WAN topology

advertisement

Network design

WAN topology

Topic 5

Agenda

Enterprise topology

Functions and components

Security

Design goals

Physical standards

Topologies

WAN link types

Enterprise Composite Network Model

• A hierarchal and scalable blue-print for network designers

• Enterprise campus

– The elements for network operation within one campus (building)

– Designed to provide high availability, scalability, and flexibility

– Includes a campus backbone, a server farm, building access and building distribution modules and a network management module

• Enterprise edge

– Efficient and secure communication between the enterprise campus and remote locations, business partners, mobile users, and the Internet

– Aggregates connectivity, provides traffic filtering and inspection and routing to the enterprise campus

– Includes WAN, VPN, internet access, and e-commerce modules

• Service provider edge

– Enables communication with other networks

– Uses different WAN technologies and Internet service providers (ISPs)

Enterprise Composite Network Model

Service Providers

• Tier 1 provider

– National or international backbone with at least DS-3, OC-3 to OC-48 connectivity

– All its routes from bilateral peering arrangements

– 24/7 network operations center

– Customers are primarily other providers, but it may support a large enterprise also

• Tier 2 Provider

– Regional or national presence

– High bandwidth backbones and 24/7 operations

– Buys transit (discounted) from a Tier 1 provider for traffic that goes outside the region

– Gets all its regional routes through peering arrangements.

• Tier 3 Provider

– Typically a regional provider for a small or medium-sized region

– Buys transit from multiple upstream providers

– Runs a default-free routing table

• Tier 4 and Tier 5 Providers

– Metropolitan provider multi-homed to two regional providers

– Small, single-homed provider that connects end users via dialup, cable modem, or wireless service

Enterprise edge module

• Edge distribution

– Interface to the enterprise network

– Web security appliances and Intrusion Prevention appliances

• E-commerce

– DMZ security zones with internet facing servers, network services such as DNS, FTP and NTP, email, websites and web portal

– Separates internal and external services such as DNS, intranet and collaboration services

• Internet connectivity

– Safe and secure access to internet for corporate users, and remote users

• Remote access VPN

– Corporate access to remote users such as tele-workers and mobile workers

• WAN

– Wan networks such as Frame Relay and ATM to other sites

– Site-to-site VPNs for branch and partner sites

– Protection services such as Intrusion Protection services

Components

• Inner switch

– Provide connectivity between core and campus VLANs and firewall

• Firewall

– Stateful access control and deep packet inspection

– Controlling user’s internet bound traffic

– Protecting public services in DMZ

• Outer switches

– Provides connectivity between the firewall and the edge router

• Edge routers

– Route traffic from enterprise to the internet via one or more ISPs

– Security such as ACLs and uRPF

• Remote access appliances

– Terminate remote-access VPNs such as SSL and Ipsec VPNs

Design goals for the edge

Availability

• Eliminate any single point of failure on the network

– Redundancy

• High availability for internet, extranet, and virtual private network (VPN) with redundant interfaces, standby devices, redundant links and devices

• Reliability by duplicating any required component whose failure could disable critical applications – a channel service unit (CSU), a power supply, a WAN trunk, internet connectivity

– Affordability

• Trade-offs may be required

Design goals for the edge

• Backup paths

– How much capacity does the backup path support?

– How quickly will the network begin to use the backup path?

– Common for a backup path to have less capacity than a primary path and use different technologies

– Automatic failover is necessary for mission-critical applications

– What about the cable to the ISP – often the weakest link

• Multi-homing the internet connection

– Providing an enterprise network with more than one entry into the Internet.

• Circuit diversity

– Different carriers sometimes use the same facilities

– Ensure that your backup really is a backup

Design goals for the edge

Management

– Configurations

– Monitor traffic flows

– Monitor protocol and process efficiency

– Security baselines

• Device access

• Routing security

• Device resilience

• Policy enforcement

Designing process

What are the business and technical goals for the Enterprise Edge?

– Who are the user communities?

– What is the health of the existing network?

– Where are the traffic flows?

What technologies?

What topology?

What link type?

