connexe

Similaire à Network Analysis & Design

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfPart I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfanandatalapatra
 
IT327-1404A-01 Implementing, Managing and Mainta.docx
IT327-1404A-01 Implementing, Managing and Mainta.docxIT327-1404A-01 Implementing, Managing and Mainta.docx
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31TechSoup
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxBluechip Gulf IT Services
 
REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementRicardo Pereira
 
Comprehensive Authentic Assessment Plan DeliverablesFor this c.docx
Comprehensive Authentic Assessment Plan DeliverablesFor this c.docxComprehensive Authentic Assessment Plan DeliverablesFor this c.docx
Comprehensive Authentic Assessment Plan DeliverablesFor this c.docxdonnajames55
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
Agile enterprise integration
Agile enterprise integrationAgile enterprise integration
Agile enterprise integrationSimon Greig
 
PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014
PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014
PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014IBM Systems UKI
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business NetworksEric van Heck
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network designshahin raj
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructureMohammad Salman
 
E brochure it253_networkconnection
E brochure it253_networkconnectionE brochure it253_networkconnection
E brochure it253_networkconnectionI-r Papa
 

Similaire à Network Analysis & Design (20)

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfPart I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
 
IT327-1404A-01 Implementing, Managing and Mainta.docx
IT327-1404A-01 Implementing, Managing and Mainta.docxIT327-1404A-01 Implementing, Managing and Mainta.docx
IT327-1404A-01 Implementing, Managing and Mainta.docx
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
Webinar: 5 Clear Steps to Get Your Nonprofit Cloud Ready - 2018-5-31
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptx
 
REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network Management
 
Comprehensive Authentic Assessment Plan DeliverablesFor this c.docx
Comprehensive Authentic Assessment Plan DeliverablesFor this c.docxComprehensive Authentic Assessment Plan DeliverablesFor this c.docx
Comprehensive Authentic Assessment Plan DeliverablesFor this c.docx
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
BizProjects
BizProjectsBizProjects
BizProjects
 
BusinessProjects.com Market Segmentation and Entry Project
BusinessProjects.com Market Segmentation and Entry ProjectBusinessProjects.com Market Segmentation and Entry Project
BusinessProjects.com Market Segmentation and Entry Project
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Agile enterprise integration
Agile enterprise integrationAgile enterprise integration
Agile enterprise integration
 
PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014
PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014
PureApp Hybrid Cloud - Mark Willemse ING Presentation 11th September 2014
 
IT_manager
IT_managerIT_manager
IT_manager
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business Networks
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
 
E brochure it253_networkconnection
E brochure it253_networkconnectionE brochure it253_networkconnection
E brochure it253_networkconnection
 

Dernier

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Dernier (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Network Analysis & Design

