TDNetwork
TDNetwork
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Implement Develop
and test physical
network design
Test, optimize,
and document
design
Phase 1 – Analyze Requirements
Analyze business goals and constraints
Analyze technical goals and tradeoffs
Characterize the existing network
Characterize network traffic
Phase 2 – Logical Network Design
Design a network topology
Design models for addressing and naming
Select switching and routing protocols
Develop network security strategies
Develop network management strategies
Phase 3 – Physical Network Design
Select technologies and devices for campus networks
Select technologies and devices for enterprise networks
Phase 4 – Testing, Optimizing, and Documenting the
Network Design
Test the network design
Optimize the network design
Document the network design
Plan
Design
Retire
Optimize
Implement
Operate
Increase revenue
Reduce operating costs
Improve communications
Shorten product development cycle
Expand into worldwide markets
Build partnerships with other companies
Offer better customer support or new customer
services
Mobility
Security
Resiliency (fault tolerance)
Business continuity after a disaster
Network projects must be prioritized based on
fiscal goals
Networks must offer the low delay required for real-
time applications such as VoIP
Budget
Staffing
Schedule
Politics and policies
Before meeting with the client, whether internal or
external, collect some basic business-related
information
Such as
Products produced/Services supplied
Financial viability
Customers, suppliers, competitors
Competitive advantage
Try to get
A concise statement of the goals of the
project
What problem are they trying to solve?
How will new technology help them be more
successful in their business?
What must happen for the project to
succeed?
What will happen if the project is a failure?
Is this a critical business function?
Is this project visible to upper management?
Who’s on your side?
Discover any biases
For example
Will they only use certain company’s
products?
Do they avoid certain technologies?
Do the data people look down on the voice
people or vice versa?
Talk to the technical and management
staff
Get a copy of the organization chart
This will show the general structure of the organization
It will suggest users to account for
It will suggest geographical locations to account for
Get a copy of the security policy
How does the policy affect the new design?
How does the new design affect the policy?
Is the policy so strict that you (the network designer)
won’t be able to do your job?
Start cataloging network assets that security should
protect
Hardware, software, applications, and data
Less obvious, but still important, intellectual property,
trade secrets, and a company's reputation
Small in scope?
Allow sales people to access network via a VPN
Large in scope?
An entire redesign of an enterprise network
Use the OSI model to clarify the scope
New financial reporting application versus new routing
protocol versus new data link (wireless, for example)
Does the scope fit the budget, capabilities of staff and
consultants, schedule?
Applications
Now and after the project is completed
Include both productivity applications and system
management applications
User communities
Data stores
Protocols
Current logical and physical architecture
Current performance
Name of Type of New Criticality Comments
Application Application Application?
Systematic approach
Focus first on business requirements and constraints,
and applications
Gain an understanding of the customer’s corporate
structure
Gain an understanding of the customer’s business
style
What are the main phases of network design per
the top-down network design approach?
What are the main phases of network design per
the PDIOO approach?
Why is it important to understand your
customer’s business style?
What are some typical business goals for
organizations today?
Top-Down Network Design
Chapter Two
Enterprise
Offered Load
Other Factors that Affect
Throughput
• The size of packets
• Inter-frame gaps between packets
• Packets-per-second ratings of devices that forward packets
• Client speed (CPU, memory, and HD access speeds)
• Server speed (CPU, memory, and HD access speeds)
• Network design
• Protocols
• Distance
• Errors
• Time of day, etc., etc., etc.
Throughput Vs. Goodput
• You need to decide what you mean by
throughput
• Are you referring to bytes per second,
regardless of whether the bytes are user data
bytes or packet header bytes
– Or are you concerned with application-layer
throughput of user bytes, sometimes called
“goodput”
• In that case, you have to consider that bandwidth is
being “wasted” by the headers in every packet
Performance (continued)
• Efficiency
– How much overhead is required to deliver an
amount of data?
– How large can packets be?
• Larger better for efficiency (and goodput)
• But too large means too much data is lost if a packet
is damaged
• How many packets can be sent in one bunch without
an acknowledgment?
Efficiency
Small Frames (Less Efficient)
• Performance management
• Fault management
• Configuration management
• Security management
• Accounting management
Usability
Chapter Three
IBM
Mainframe
T1
Web/FTP server
Eugene
Ethernet T1 Internet
20 users
Characterize Addressing and
Naming
• IP addressing for major devices, client
networks, server networks, and so on
• Any addressing oddities, such as
discontiguous subnets?