Security and remote access

• Business and technical goals

– Confidentiality and privacy

– Integrity

– Availability

• Security technologies

– Security zones, ACLs and network address translation

– Access control

• AAA services

• Auditing

– Protection

• Application inspection

• Monitoring and intrusion protection

– Privacy

• Encryption

• Remote access

– Remote access VPNS, SSL and Ipsec VPNS

– Site-to-site VPNS

WAN topologies

• Full mesh

– Every router is connected to every other router for complete redundancy

– Good performance because there is just a single link delay between any two sites

– The number of links in a full-mesh topology is

• (N * (N – 1)) / 2

– Expensive to deploy and maintain, hard to optimize, troubleshoot, and upgrade

– Scalability limits for groups of routers that broadcast routing updates or service advertisements (20% broadcast rule)

• Partial mesh

– Not every router is connected to every other router

– Compromise solution

• Partial redundancy

• Less cost

• Less performance as some destinations might require traversing intermediate links

• Hub and spoke (Star)

– Common hierarchical design

– Destinations are reached via the ‘hub’

• Peer

– No redundancy, least expensive, easiest setup

Choosing a WAN link connection

• What is the purpose of the WAN?

• What is the geographic scope?

• What are the traffic requirements? Type, volume, quality and security

• Should the WAN use a private or public infrastructure?

• For a private WAN, should it be dedicated or switched?

• For a public WAN, what type of VPN access do you need?

• Which connection options are available locally?

• What is the cost of the available connection options?

WAN link connection methods

Private

– Dedicated

• Leased lines Point-to-Point and Point-to-Multipoint PPP HDLC

– Switched

• Circuit Switched, PSTN, ISDN

• Packet Switched, Frame Relay, X.25, ATM (cells)

Public

– Internet

• DSL, cable, broadband wireless

• Satellite

• Metro Ethernet

Leased lines

• Permanent dedicated connections leased from carrier

– T1 1.544 Mb/s

– T3 44.736 Mb/s

– E1 2.048 Mb/s (Australia)

– E3 34.064 Mb/s (Australia)

• A router serial port is required for each leased line connection.

• A CSU/DSU and the actual circuit from the service provider are also required.

– CSU/DSU is a Channel Service Unit/Data Service Unit that terminates T1/E1 carrier lines

• Lower latency and jitter

• No call setup required

Public networks

• DSL

– Always-on connection technology that uses existing PSTN infrastructure and DSL access multiplexer (DSLAM) at the provider location

– Varying data rates of up to 8.192 Mb/s and distance limitations

• Cable

– Always-on connection that uses existing cable TV infrastructure

– Bandwidth shared by users

• Broadband wireless – WiMax

– High-speed broadband service over metro distances for many users

– Provides broad coverage like a cell phone network

• Satellite

– Rural users, upload speed is about one-tenth of download speed

– Satellite dish, two modems (uplink and downlink), and coaxial cables

• Metro Ethernet

– Reduced expenses and administration

– Easy integration with existing networks

Circuit switching

• Establishes a circuit between hosts before communication can start

• Initial very fast call setup to establish a dedicated circuit or path which cannot be used by others until call tear down

• ISDN

– Time-division multiplexed (TDM) digital signals

– Uses 64 kb/s bearer channels (B) for carrying voice or data and a signaling, delta channel (D) for call setup and call management

– Basic Rate Interface (BRI)-ISDN is intended for the home and small enterprise and provides two 64 kb/s B channels and a 16 kb/s D channel

– Primary Rate Interface (PRI)-ISDN provides 30 B channels and one D channel, for an E1 link of 2.048 Mb/s

• ISDN links are used by enterprises as an extra capacity and backup link

Packet switching

• Packets are routed individually and can follow different paths to destination and arrive out of order

• Connection oriented packet switching verifies the existence of the destination with a 3-way handshake

• Frame Relay

– Permanent and shared connectivity for voice and data traffic using virtual circuits (up to 4 Mbp/s)

– Frame Relay is ideal for connecting enterprise LANs

• Asynchronous Transfer Mode (ATM)

– Small, fixed-length cells carrying data, voice and video traffic over private and public networks

Physical WAN serial standards

Standards to define how to transmit and receive signals

– EIA/TIA-232

– EIA/TIA-449

– EIA-530

– High-Speed Serial Interface (HSSI)

– V.24

– V.35

– X.25

– X.21

– G.703

Agenda

Enterprise topology

Functions and components

Security

Design goals

Physical standards

Topologies

WAN link types

Download