NDM Notes 1
NDM Notes 1
NDM Notes 1
• Find out what new applications have been introduced to the network.
• Determine the number of users using these applications.
• Find out the traffic flow for these applications.
• Identify what new protocols are being introduced to the network.
• Determine what applications are used during the daytime hours and
what are used during the nighttime hours.
• Determine the time of day that represents the peak usage hours of
applications.
Network Management Requirements
Security Requirements
This is the step during which you collect all data pertaining to physical,
logical, traffic, and management information of the network.
Physical Assessment
Geographical structure
Determine how the customer’s company is spread geographically. You
should always review the geographical structure of the company with the
corporate structure. Doing this research helps you understand and locate major
user communities.
• Current and future staffing
The network must have enough flexibility to address the needs of the
existing staff as well as support the growth and expansion of a company.
To help you determine current and future staffing needs, ask the following
questions:
— Ask the network users how these network changes will affect them.
— Ask the network users which department or departments will be affected.
— Ask the IS staff how much in-house internetworking expertise there is.
— Ask the IS staff if the company plans to expand staff as required to support the
new internetwork design.
— Ask the IS staff who will help you design the internetwork.
— Ask if the new design will cause changes in job functions or possibly eliminate
jobs.
Policies and politics:
Provides an understanding of how the design and implementation of the
new network will affect the people and policies in the company. Find out whether
they have any current policies related to the infrastructure. An example would be
the corporate security policy or LAN access.
Assessing the Customer’s Technical Information
Before you can begin developing a design solution, you must assess the
company’s current network technical information. Technical data helps you
identify any network bottlenecks, understand how systems work together, and
determine whether there are any obvious issues in implementing the new design.
Technical assessment can be divided into the following areas:
• Performance
• Applications
• Network management
• Security
Performance Assessment
To assess the performance issues of the current network, you will want to
ask the following questions:
• Is there any latency?
• What is causing that latency?
• When do the performance problems happen?
• How will performance be affected by the proposed design?
• How much traffic flows between segments?
• Are there new applications, networks, or segments that will add to
the traffic?
Applications Assessment
To completely assess the applications on the current network, you will
need to look at the following:
• Applications: Identify the customer’s current applications and plans for future
applications, including information such as who uses the applications.
• Information flows: Analyze where information flows in the company and how
different applications and traffic affects that flow.
• Shared data: Determine where shared data resides and who uses it.
• Categorize data: This will help you understand the different types of data
passed along in the company’s network, such as routed protocols, non-routed
protocols, and routing protocols
Before you alter a network, you need to know what currently exists and
the impact of your design on the existing environment.
Step 1 Characterize the customer’s applications.
Step 2 Characterize the network protocols.
Step 3 Document the customer’s current network.
Step 4 Identify potential bottlenecks.
Step 5 Identify the business constraints and inputs into your network design.
Step 6 Characterize the existing network availability.
Step 7 Characterize the network performance.
Step 8 Characterize the existing network reliability.
Step 9 Characterize the network utilization.
Step 10 Characterize the status of the major routers.
Step 11 Characterize the existing network management tools.
Step 12 Summarize the health of the existing network.
KEY POINT:
In the SONA framework, the network is the common element that connects and
enables all components of the IT infrastructure.
The SONA framework defines the following three layers:
■ Networked Infrastructure layer:
Where all the IT resources are interconnected across a converged
network foundation; The IT resources include servers, storage, and clients. The
Networked Infrastructure layer represents how these resources exist in different
places in the network, including the campus, branch, data center, enterprise
edge, WAN, metropolitan-area-network (MAN. The objective of this layer is to
provide connectivity, anywhere and anytime.
The Networked Infrastructure layer includes the network devices and links to
connect servers, storage, and clients in different places in the network.
Interactive Services layer:
Includes both applications networking services and infrastructure services,
this layer enables efficient allocation of resources to applications and business
processes delivered through the networked infrastructure;
This layer includes the following services:
— Voice and collaboration services
— Mobility services
— Wireless services
— Security and identity services
— Storage services
— Compute services
— Application networking services (content networking services)
— Network infrastructure virtualization
— Adaptive network management services
— Quality of service (QoS)
— High availability
Application layer:
This layer includes business applications and collaboration applications.
The objective of this layer is to meet business requirements and achieve
efficiencies by leveraging the interactive services layer. This layer includes the
following collaborative applications:
— Instant messaging
— Cisco Unified Contact Center
— Cisco Unity (unified messaging)
— Cisco IP Communicator and Cisco Unified IP Phones
— Cisco Unified Meeting Place
— Video delivery using Cisco Digital Media System
— IP telephony
Design Methodology
When working in an environment that requires creative production on a
tight schedule—for example, when designing an internetwork—using a
methodology can be helpful. A methodology is a documented, systematic way of
doing something.