• Any strategies for addressing and naming?
– For example, sites may be named using airport
codes
• San Francisco = SFO, Oakland = OAK
Discontiguous Subnets
Area 0
Network
192.168.49.0
Router A Router B
Area 1 Area 2
Subnets 10.108.16.0 - Subnets 10.108.32.0 -
10.108.31.0 10.108.47.0
Characterize the Wiring and Media
• Single-mode fiber
• Multi-mode fiber
• Shielded twisted pair (STP) copper
• Unshielded-twisted-pair (UTP) copper
• Coaxial cable
• Microwave
• Laser
• Radio
• Infra-red
Campus Network Wiring
Horizontal Work-Area
Wiring Wiring
Wallplate
Telecommunications
Wiring Closet
Vertical
Wiring
(Building
Backbone)
Campus
Building A - Headquarters Backbone Building B
Architectural Constraints
• Make sure the following are sufficient
– Air conditioning
– Heating
– Ventilation
– Power
– Protection from electromagnetic interference
– Doors that can lock
Architectural Constraints
• Reflection
• Absorption
• Refraction
• Diffraction
Check the Health of the Existing
Internetwork
• Performance
• Availability
• Bandwidth utilization
• Accuracy
• Efficiency
• Response time
• Status of major routers, switches, and
firewalls
Characterize Availability
Enterprise
Segment 1
Segment 2
Segment n
Network Utilization in Minute
Intervals
Network Utilization
16:40:00
16:43:00
16:46:00
16:49:00
16:52:00
Time
16:55:00 Series1
16:58:00
17:01:00
17:04:00
17:07:00
17:10:00
0 1 2 3 4 5 6 7
Utilization
Network Utilization in Hour
Intervals
Network Utilization
13:00:00
14:00:00
Time
15:00:00 Series1
16:00:00
17:00:00
Protocol 1
Protocol 2
Protocol 3
Protocol n
Characterize Packet Sizes
Characterize Response Time
X
Node A
X
Node B
Node C X
Node D X
Check the Status of Major
Routers, Switches, and Firewalls
• show buffers
• show environment
• show interfaces
• show memory
• show processes
• show running-config
• show version
Tools
• Protocol analyzers
• Multi Router Traffic Grapher (MRTG)
• Remote monitoring (RMON) probes
• Cisco Discovery Protocol (CDP)
• Cisco IOS NetFlow technology
• CiscoWorks
• Cisco IOS Service Assurance Agent (SAA)
• Cisco Internetwork Performance Monitor (IPM)
Summary
• Characterize the exiting internetwork before
designing enhancements
• Helps you verify that a customer’s design
goals are realistic
• Helps you locate where new equipment will
go
• Helps you cover yourself if the new network
has problems due to unresolved problems in
the old network
Review Questions
• What factors will help you decide if the existing
internetwork is in good enough shape to support new
enhancements?
• When considering protocol behavior, what is the
difference between relative network utilization and
absolute network utilization?
• Why should you characterize the logical structure of
an internetwork and not just the physical structure?
• What architectural and environmental factors should
you consider for a new wireless installation?
Top-Down Network Design
Chapter Four
• Traffic flow
• Location of traffic sources and data stores
• Traffic load
• Traffic behavior
• Quality of Service (QoS) requirements
User Communities
User Size of Location(s) of Application(s)
Community Community Community Used by
Name (Number of Community
Users)
Data Stores
Data Store Location Application(s) Used by User
Community(or
Communities)
Traffic Flow
Source 1
Source 2
Source 3
Source n
Traffic Flow
Library and Computing Center
30 Library Patrons (PCs) 10-Mbps Metro
Server Farm
App 1 108 Kbps
App 2 20 Kbps App 2 60 Kbps
App 3 96 Kbps App 3 192 Kbps
App 4 24 Kbps App 4 48 Kbps
App 9 80 Kbps App 7 400 Kbps
Total 220 Kbps Total 808 Kbps
50 PCs 25 Macs
50 PCs
Business and
Social Sciences
Types of Traffic Flow
• Terminal/host
• Client/server
• Thin client
• Peer-to-peer
• Server/server
• Distributed computing
Traffic Flow for Voice over IP
• The flow associated with transmitting
the audio voice is separate from the
flows associated with call setup and
teardown.