  • 1. Fundamental of Network Analysis & Design
  • 2. Lecture Notes - 1 2  What is a Network?  Network Characteristics  Generations of Networking  What is “Network Design”?  Network Development Life Cycle (NDLC)  Top-Down Network Design  PDIOO Network Life Cycle  AndThenWhat?
  • 3. Lecture Notes - 1 3  Management view  Technical view
  • 4. Lecture Notes - 1 4  A network is a UTILITY ▪ Computers and their users are customers of the network utility ▪ Utilities don’t bring money into the organization, it’s EXPENSES  The network must accommodate the needs of customers ▪ As computer usage increases so does the requirements of the network utility  Resources will be used to manage the network  The Network Utility is NOT free!
  • 5. Lecture Notes - 1 5  Try to show a direct correlation between the network design project and the company’s business ▪ “Because you want a faster network” is not good enough, the question that management sends back is WHY DO I NEED A FASTER ONE? What you should say to the manager?  As a network designer, you need to explain to management how the network design, even with the high expense, can save money or improve the company’s business ▪ If users cannot log on to your commerce site, they will try your competitor, and you have lost sales ▪ If you cannot get the information your customers are asking about due to a network that is down, they may go to your competitor
  • 6. Lecture Notes - 1 6  A “Network” really can be thought of as three parts and they all need to be considered when working on a network design project: ▪ Connections ▪ Communications/Protocols ▪ Services  Connections ▪ Provided by Hardware that ties things together ▪ Wire/Fiber/Wireless Transport Mechanisms ▪ Routers ▪ Switches/Hubs ▪ Computers  Communications/Protocols ▪ Provided by Software ▪ A common language for 2 systems to communicate with each other ▪ TCP/IP (Internet/Windows NT) ▪ IPX / SPX (Novell Netware 4) ▪ AppleTalk ▪ Other Network OS  Services ▪ The Heart of Networking ▪ Cooperation between 2 or more systems to perform some function - Applications ▪ telnet ▪ FTP ▪ HTTP ▪ SMTP
  • 7.
  • 8. Lecture Notes - 1 8  Based on a set of general rules ▪ Is the network down or up? ▪ “Bridge when you can, route when you must” ▪ Can’t deal with scalability & complexity?
  • 9. Lecture Notes - 1 9 Applications Message Length Message arrival rate Delay need Reliability need Interactive terminals Short Low Moderate Very high File transfer Very long Very low Very low Very high Hi-resolution graphics Very long Low to moderate High Low Packetized voice Very short Very high High Low
  • 10. Lecture Notes - 1 10 Word Processing File Transfers Real-Time Imaging 100s Kbps Few Mbps Few Mbps 10s Mbps 10s Mbps 100s Mbps Transaction Processing 100 Bytes Few Kbps
  • 11. Lecture Notes - 1 11 Video standard Bandwidth per user WAN services Digital video interactive 1.2 Mbps DS1 lines ISDN H11, Frame Relay, ATM Motion JPEG 10 to 240 Mbps ATM 155 or 622 Mbps MPEG-1 1.5 Mbps DS1 lines ISDN H11, Frame Relay, ATM MPEG-2 4~6 Mbps DS2, DS3, ATM at DS3 rate
  • 12. Lecture Notes - 1 12  LAN, MAN andWAN  Switching and routing  Technologies: Ethernet, FDDI, ATM …  Wireless/Mobile networking  Internetworking  Applications  Service quality  Security concerns
  • 13.
  • 15.
  • 16. Lecture Notes - 1 16 Response Time Cost Business Growth Reliability
  • 17. Lecture Notes - 1 17 WAN Campus Traffic Patterns Dial in Users Security WWW Access Users Network Management Addressing
  • 18.  A complete process that matches business needs to available technology to deliver a system that will maximize an organization’s success ▪ In the LAN area it is more than just buying a few devices ▪ In theWAN area it is more than just calling the phone company
  • 19.
  • 20.
  • 21.
  • 22.  A focus is placed on understanding data flow, data types, and processes that access or change the data.  A logical model is developed before the physical model. ▪ The logical model represents the basic building blocks, divided by function, and the structure of the system. ▪ The physical model represents devices and specific technologies and implementations.
  • 23.
  • 24.
  • 25. Application Presentation Session Transport Network Data Link Physical Layer 1 Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Before we go further….
