Campus Network Best Practices: Core and Edge Networks



Similar documents
Campus Network Best Practices: Core and Edge Networks

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

Top-Down Network Design

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Campus Network Design Science DMZ

Campus Networking Best Practices. Session 5: Wireless LAN

IP Telephony Management

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Troubleshooting and Maintaining Cisco IP Networks Volume 1

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:

Computer Networks Vs. Distributed Systems

Network System Design Lesson Objectives

Cisco Network Switches Juniper Firewall Clusters

SSVP SIP School VoIP Professional Certification

Networking Devices. Lesson 6

State of Texas. TEX-AN Next Generation. NNI Plan

John Ragan Director of Product Management. Billy Wise Communications Specialist

Switching in an Enterprise Network

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

GregSowell.com. Mikrotik Basics

Lab Developing ACLs to Implement Firewall Rule Sets

10 QUESTIONS TO ASK BEFORE YOU BUY PHONE SERVICE FOR YOUR BUSINESS SHARE THIS DOCUMENT 1

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

How To Understand and Configure Your Network for IntraVUE

AUGUSTA TECHNICAL COLLEGE INFORMATION TECHNOLOGY PLAN

Networking Topology For Your System

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

21 st Century Campus Network Responsibility Matrix 5/26/10

Networking Basics for Automation Engineers

Setting up IP address distribution in a LAN

Scenario 1: One-pair VPN Trunk

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

What is VLAN Routing?

Networking Technology Online Course Outline

SURF Feed Connection Guide

RAP Installation - Updated

Computer Network Engineering

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

IT 3202 Internet Working (New)

VLANs. Application Note

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

How To Build A Lightpath Network For Multiple Lightpath Projects

Burning Bridges - Routing Your Bridged WISP Network With MikroTik

Penn State Wireless 2.0 and Related Services for Network Administrators

National Education Network. KAREN School Cluster High-level Design

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Device Interface IP Address Subnet Mask Default Gateway

Edgewater Routers User Guide

Computer Networking Networks

CompTIA Network+ (Exam N10-005)

Layer 3 Network + Dedicated Internet Connectivity

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Application Note Gigabit Ethernet Port Modes

Configure WAN Load Balancing

How to Create a Virtual Switch in VMware ESXi

How to Configure an Initial Installation of the VMware ESXi Hypervisor

CTS2134 Introduction to Networking. Module Network Security

Converged Voice Service Summary

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Edgewater Routers User Guide

Systems Integration Track: Network Topology

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Abstract. Avaya Solution & Interoperability Test Lab

How To Make A Network Secure

WAN Traffic Management with PowerLink Pro100

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

CORPORATE NETWORKING

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

SIP Trunking Guide: Get More For Your Money 07/17/2014 WHITE PAPER

Application Description

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

PREPARED FOR ABC CORPORATION

KENET NETWORK INFRASTUCTURE. KENNEDY ASEDA

TechBrief Introduction

Best Practices for deploying unified communications together with SIP trunking connectivity

Communication Networks. MAP-TELE 2011/12 José Ruela

The number LEON COUNTY NG9-1-1, RFP # BC Addendum #3

ICT Infrastructure & Network Management

Glossary of Telco Terms

Migrating a Campus Network: Flat to Routed

Networking 4 Voice and Video over IP (VVoIP)

NEN Community REANNZ. Design Statement: NEN Edge Device

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

CMPT 471 Networking II

Designing scalable wireless networks in the campus LAN

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Enabling Innovation - Unleashing Unified Communications: Best Practices and Case Studies. October 18-19, 2011

SSVVP SIP School VVoIP Professional Certification

Transcription:

Campus Network Best Practices: Core and Edge Networks Dale Smith University of Oregon/NSRC dsmith@uoregon.edu This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied, modified, and otherwise re-used on the condition that any re-use acknowledge the NSRC as the original source.