– The flow for transmitting the digital voice
is essentially peer-to-peer.
– Call setup and teardown is a client/server
flow
• A phone needs to talk to a server or phone
switch that understands phone numbers, IP
addresses, capabilities negotiation, and so on.
Network Applications
Traffic Characteristics
• Frame size
• Protocol interaction
• Windowing and flow control
• Error-recovery mechanisms
QoS Requirements
Chapter Five
Campus C
Distribution
Campus C Backbone
Layer
Access Layer
Klamath Falls Ashland Grants Pass Klamath Falls Ashland White City
Branch Office Branch Branch Branch Office Branch Branch Office
Office Office Office
Partial-Mesh Topology
Full-Mesh Topology
A Partial-Mesh Hierarchical Design
Headquarters
(Core Layer)
Regional
Offices
(Distribution
Layer)
Corporate
Headquarters
Core Layer
Distribution Layer
Access Layer
Backdoor
Chain
How Do You Know When You
Have a Good Design?
• When you already know how to add a new
building, floor, WAN link, remote site, e-
commerce service, and so on
• When new additions cause only local change, to
the directly-connected devices
• When your network can double or triple in size
without major design changes
• When troubleshooting is easy because there are no
complex protocol interactions to wrap your brain
around
Cisco’s Enterprise Composite
Network Model
Enterprise Campus
Service
Enterprise Edge
Building Provider
Campus Infrastructure
Edge
Access
E-Commerce
ISP A
Network Building
Management Distribution Edge Internet ISP B
Distribution Connectivity
Campus PSTN
Backbone VPN/ Remote Frame
Access Relay,
ATM
WAN
Server Farm
Campus Topology Design
LAN X
Switch 1 Switch 2
LAN Y
Host B
Bridges and Switches use Spanning-
Tree Protocol (STP) to Avoid Loops
Host A
LAN X
Switch 1 X Switch 2
LAN Y
Host B
Bridges (Switches) Running STP
• Participate with other bridges in the election of a single
bridge as the Root Bridge.
• Calculate the distance of the shortest path to the Root
Bridge and choose a port (known as the Root Port) that
provides the shortest path to the Root Bridge.
• For each LAN segment, elect a Designated Bridge and a
Designated Port on that bridge. The Designated Port is a
port on the LAN segment that is closest to the Root Bridge.
(All ports on the Root Bridge are Designated Ports.)
• Select bridge ports to be included in the spanning tree. The
ports selected are the Root Ports and Designated Ports.
These ports forward traffic. Other ports block traffic.
Elect a Root Lowest Bridge ID
Bridge A ID = Wins!
80.00.00.00.0C.AA.AA.AA
Root
Bridge A
Port 1 Port 2
Port 1 Port 1
Bridge B Bridge C
Port 2 Port 2
Bridge B ID = Bridge C ID =
80.00.00.00.0C.BB.BB.BB 80.00.00.00.0C.CC.CC.CC
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Determine Root Ports
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Root
Bridge A
Lowest Cost
Wins!
Port 1 Port 2
Bridge B Bridge C
Port 2 Port 2
Bridge B ID = Bridge C ID =
80.00.00.00.0C.BB.BB.BB 80.00.00.00.0C.CC.CC.CC
LAN Segment 3
100-Mbps Ethernet
Cost = 19
Determine Designated Ports
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Root
Bridge A
Designated Port Designated Port
Port 1 Port 2
Bridge B Bridge C
Port 2 Port 2
Bridge B ID = Bridge C ID =
80.00.00.00.0C.BB.BB.BB 80.00.00.00.0C.CC.CC.CC
LAN Segment 3
Designated Port
100-Mbps Ethernet
Lowest Bridge ID Cost = 19
Wins!
Prune Topology into a Tree!