  • 26.  Analyze business and technical goals first  Explore divisional and group structures to find out who the network serves and where they reside  Determine what (& how) applications will run on the network and how those applications behave on a network  Focus on above layer to down
  • 28.  Phase 1 – Analyze Requirements ▪ Analyze business goals and constraints ▪ Analyze technical goals and tradeoffs ▪ Characterize the existing network ▪ Characterize the existing and future possible network traffic
  • 29.  Phase 2 – Logical Network Design ▪ Design a network topology ▪ Design models for addressing and naming ▪ Select switching and routing protocols ▪ Develop network security strategies ▪ Develop network management strategies
  • 30.  The logical network Diagram will be used to represent how your network connections are using the layer of the OSI, and will help to understand your IP addressing.
  • 31.
  • 32.
  • 33.  Phase 3 – Physical Network Design ▪ Select technologies and devices for campus networks ▪ Select technologies and devices for enterprise networks
  • 34.  The physical network Diagram is created by the administrator to represent the physical layout of the network.Vital documentation needed to capture a wide variety of information in your network.
  • 35.
  • 36.
  • 37.  Phase 4 –Testing, Optimizing, and Documenting the Network Design ▪ Test the network design ▪ Optimize the network design ▪ Document the network design
  • 38. Lecture Notes - 1 38  What is a Network?  Network Characteristics  Generations of Networking  What is “Network Design”?  Network Development Life Cycle (NDLC)  Top-Down Network Design  PDIOO Network Life Cycle  AndThenWhat?
  • 39. Lecture Notes - 1 39  Plan: ▪ Network requirements are identified in this phase ▪ Analysis of areas where the network will be installed ▪ Identification of users who will require network services  Design: ▪ Accomplish the logical and physical design, according to requirements gathered during the Plan phase  Implement: ▪ Network is built according to the Design specifications ▪ Implementation also serves to verify the design
  • 40. Lecture Notes - 1 40  Operate: ▪ Operation is the final test of the effectiveness of the design ▪ The network is monitored during this phase for performance problems and any faults, to provide input into the Optimize phase  Optimize: ▪ Based on proactive network management which identifies and resolves problems before network disruptions arise ▪ The optimize phase may lead to a network redesign ▪ if too many problems arise due to design errors, or ▪ as network performance degrades over time as actual use and capabilities diverge ▪ Redesign may also be required when requirements change significantly
  • 41. Lecture Notes - 1 41  Retire: ▪ When the network, or a part of the network, is out-of-date, it may be taken out of production ▪ Although Retire is not incorporated into the name of the life cycle (PDIOO), it is nonetheless an important phase
  • 42.
  • 43.
  • 44.  Understanding Goals  Understanding Priorities  UnderstandingConstraints  Information Gathering  MeetingCustomer  Define the Scope  Gather more Detail Information  StatingApplication to be developed
  • 45.
  • 46.  Increase revenue  Reduce operating costs  Improve communications  Shorten product development cycle  Expand into worldwide markets  Build partnerships with other companies  Offer better customer support or new customer services
  • 47.
  • 48.  Mobility  Security  Resiliency (fault tolerance)  Business continuity after a disaster  Network projects must be prioritized based on fiscal goals  Networks must offer the low delay required for real-time applications such as VoIP
  • 49.  UnderstandingGoals  Understanding Priorities  Understanding Constraints  Information Gathering  MeetingCustomer  Define the Scope  Gather more Detail Information  StatingApplication to be developed
  • 50.  Budget  Staffing  Schedule  Politics and policies
  • 51.
  • 52.  Before meeting with the client, whether internal or external, collect some basic business-related information  Such as ▪ Products produced/Services supplied ▪ Financial viability ▪ Customers, suppliers, competitors ▪ Competitive advantage
  • 53.
  • 54.  Try to get ▪ A concise statement of the goals of the project ▪ What problem are they trying to solve? ▪ How will new technology help them be more successful in their business? ▪ What must happen for the project to succeed?