Campus Network Rules Minimize number of network devices in any path Use standard solutions for common situations Build Separate Core and Edge Networks Provide services near the core Separate border routers from core Provide opportunities to firewall and shape network traffic

Core versus Edge Core network is the core of your network Needs to have reliable power and air conditioning May have multiple cores Always route in the core Edge is toward the edges of your network Provide service inside of individual buildings to individual computers Always switch at the edge

Minimize Number of Network Build star networks Devices in the Path Not daisy chained networks

Edge Networks (Layer 2 LANs) Provides Service to end users Each of these networks will be an IP subnet Plan for no more than 250 Computers at maximum Should be one of these for every reasonable sized building This network should only be switched Always buy switches that are managed no unmanaged switches!

Edge Networks Make every network look like this: Fiber link to core router

Edge Networks Continued Build Edge network incrementally as you have demand and money Start Small: Fiber link to core router

Edge Networks Continued Then as you need to add machines to the network, add a switch to get this: Fiber link to core router

Edge Networks Continued And keep adding switches to get to the final configuration Fiber link to core router

Edge Networks Continued And keep adding switches to get to the final configuration Fiber link to core router

Edge Networks Continued Resist the urge to save money by breaking this model and daisy chaining networks or buildings together Try hard not to do this: Fiber link to Link to another building Link to adjacent building core router

Edge Networks Continued There are cases where you can serve multiple small buildings with one subnet. Do it carefully. Two basic models: Fiber link to core router Copper or fiber link to core router Switch in core location Cat5e or fiber Cat5e or fiber Fiber circuits to small buildings

Core Network

Routing versus Switching Layer 2 versus Layer 3 Routers provide more isolation between devices (they stop broadcasts) Routing is more complicated, but also more sophisticated and can make more efficient use of the network, particularly if there are redundancy elements such as loops

Switching versus Routing These links must be routed, not switched

Core Network Reliability is the key remember many users and possibly your whole network relies on the core May have one or more network core locations Core location must have reliable power UPS battery backup (redundant UPS as your network evolves) Generator Core location must have reliable air conditioning As your network evolves, core equipment should be equipped with dual power supplies, each powered from separate UPS Border routers separate from Core Firewalls and Traffic Shaping Devices Intrusion Detection Intrusion Prevention Network Address Translation

Core Network At the core of your network should be routers you must route, not switch. Routers give isolation between subnets A simple core: REN Border Router Core Router All router interfaces on a separate subnet Fiber optic links to remote buildings Central Servers for campus

Where to put Firewalls Security devices must be place in line This means that the speed of the firewall affects access to the outside world This is a typical design, but should be avoided: REN Border Router Firewall/ Traffic Shaper Core Router All router interfaces on a separate subnet Fiber optic links to remote buildings

Where to put Firewalls Try to have parts of your network non-firewalled These will allow full bandwidth, un-filtered access to the Internet One configuration: REN Border Router Core Router Core Switch Firewall/ Traffic Shaper Core Router Non-firewalled Network Firewalled Network

Where to put Servers? Servers should be on a high speed interface off of your core router Servers should be at your core location where there is good power and air conditioning Border Router Firewall/ Traffic Shaper Core Router All router interfaces on a separate subnet Fiber optic links to remote buildings Servers in core

Border Router Connects to outside world RENs and Peering are the reason you need them Must get Provider Independent IP address space to really make this work right Internet Exchange REN Campus Network

Putting it all Together Border Router Firewall/ Traffic Shaper REN switch Core Router Core Servers Fiber Optic Links Fiber Optic Links

More Complex Core Designs One Armed Router for Core VLAN Trunk carrying all subnets Core Router Core Switch Core Servers Fiber Optic Links Fiber Optic Links

Complex Core Designs Multiple Core Routers Border Router Firewall/ Traffic Shaper Local Internet exchange switch Core Router Core Switch Fiber Links to remote buildings Core Router

Alternative Core Designs Wireless Links versus Fiber Border Router Firewall/ Traffic Shaper REN switch Core Router Core Servers Fiber Optic Links Wireless Links

Layer 2 and 3 Summary Route in the core Switch at the edge Build star networks don t daisy chain Buy only managed switches re-purpose your old unmanaged switches for labs

Questions? This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied, modified, and otherwise re-used on the condition that any re-use acknowledge the NSRC as the original source.

Symbols to use for diagrams