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Root
Bridge A
Designated Port Designated Port
Port 1 Port 2
Bridge B Bridge C
Port 2 Port 2
Bridge B ID = Bridge C ID = X
80.00.00.00.0C.BB.BB.BB 80.00.00.00.0C.CC.CC.CC
LAN Segment 3
Designated Port Blocked Port
100-Mbps Ethernet
Cost = 19
React to Changes
Bridge A ID =
80.00.00.00.0C.AA.AA.AA
Root
Bridge A
Designated Port Designated Port
Port 1 Port 2
Bridge B Bridge C
Port 2 Port 2
Bridge B ID = Bridge C ID =
80.00.00.00.0C.BB.BB.BB 80.00.00.00.0C.CC.CC.CC
LAN Segment 3
Designated Port Becomes Blocked Port Transitions to
Disabled Forwarding State
Scaling the Spanning Tree
Protocol
• Keep the switched network small
– It shouldn’t span more than seven switches
• Use BPDU skew detection on Cisco
switches
• Use IEEE 802.1w
– Provides rapid reconfiguration of the spanning
tree
– Also known as RSTP
Virtual LANs (VLANs)
Switch A Switch B
Network A Network B
A Switch with VLANs
VLAN A
VLAN B
VLANs Span Switches
VLAN A VLAN A
Switch A Switch B
VLAN B VLAN B
WLANs and VLANs
• A wireless LAN (WLAN) is often
implemented as a VLAN
• Facilitates roaming
• Users remain in the same VLAN and IP
subnet as they roam, so there’s no need to
change addressing information
• Also makes it easier to set up filters (access
control lists) to protect the wired network
from wireless users
Workstation-to-Router
Communication
• Proxy ARP (not a good idea)
• Listen for route advertisements (not a great
idea either)
• ICMP router solicitations (not widely used)
• Default gateway provided by DHCP (better
idea but no redundancy)
– Use Hot Standby Router Protocol (HSRP) for
redundancy
HSRP
Active Router
Enterprise Internetwork
Virtual Router
Workstation
Standby Router
Multihoming the Internet
Connection
ISP 1 ISP 1
Enterprise
Paris Enterprise NY
Option B Option D
Security Topologies
DMZ
Enterprise Internet
Network
Firewall
DMZ
Enterprise Network
Chapter Six
• 10.0.0.0 – 10.255.255.255
• 172.16.0.0 – 172.31.255.255
• 192.168.0.0 – 192.168.255.255
Criteria for Using Static Vs.
Dynamic Addressing
• The number of end systems
• The likelihood of needing to renumber
• The need for high availability
• Security requirements
• The importance of tracking addresses
• Whether end systems need additional
information
– (DHCP can provide more than just an address)
The Two Parts of an IP Address
32 Bits
Prefix Host
Prefix Length
Prefix Length
• An IP address is accompanied by an
indication of the prefix length
– Subnet mask
– /Length
• Examples
– 192.168.10.1 255.255.255.0
– 192.168.10.1/24
Subnet Mask
• 32 bits long
• Specifies which part of an IP address is the
network/subnet field and which part is the host field
– The network/subnet portion of the mask is all 1s in binary.
– The host portion of the mask is all 0s in binary.
– Convert the binary expression back to dotted-decimal notation
for entering into configurations.
• Alternative
– Use slash notation (for example /24)
– Specifies the number of 1s
Subnet Mask Example
*Addresses starting with 127 are reserved for IP traffic local to a host.
Division of the Classful Address
Space
A 8 224-2 = 16,777,214
B 16 216-2 = 65,534
C 24 28-2 = 254
Classful IP is Wasteful
• Class A uses 50% of address space
• Class B uses 25% of address space
• Class C uses 12.5% of address space
• Class D and E use 12.5% of address space
Classless Addressing
• Prefix/host boundary can be anywhere
• Less wasteful
• Supports route summarization
– Also known as
• Aggregation
• Supernetting
• Classless routing
• Classless inter-domain routing (CIDR)
• Prefix routing
Supernetting
172.16.0.0
172.17.0.0
172.18.0.0
Branch-Office Router
172.19.0.0
Enterprise Core
Branch-Office Networks Network
16 00010000
17 00010001
18 00010010
19 00010011
Discontiguous Subnets
Area 0
Network
192.168.49.0
Router A Router B
Area 1 Area 2
Subnets 10.108.16.0 - Subnets 10.108.32.0 -
10.108.31.0 10.108.47.0
A Mobile Host
Router A Router B
Subnets 10.108.16.0 -
10.108.31.0
Host 10.108.16.1
IPv6 Aggregatable Global
Unicast Address Format
3 13 8 24 16 64 bits
Site
Public topology Topology
• Dual stack
• Tunneling
• Translation
Guidelines for Assigning Names
• Names should be
– Short
– Meaningful
– Unambiguous
– Distinct
– Case insensitive
• Avoid names with unusual characters
– Hyphens, underscores, asterisks, and so on
Domain Name System (DNS)
• Maps names to IP addresses
• Supports hierarchical naming
– example: frodo.rivendell.middle-earth.com
• A DNS server has a database of resource
records (RRs) that maps names to addresses in
the server’s “zone of authority”
• Client queries server
– Uses UDP port 53 for name queries and replies
– Uses TCP port 53 for zone transfers
DNS Details
• Client/server model
• Client is configured with the IP address
of a DNS server
– Manually or DHCP can provide the address
• DNS resolver software on the client
machine sends a query to the DNS
server. Client may ask for recursive
lookup.