  • 55.  What will happen if the project is a failure? ▪ Is this a critical business function? ▪ Is this project visible to upper management? ▪ Who’s on your side?
  • 56.  Discover any biases ▪ For example ▪ Will they only use certain company’s products? ▪ Do they avoid certain technologies? ▪ Do the data people look down on the voice people or vice versa? ▪ Talk to the technical and management staff
  • 57. ▪ Get a copy of the organization chart ▪ This will show the general structure of the organization ▪ It will suggest users to account for ▪ It will suggest geographical locations to account for
  • 58. ▪ Get a copy of the security policy ▪ How does the policy affect the new design? ▪ How does the new design affect the policy? ▪ Is the policy so strict that you (the network designer) won’t be able to do your job? ▪ Start cataloging network assets that security should protect ▪ Hardware, software, applications, and data ▪ Less obvious, but still important, intellectual property, trade secrets, and a company's reputation
  • 59.
  • 60.  Small in scope? ▪ Allow sales people to access network via aVPN  Large in scope? ▪ An entire redesign of an enterprise network  Use the OSI model to clarify the scope ▪ New financial reporting application versus new routing protocol versus new data link (wireless, for example)  Does the scope fit the budget, capabilities of staff and consultants, schedule?
  • 61.
  • 62.  Applications ▪ Now and after the project is completed ▪ Include both productivity applications and system management applications  User communities  Data stores  Protocols  Current logical and physical architecture  Current performance
  • 63.
  • 65.
  • 66.  Scalability  Availability  Performance  Security  Manageability  Usability  Adaptability  Affordability
  • 67.  Scalability refers to the ability to grow  Try to review on… ▪ Number of sites to be added ▪ What will be needed at each of these sites ▪ How many users will be added ▪ How many more servers will be added
  • 68.  Availability can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that period ▪ For example: ▪ 24/7 operation ▪ Network is up for 165 hours in the 168-hour week ▪ Availability is 98.21%  Some enterprises may want 99.999% or “Five Nines” availability
  • 69.  Common performance factors include ▪ Bandwidth ▪ Throughput ▪ Offered load ▪ Accuracy ▪ Efficiency ▪ Delay (latency) and delay variation ▪ Response time
  • 70.  Common performance factors include ▪ Bandwidth
  • 71.  Common performance factors include ▪ Throughput Bandwidth Bandwidth Throughput
  • 72.  Common performance factors include ▪ Offered l ▪ The offered load is a measure of traffic in the queue
  • 73.  Common performance factors include ▪ Accuracy
  • 74.  Common performance factors include ▪ Efficiency
  • 75.  Common performance factors include ▪ Delay (latency)
  • 76.  Common performance factors include ▪ Response time
  • 77.  Efficiency – (Overhead minimization) ▪ How much overhead is required to deliver an amount of data? ▪ How large can packets be? ▪ Larger better for efficiency (and goodput) ▪ But too large means too much data is lost if a packet is damaged ▪ How many packets can be sent in one bunch without an acknowledgment?
  • 78. Small Frames (Less Efficient) Large Frames (More Efficient)
  • 79.  ResponseTime ▪ Time user get feedback from the time user request something ▪ Most users expect to see something on the screen in 100 to 200 milliseconds
  • 80.  Propagation delay → [inside the cable  →] ▪ A signal travels in a cable at about 2/3 the speed of light in a vacuum  Transmission delay (also known as serialization delay) → [from pc to cable  →] ▪ Time to put digital data onto a transmission line ▪ For example, it takes about 5 ms to output a 1,024 byte packet on a 1.544 MbpsT1 line  Packet-switching delay  Queuing delay
  • 81.  Focus on requirements first  Detailed security planning later (Chapter 8)  Identify network assets ▪ All network assets must be secured  Analyze security risks
  • 82.  Hardware  Software  Applications  Data  Intellectual property  Trade secrets  Company’s reputation
  • 83.  Problem of the network: ▪ Data can be intercepted, analyzed, altered, or deleted ▪ User passwords can be compromised ▪ Device configurations can be changed
  • 84.  Performance management  Fault management  Configuration management  Security management  Accounting management