Following a design methodology can have many advantages:
Sample Diagram, Help you to collect information and design any network.
With only this diagram, many questions remain about the network and the
expected network functionality, including the following:
■ What is the IP addressing scheme?
■ What level of redundancy or high availability currently exists in the network?
■ What level of redundancy or high availability is required in the new network?
■ What are the details of the security design?
■ What types of links are in the network?
■ What are the link speeds?
■ What are the planned Layer 2 and Layer 3 topologies?
■ How is connectivity provided to remote sites?
■ What network infrastructure services are in use, such as voice and video, and
what is planned?
■ Are existing wireless devices in place, or are any wireless deployments
planned?
■ What routing protocols are in use?
■ Are there any server farm or remote data center connectivity requirements?
■ What network management tools are in place?
It is important to get as much information as possible about the existing situation
before commencing design.
Redundant Models
When designing a network topology for a customer who has
critical systems, services, or network paths, you should determine the likelihood that
these components will fail and design redundancy where necessary.
Consider incorporating one of the following types of redundancy into your design:
• Workstation-to-router redundancy
• Server redundancy
• Route redundancy
• Media redundancy
Each of these types of redundancy is elaborated in the sections that follow.
Workstation-to-Router Redundancy
When a workstation has traffic to send to a station that is not local, the workstation
has many possible ways to discover the address of a router on its network segment,
including the following:
• Address Resolution Protocol (ARP)
• Explicit configuration
• Router Discovery Protocol (RDP)
• Routing Information Protocol (RIP)
• Internetwork Packet Exchange (IPX)
• AppleTalk
• Hot Standby Router Protocol (HSRP)
Server Redundancy
Having the right naming scheme can help the network staff
knows which device they are using without having to rely on a printed
spreadsheet or other outside reference.
For very small networks, you could use a naming system such as
jecky, Sleepy, and so on, but these names do not provide an
understanding of the function of these devices. As a better solution,
you could name servers based on their function or the group they
serve, such as Admin01, IT_Server01, and Finance01
19" Cable Manager with Plastic Rings, 1U (ring dimensions: 70 x 44.5 mm (2.76" x 1.75"))
CM-1U-PL
19" Cable Manager with Plastic Rings, 2U (ring dimensions: 70 x 44.5 mm (2.76" x 1.75"))
CM-2U-PL
19" Cable Manager with Plastic Rings and Cover, 1U (ring dimensions: 60 x 44.5 mm (2.36" x 1.75"))
CM-1U-PL-COV
Hardware
Our servers use 2U Intel Dual CORE Woodcrest Xeon Processors, 4MB cache, 4.0GB
ECC RAM, 3 x 320GB SATA II (3Gb/s) Hard Drives with Hardware Raid 5 for hard
drive redundancy, Hardened Secure Kernel and Redundant Power Supply Units.
Equipment
Each cabinet is powered by dual 20 Amp power circuits each on a different UPS for fully
redundant power.
All CAT5 is prewired in to patch panels for efficient cable management.
Cables are properly managed to ensure good air flow and cooling.
We use a combination of Cisco and Foundry switches all connected via gigE to the core
switch.
Servers are also connected to APC reboot switches, as well as being behind a Cisco PIX
firewall.
All servers are backed by N+1 redundant UPS systems in additional to being backed by
the Diesel generator.
Network
Multi-homed redundant fiber connections and peering with Tier-1 providers ensure you're always
connected and that your data takes the quickest, most efficient routes for optimal transfer speeds.
Maintenance and support contracts with all of our vendors, along with third party consultants, ensure
Patch Panels
Internap FCP Appliances
Patch Panels
Patch Panels
Power
Uninterrupted power solutions that are flexible and upgradeable provide constant power to your
hardware. Our Mitsubishi UPS battery system takes over instantly while our diesel generator starts up.
UPS System
Bypass Panel
UPS System
Bypass panel
Redundant Power
UPS System
Generator
Generator
Security
Security
Multi-layer security control procedures, staffed 24/7, proximity card readers, and IP video monitoring
ensure that your hardware is never tampered with. Public access is not available unless personally
IP Video Surveillance
Fire Suppression
VESDA smoke detection, double-action dry pipe fire suppression modules prevent emergencies before
they start.
Cooling
Leibert HVAC redundant architecture with overhead air distribution makes sure that your equipment is
Leibert HVAC
Leibert
Leibert HVAC
Leibert HVAC
Leibert HVAC
Leibert HVAC