DNS Recursion
• A DNS server may offer recursion, which allows the
server to ask other servers
– Each server is configured with the IP address of one or
more root DNS servers.
• When a DNS server receives a response from another
server, it replies to the resolver client software. The
server also caches the information for future
requests.
– The network administrator of the authoritative DNS server
for a name defines the length of time that a non-
authoritative server may cache information.
Summary
Chapter Seven
08-00-07-06-41-B9 1
00-00-0C-60-7C-01 2
00-80-24-07-8C-02 3
Cisco Multilayer Switching
Primary Secondary
Uplink
X Uplink
Access
Layer
Switch A X = blocked by STP
e0 e0 e0
172.16.10.1 172.16.30.1 172.16.50.1
e0 e0 e0
172.16.10.1 172.16.30.1 172.16.50.1
Router A Router B
172.16.0.0 192.168.2.0
172.16.0.0 0 192.168.2.0 0
Port 1 Port 1 172.16.0.0
192.168.2.0 1 1
Link-State Routing
• Routers send updates only when there’s a
change
• Router that detects change creates a link-state
advertisement (LSA) and sends it to neighbors
• Neighbors propagate the change to their
neighbors
• Routers update their topological database if
necessary
Distance-Vector Vs. Link-State
• Distance-vector algorithms keep a list of
networks, with next hop and distance (metric)
information
• Link-state algorithms keep a database of
routers and links between them
– Link-state algorithms think of the internetwork as
a graph instead of a list
– When changes occur, link-state algorithms apply
Dijkstra’s shortest-path algorithm to find the
shortest path between any two nodes
Choosing Between Distance-
Vector and Link-State
Choose Distance-Vector Choose Link-State
• Simple, flat topology • Hierarchical topology
• Hub-and-spoke topology • More senior network
• Junior network administrators administrators
• Convergence time not a big • Fast convergence is critical
concern
Dynamic IP Routing Protocols
Distance-Vector Link-State
• Routing Information Protocol • Open Shortest Path First
(RIP) Version 1 and 2 (OSPF)
• Interior Gateway Routing • Intermediate System-to-
Protocol (IGRP) Intermediate System (IS-IS)
• Enhanced IGRP
• Border Gateway Protocol
(BGP)
Routing Information Protocol (RIP)
• First standard routing protocol developed for TCP/IP
environments
– RIP Version 1 is documented in RFC 1058 (1988)
– RIP Version 2 is documented in RFC 2453 (1998)
• Easy to configure and troubleshoot
• Broadcasts its routing table every 30 seconds; 25 routes per
packet
• Uses a single routing metric (hop count) to measure the
distance to a destination network; max hop count is 15
RIP V2 Features
• Includes the subnet mask with route updates
– Supports prefix routing (classless routing, supernetting)
– Supports variable-length subnet masking (VLSM)
Area 0 (Backbone)
• Intermediate System-to-Intermediate
System
• Link-state routing protocol
• Designed by the ISO for the OSI protocols
• Integrated IS-IS handles IP also
Border Gateway Protocol (BGP)
• Allows routers in different autonomous
systems to exchange routing information
– Exterior routing protocol
– Used on the Internet among large ISPs and major
companies
• Supports route aggregation
• Main metric is the length of the list of
autonomous system numbers, but BGP also
supports routing based on policies
Summary
• The selection of switching and routing
protocols should be based on an analysis of
– Goals
– Scalability and performance characteristics of the
protocols
• Transparent bridging is used on modern
switches
– But other choices involve enhancements to STP
and protocols for transporting VLAN information
• There are many types of routing protocols and
many choices within each type
Review Questions
• What are some options for enhancing the
Spanning Tree Protocol?