  • 85.  Usability: the ease of use with which network users can access the network and services  Networks should make users’ jobs easier  Some design decisions will have a negative affect on usability: ▪ Strict security, for example
  • 86.  Avoid incorporating any design elements that would make it hard to implement new technologies in the future  Make it easy to upgrade!
  • 87.  A network should carry the maximum amount of traffic possible for a given financial cost
  • 88.
  • 89.
  • 90.  Characterize the existing internetwork in terms of: ▪ Its infrastructure ▪ Logical structure (application, modularity, hierarchy, topology) ▪ Physical structure ▪ Addressing and naming ▪ Wiring and media ▪ Architectural and environmental constraints ▪ Health
  • 91. 1. Get a network map 2. Characterize addressing and naming 3. Manage subnet 4. Characterize wiring and media 5. Finding the architectural constraint 6. Finding the wireless issues 7. Checking network health
  • 92. Gigabit Ethernet Eugene Ethernet 20 users Web/FTP server Grants Pass HQ 16 Mbps Token Ring FEP (Front End Processor) IBM Mainframe T1 Medford Fast Ethernet 50 users Roseburg Fast Ethernet 30 users Frame Relay CIR = 56 Kbps DLCI = 5 Frame Relay CIR = 56 Kbps DLCI = 4 Grants Pass HQ Fast Ethernet 75 users Internet T1
  • 93.  IP addressing for major devices, client networks, server networks, and so on  Any strategies for addressing and naming? ▪ FLSM orVLSM
  • 94. Area 1 Subnets 10.108.16.0 - 10.108.31.0 Area 0 Network 192.168.49.0 Area 2 Subnets 10.108.32.0 - 10.108.47.0 Router A Router B
  • 95.  Single-mode fiber  Multi-mode fiber  Shielded twisted pair (STP) copper  Unshielded-twisted-pair (UTP) copper  Coaxial cable  Microwave  Laser  Radio  Infra-red
  • 96. Telecommunications Wiring Closet Horizontal Wiring Work-Area Wiring Wallplate Main Cross-Connect Room (or Main Distribution Frame) Intermediate Cross-Connect Room (or Intermediate Distribution Frame) Building A - Headquarters Building B Vertical Wiring (Building Backbone) Campus Backbone
  • 97. Telecommunications Wiring Closet Horizontal Wiring Work-Area Wiring Wallplate Main Cross-Connect Room (or Main Distribution Frame) Intermediate Cross-Connect Room (or Intermediate Distribution Frame) Building A - Headquarters Building B Vertical Wiring (Building Backbone) Campus Backbone
  • 98.  Make sure the following are sufficient ▪ Air conditioning ▪ Heating ▪ Ventilation ▪ Power ▪ Protection from electromagnetic interference ▪ Doors that can lock
  • 99.  Make sure there’s space for: ▪ Cabling conduits ▪ Patch panels ▪ Equipment racks ▪ Work areas for technicians installing and troubleshooting equipment
  • 100.  Reflection  Absorption  Refraction  Diffraction
  • 101.  Performance  Availability  Bandwidth utilization  Accuracy  Efficiency  Response time  Status of major routers, switches, and firewalls
  • 102.  Protocol analyzers  Multi RouterTraffic Grapher (MRTG)  Remote monitoring (RMON) probes  Cisco Discovery Protocol (CDP)  Cisco IOS NetFlow technology  CiscoWorks  Cisco IOS ServiceAssurance Agent (SAA)  Cisco Internetwork Performance Monitor (IPM)
  • 103.  show buffers  show environment  show interfaces  show memory  show processes  show running-config  show version
  • 104.
  • 105.  AvailabilityTable  Network Utilization Graph  Bandwidth UtilizationTable  Packet Size DistributionTable  ResponseTimeTable
  • 106. Enterprise Segment 1 Segment 2 Segment n MTBF MTTR Date and Duration of Last Major Downtime Cause of Last Major Downtime MTBF: Mean Time Between Failures MTTR: Mean Time To Repair
  • 107. Network Utilization 0 1 2 3 4 5 6 7 17:10:00 17:07:00 17:04:00 17:01:00 16:58:00 16:55:00 16:52:00 16:49:00 16:46:00 16:43:00 16:40:00 Time Utilization Series1
  • 108. Network Utilization 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 17:00:00 16:00:00 15:00:00 14:00:00 13:00:00 Time Utilization Series1
  • 109. Protocol 1 Protocol 2 Protocol 3 Protocol n Relative Network Utilization Absolute Network Utilization Broadcast Rate Multicast Rate
  • 110.
  • 111. Node A Node B Node C Node D Node A Node B Node C Node D X X X X
  • 112.
  • 113.  Identifying NetworkTraffic Factor  Traffic Flow Documentation  Types ofTraffic Flow  Traffic Load  Traffic Behavior  Network Efficiency
  • 114.  Traffic flow ▪ Where the data go while propagating  Location of traffic sources and data stores ▪ The sources of sender and reciever  Traffic load ▪ The capacity of data in the line  Traffic behavior ▪ How the data transferred