• What factors will help you decide whether
distance-vector or link-state routing is best for
your design customer?
• What factors will help you select a specific
routing protocol?
• Why do static and default routing still play a
role in many modern network designs?
Top-Down Network Design
Chapter Eight
Campus Infrastructure
Edge
Access
E-Commerce
ISP A
Network Building
Management Distribution Edge Internet ISP B
Distribution Connectivity
Campus PSTN
Backbone VPN/ Remote Frame
Access Relay,
ATM
WAN
Server Farm
Cisco SAFE
• Physical security
• Firewalls and packet filters
• Audit logs, authentication, authorization
• Well-defined exit and entry points
• Routing protocols that support
authentication
Securing Public Servers
• Place servers in a DMZ that is protected via
firewalls
• Run a firewall on the server itself
• Enable DoS protection
– Limit the number of connections per timeframe
• Use reliable operating systems with the
latest security patches
• Maintain modularity
– Front-end Web server doesn’t also run other
services
Security Topologies
DMZ
Enterprise Internet
Network
Firewall
DMZ
Enterprise Network
Chapter Nine
Managed
Devices
Architecture Concerns
Chapter Ten
Cable Bundle
Building A
Distributed Campus Cabling
Building A
Types of Media Used in Campus
Networks
• Copper media
• Optical media
• Wireless media
Copper Media Advantages
Coaxial Twisted-Pair
2 pairs 2 multimode
Thick coax cable
Category-3 or optical fibers
500 meters
better UTP
10Base2 100 meters 10Broad36
100BaseX
100BaseT4 100BaseT2
4 pairs 2 pairs
Category-3 or Category-3 or
better UTP better UTP
100 meters 100 meters
100BaseTX 100BaseFX
2 multimode optical fibers 2 multimode or single-mode 2 pairs STP 4 pairs Category-5 UTP
using shortwave laser optics optical fibers using longwave 25 meters 100 meters
550 meters laser optics
550 meters multimode, 5000
meters single-mode
IEEE 802.3 10-Gbps Ethernet
10GBaseX
Chapter Eleven
Encapsulation based on
High-Level Data-Link Control Protocol (HDLC)
Physical Layer
Multichassis Multilink PPP
Stack group
ISDN Offload
server
Analog
CHAP
Connect
Database of
Users and
Challenge Passwords
Name: 760_1
Password: sfy45 Name: 760_1
Hashed Response Password: sfy45
Name: 760_2
Accept or Deny Password: kingsford
ISDN
• Digital data-transport service offered by
regional telephone carriers (telcos)
• Circuit-switched service that carries voice
and data
• Cost-effective remote-access solution for
telecommuters and remote offices
– Cost of an ISDN circuit is usually based on a
monthly fee plus usage time
• Good choice as a backup link for another
type of link, for example, Frame Relay
ISDN Interfaces
Basic Rate Interface (BRI)
64 Kbps
2B 64 Kbps
} 144
Kbps
D 16 Kbps
64 Kbps
} 2.048 Mbps in
Europe
D
ISDN Components
Non-ISDN R S/T U
device TA NT1 To ISDN
(TE2) 4-wire 2-wire service
circuit circuit
ISDN S T U To ISDN
device NT2 NT1 service
(TE1)
U
ISDN device (TE1) To ISDN
with built-in NT1 service
NT1
Cable Modem Service
• Operates over the coax cable used by cable TV
• Much faster than analog modems, and usually
much faster than ISDN (depending on how
many users share the cable)
– 25 to 50 Mbps downstream from the head end
– 2 to 3 Mbps upstream from end users
• Standard = Data Over Cable Service Interface
Specification (DOCSIS)
DSL
• High-speed digital data traffic over ordinary
telephone wires
• Sophisticated modulation schemes mean
higher speeds than ISDN
– Speeds range from 1.544 to 9 Mbps
• Actual bandwidth depends on type of DSL
service, DSL modem, and many physical-
layer factors
• Asymmetric DSL (ADSL) very popular
– Downstream faster than upstream
WAN Technologies
• Leased lines
• Synchronous Optical Network (SONET)
• Frame Relay
• Asynchronous Transfer Mode (ATM)
Leased Lines
• Dedicated digital, copper circuits that a
customer leases from a carrier for a