  • 115.  Identifying NetworkTraffic Factor  Traffic Flow Documentation  Types ofTraffic Flow  Traffic Load  Traffic Behavior  Network Efficiency
  • 116.  User CommunitiesTable  Data StoresTable  Traffic FlowTable  Traffic Flow Diagram  Network ApplicationTraffic Characteristics
  • 117. User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community
  • 118. User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community Based on User Level Administrator Technical User Management User End User
  • 119. User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community Based on Department IT Dept CEO Dept HR Dept Acct Dept Operational Dept
  • 120. Data Store Location Application(s) Used by User Community(or Communities)
  • 121. Data Store Location Application(s) Used by User Community(or Communities) Types of Data HR Data Stock Data Email Data Website Data
  • 122. Destination 1 Destination 2 Destination 3 Destination MB/sec MB/sec MB/sec MB/sec Source 1 Source 2 Source 3 Source n Time taken for data flow from point to point
  • 123. Administration Business and Social Sciences Math and Sciences 50 PCs 25 Macs 50 PCs 50 PCs 30 PCs 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Library and Computing Center App 1 108 Kbps App 2 60 Kbps App 3 192 Kbps App 4 48 Kbps App 7 400 Kbps Total 808 Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App 5 300 Kbps App 6 200 Kbps App 8 1200 Kbps Total 1900 Kbps App 1 30 Kbps App 2 20 Kbps App 3 60 Kbps App 4 16 Kbps Total 126 Kbps App 2 20 Kbps App 3 96 Kbps App 4 24 Kbps App 9 80 Kbps Total 220 Kbps Arts and Humanities Server Farm 10-Mbps Metro Ethernet to Internet
  • 124. Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements
  • 125. Name of Application Type of Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores (Servers, Hosts, and so on) Approximate Bandwidth Requirements QoS Requirements App 1 Streaming RTSP End User, Client 3 250kb App 2 App 3 App 4
  • 126.  Identifying NetworkTraffic Factor  Traffic Flow Documentation  Types ofTraffic Flow  Traffic Load  Traffic Behavior  Network Efficiency
  • 127.  Terminal/host  Client/server  Thin client  Peer-to-peer  Server/server  Distributed computing
  • 128.  Identifying NetworkTraffic Factor  Traffic Flow Documentation  Types ofTraffic Flow  Traffic Load  Traffic Behavior  Network Efficiency
  • 129. Example:  Terminal screen: 4 Kbytes  Simple e-mail: 10 Kbytes  Simple web page: 50 Kbytes  High-quality image: 50,000 Kbytes  Database backup: 1,000,000 Kbytes or more And many more types of objects
  • 130.  To calculate whether capacity is sufficient, you should know: ▪ The number of stations ▪ The average time that a station is idle between sending frames ▪ The time required to transmit a message once medium access is gained
  • 131.  Identifying NetworkTraffic Factor  Traffic Flow Documentation  Types ofTraffic Flow  Traffic Load  Traffic Behavior  Network Efficiency
  • 132.  Broadcasts ▪ All ones data-link layer destination address ▪ FF: FF: FF: FF: FF: FF ▪ Doesn’t necessarily use huge amounts of bandwidth ▪ But does disturb every CPU in the broadcast domain  Multicasts ▪ First bit sent is a one ▪ 01:00:0C:CC:CC:CC (Cisco Discovery Protocol) ▪ Should just disturb NICs that have registered to receive it ▪ Requires multicast routing protocol on internetworks
  • 133.
  • 134.  Identifying NetworkTraffic Factor  Traffic Flow Documentation  Types ofTraffic Flow  Traffic Load  Traffic Behavior  Network Efficiency
  • 135.  Frame size  Protocol interaction  Windowing and flow control  Error-recovery mechanisms
  • 136.
  • 137.
  • 138.
  • 139.  Topology  Hierarchical Network Design  Types of Network  Redundancy  VLAN  Good Design
  • 140. • A term used in the computer networking field to describe the architectural structure of a network Campus C Building C-1 Building C-2 Campus C Backbone
  • 141. Linear Array Torus Torus arranged to use sh Linear Array Torus Ring
  • 142. Linear Array Torus Torus arranged to use sh Linear Array
  • 143. Linear Array Torus Torus arranged to use sh Torus Ring
  • 144. 2D Grid 3D Corbel
  • 145.  Embed multiple logical dimension in one physical dimension using long wires or wireless frequencies
  • 146.
  • 147.
  • 148.  Fatter links (really more of them) as you go up
  • 149.  Topology  Hierarchical Network Design  Types of Network  Redundancy  VLAN  Good Design
  • 150. Enterprise WAN Backbone Campus A Campus B Campus C Building C-1 Building C-2 Campus C Backbone Core Layer Distribution Layer Access Layer