predetermined amount of time, usually for
months or years
• Speeds range from 64 Kbps to 45 Mbps
• Enterprises use leased lines for both voice
and data traffic
The North American Digital
Hierarchy
Signal Capacity Number of Colloquial Name
DS0s
DS0 64 Kbps 1 Channel
DS1 1.544 Mbps 24 T-1
DS1C 3.152 Mbps 48 T-1C
DS2 6.312 Mbps 96 T-2
DS3 44.736 Mbps 672 T-3
DS4 274.176 Mbps 4032 T-4
Synchronous Optical Network
(SONET)
• Physical-layer specification for high-speed
synchronous transmission of packets or
cells over fiber-optic cabling
• Service providers and carriers make wide
use of SONET in their internal networks
• Gaining popularity within private networks
SONET Optical Carrier (OC) Levels
aka Synchronous Transport Signal (STS) Levels
SONET Multiplexer
Backup Pair
Working Pair
Frame Relay
• Industry-standard data-link-layer protocol
for transporting traffic across wide-area
virtual circuits
• Optimized for efficiency on circuits with
low error rates
• Attractively-priced in most parts of the
world
• Carriers agree to forward traffic at a
Committed Information Rate (CIR)
Frame Relay (continued)
To Router B:
DLCI 100
To Router A:
DLCI 200
Router A Router B
Virtual Circuit (VC)
Frame Relay Hub-and-Spoke
Uses Subinterfaces
hostname centralsite
interface serial 0
Central-Site Router
encapsulation frame-relay
interface serial 0.1
Chapter Twelve
Firewall
Network A Network B
Protocol Protocol
Analyzer Analyzer
Example Test Script (continued)
Chapter Thirteen
• Becoming obsolete
– Multicast OSPF (MOSPF)
– Distance Vector Multicast Routing Protocol
(DVMRP)
• Still used
– Protocol Independent Multicast (PIM)
• Dense-Mode PIM
• Sparse-Mode PIM
Reducing Serialization Delay
Bit 0 3 4 5 6 7
D = Delay
T = Throughput
Precedence D T R C 0
R = Reliability
C = Cost
Bit 0 8 15 24 31
Source IP Address
Destination IP Address
Options Padding
IP Differentiated Services (DS)
Field
• RFC 2474 redefines the type of service field
as the Differentiated Services (DS) field
– Bits 0 through 5 are the Differentiated Services
Codepoint (DSCP) subfield
• Has essentially the same goal as the precedence
subfield
• Influences queuing and packet dropping decisions for
IP packets at a router output interface
– Bits 6 and 7 are the Explicit Congestion
Notification (ECN) subfield
IP Differentiated Services (DS)
Field
0 6
Differentiated Services Codepoint Explicit Congestion Notification
0 8 15 24 31
Version Header Differentiated Services Total Length
Length
Classifying LAN Traffic
• IEEE 802.1p
• Classifies traffic at the data-link layer
• Supports eight classes of service
• A switch can have a separate queue for each
class and service the highest-priority queues
first
Cisco Switching Techniques
• Process switching
• Fast switching
• Autonomous, silicon, and optimum
switching
• NetFlow switching
• Cisco Express Forwarding (CEF)
Cisco Queuing Services
NO
Packet in medium
YES queue?
NO
Packet in normal
YES queue?
NO
Packet in low
YES queue?
YES
NO Packet in
Queue?
YES
Reached
YES transmission NO
Next Queue Dispatch Packet
window size?
Low-Latency Queuing
• One queue always gets the green light
– Use this for voice
• Combine this with class-based
weighted fair queuing
– Define traffic classes based on protocols,
access control lists, and input interfaces
– Assign characteristics to classes such as
bandwidth required and the maximum
number of packets that can be queued for
the class
Random Early Detection (RED)
• Congestion avoidance rather than
congestion management
• Monitors traffic loads and randomly
discards packets if congestion increases
• Source nodes detect dropped packets and
slow down
– Works best with TCP
• Weighted Random Early Detection
• Cisco’s implementation uses IP precedence or the
DS field instead of just randomly dropping packets
Traffic Shaping
Chapter Fourteen