  • 151.  A core layer of high-end routers and switches that are optimized for availability and speed  A distribution layer of routers and switches that implement policies and segment traffic  An access layer that connects users via hubs, switches, and other devices
  • 152.  Hierarchy  Redundancy  Modularity  Well-defined entries and exits
  • 153.  Hierarchy  Redundancy  Modularity  Well-defined entries and exits
  • 154.  Hierarchy  Redundancy  Modularity - Modularity is the degree to which a system's components may be separated and recombined.  Well-defined entries and exits
  • 155.  Hierarchy  Redundancy  Modularity  Well-defined entries and exits
  • 156.  Hierarchy  Redundancy  Modularity  Well-defined entries and exits
  • 157.  Hierarchy  Redundancy  Modularity  Well-defined entries and exits
  • 158.  Hierarchy  Redundancy  Modularity  Well-defined entries and exits
  • 159.  Reduces workload on network devices ▪ Avoids devices having to communicate with too many other devices (reduces “CPU adjacencies”)  Constrains broadcast domains  Enhances simplicity and understanding  Facilitates changes  Facilitates scaling to a larger size
  • 160.  Reduces workload on network devices ▪ Avoids devices having to communicate with too many other devices (reduces “CPU adjacencies”)  Constrains broadcast domains  Enhances simplicity and understanding  Facilitates changes  Facilitates scaling to a larger size
  • 162.  Topology  Hierarchical Network Design  Types of Network  Redundancy  VLAN  Good Design
  • 163.  Campus (LAN) Network  Enterprise (Interconnecting LAN-to-WAN) Network
  • 164.  Use a hierarchical, modular approach  Minimize the size of bandwidth domains  Minimize the size of broadcast domains  Provide redundancy ▪ Mirrored servers ▪ Multiple ways for workstations to reach a router for off-net communications
  • 165.  Server farm  Network management module  Edge distribution module for connectivity to the rest of the world  Campus infrastructure module: ▪ Building access submodule ▪ Building distribution submodule ▪ Campus backbone
  • 166.  Topology  Hierarchical Network Design  Types of Network  Redundancy  VLAN  Good Design
  • 167. Host A Host B LAN X LAN Y Switch 1 Switch 2
  • 168. X Host A Host B LAN X LAN Y Switch 1 Switch 2
  • 169.  Topology  Hierarchical Network Design  Types of Network  Redundancy  VLAN  Good Design
  • 170.  An emulation of a standard LAN that allows data transfer to take place without the traditional physical restraints placed on a network  A set of devices that belong to an administrative group  Designers useVLANs to constrain broadcast traffic
  • 171. Switch A Station A1 Station A2 Station A3 Network A Switch B Station B1 Station B2 Station B3 Network B Real LANs
  • 172. Station A1 Station A2 Station A3 VLAN A Station B1 Station B2 Station B3 VLAN B Virtual LANs
  • 173. Switch A Station B1 Station B2 Station B3 Switch B Station B4 Station B5 Station B6 Station A1 Station A2 Station A3 Station A4 Station A5 Station A6 VLAN B VLAN A VLAN B VLAN A
  • 174.  A wireless LAN (WLAN) is often implemented as aVLAN  Facilitates roaming  Users remain in the sameVLAN and IP subnet as they roam, so there’s no need to change addressing information
  • 175.  Topology  Hierarchical Network Design  Types of Network  Redundancy  VLAN  Good Design
  • 176.  When you already know how to add a new building, floor,WAN link, remote site, e- commerce service, and so on  When new additions cause only local change, to the directly-connected devices  When your network can double or triple in size without major design changes  When troubleshooting is easy because there are no complex protocol interactions to wrap your brain around
  • 177.
  • 178.  What to secure?
  • 179.  What to secure?
  • 180.  Security defense in depth ▪ Network security should be multilayered with many different techniques used to protect the network  Belt-and-suspenders approach ▪ Don’t get caught with your pants down. ▪ Covers it!
  • 181.  What to secure?
  • 182.  Cisco SAFE Security Reference Model addresses security in every module of a modular network architecture.
  • 183. Enterprise Network DMZ Web, File, DNS, Mail Servers Internet
  • 184. Internet Enterprise Network DMZ Web, File, DNS, Mail Servers Firewall
  • 185.  Internet Connections  Remote-Access andVirtual Private Networks  Network Services  Server Farms  User Services  Wireless Networks
  • 186. 1. Identify network assets 2. Analyze security risks 3. Analyze security requirements and tradeoffs 4. Develop a security plan 5. Define a security policy 6. Develop procedures for applying security policies
  • 187. 7. Develop a technical implementation strategy 8. Achieve buy-in from users, managers, and technical staff 9. Train users, managers, and technical staff 10. Implement the technical strategy and security procedures 11. Test the security and update it if any problems are found 12. Maintain security
  • 188.  Physical security  Firewalls and packet filters  Audit logs, authentication, authorization  Well-defined exit and entry points  Routing protocols that support authentication
  • 189.  Physical security  Firewalls  Authentication, authorization, and auditing  Encryption  One-time passwords  Security protocols ▪ CHAP ▪ RADIUS ▪ IPSec
  • 190.  Treat each network device (routers, switches, and so on) as a high-value host and harden it against possible intrusions  Require login IDs and passwords for accessing devices ▪ Require extra authorization for risky configuration commands  Use SSH rather thanTelnet  Change the welcome banner to be less welcoming
  • 191.  Deploy network and host IDSs to monitor server subnets and individual servers  Configure filters that limit connectivity from the server in case the server is compromised  Fix known security bugs in server operating systems  Require authentication and authorization for server access and management  Limit root password to a few people  Avoid guest accounts
  • 192.  Specify which applications are allowed to run on networked PCs in the security policy  Require personal firewalls and antivirus software on networked PCs ▪ Implement written procedures that specify how the software is installed and kept current  Encourage users to log out when leaving their desks  Consider using 802.1X port-based security on switches
  • 193.  Place wireless LANs (WLANs) in their own subnet orVLAN ▪ Simplifies addressing and makes it easier to configure packet filters  Require all wireless (and wired) laptops to run personal firewall and antivirus software  Disable beacons that broadcast the SSID, and require MAC address authentication ▪ Except in cases where theWLAN is used by visitors
  • 194.  Hardware  Software  Applications  Data  Intellectual property  Trade secrets  Company’s reputation
  • 195.  Hacked network devices ▪ Data can be intercepted, analyzed, altered, or deleted ▪ User passwords can be compromised ▪ Device configurations can be changed
  • 196.  Tradeoffs must be made between security goals and other goals: ▪ Affordability ▪ Usability ▪ Performance ▪ Availability ▪ Manageability
  • 197.  High-level document that proposes what an organization is going to do to meet security requirements  Specifies time, people, and other resources that will be required to develop a security policy and achieve implementation of the policy
  • 198.  How ?  Should be based on the customer’s goals and the analysis of network assets and risk.  Should refer the network topology and include a list of network services that will be provided.  One of the most important aspects of the security plan is a specification of the people who must involved in implementing network security : ▪ Will specialized security administrators be hired ? ▪ How will end users and their managers get involved ? ▪ How will end users, managers and technical staff be trained on security policies and procedures ?
  • 199.  RFC 2196, “The Site Security Handbook,” a security policy refers security policy as a: ▪ “Formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.”  The policy should address ▪ Access, accountability, authentication, privacy, and computer technology purchasing guidelines
  • 200.  Security policy? informs users, managers and technical staff of their obligations for protecting technology and information assets.  Who is responsible in developing the security policy ?  Get input from managers, users, network engineers.  After a security policy has been developed, it should be explained to all by top management. Eg : sign a statement indicating that they have read, understood and agreed to abide by a policy.
  • 201.  Physical security  Authentication  Authorization  Accounting (Auditing)  Data encryption  Packet filters  Firewalls  Intrusion Detection Systems (IDSs)