Week 1 - LAN Design Module PDF
Week 1 - LAN Design Module PDF
Week 1 - LAN Design Module PDF
1
Week 1: LAN Design
Introduction
There is a tendency to discount the network as just simple plumbing, to think that all you
have to consider is the size and the length of the pipes or the speeds and feeds of the links,
and to dismiss the rest as unimportant. Just as the plumbing in a large stadium or high rise
has to be designed for scale, purpose, redundancy, protection from tampering or denial of
operation, and the capacity to handle peak loads, the network requires similar consideration.
As users depend on the network to access the majority of the information they need to do
their jobs and to transport their voice or video with reliability, the network must be able to
provide resilient, intelligent transport.
As a business grows, so does its networking requirements. Businesses rely on the network
infrastructure to provide mission-critical services. Network outages can result in lost
revenue and lost customers. Network designers must design and build an enterprise
network that is scalable and highly available.
The campus local area network (LAN) is the network that supports devices people use within
a location to connect to information. The campus LAN can be a single switch at a small remote
site up to a large multi-building infrastructure, supporting classrooms, office space, and
similar places where people use their devices. The campus design incorporates both wired
and wireless connectivity for a complete network access solution.
This chapter discusses strategies that can be used to systematically design a highly functional
network, such as the hierarchical network design model and appropriate device selections.
The goals of network design are to limit the number of devices impacted by the failure of a
single network device, provide a plan and path for growth, and create a reliable network.
A network must support the exchange of various types of network traffic, including data files,
email, IP telephony, and video applications for multiple business units. All enterprise
networks must:
Support critical applications
Support converged network traffic
Support diverse business needs
Provide centralized administrative control
The LAN is the networking infrastructure that provides access to network communication
services and resources for end users and devices spread over a single floor or building. You
create a campus network by interconnecting a group of LANs that are spread over a small
geographic area. Campus network designs include small networks that use a single LAN
switch, up to very large networks with thousands of connections.
The campus wired LAN enables communications between devices in a building or group of
building, as well as interconnection to the WAN and internet edge at the network core.
A hierarchical LAN design includes the following three layers, as shown in Figure 1-2:
Access layer
Distribution layer
Core layer
The access layer provides endpoints and users direct access to the network. The distribution
layer aggregates access layers and provides connectivity to services. Finally, the core layer
provides connectivity between distribution layers for large LAN environments. User traffic
is initiated at the access layer and passes through the other layers if the functionality of those
layers is required.
Even though the hierarchical model has three layers, some smaller enterprise networks may
implement a two-tier hierarchical design. In a two-tier hierarchical design, the core and
distribution layers are collapsed into one layer, reducing cost and complexity, as shown in
Figure 1-3.
In flat or meshed network architectures, changes tend to affect a large number of systems.
Hierarchical design helps constrain operational changes to a subset of the network, which
makes it easy to manage as well as improve resiliency. Modular structuring of the network
into small, easy-to-understand elements also facilitates resiliency via improved fault
isolation.
Use expandable, modular equipment or clustered devices that can be easily upgraded
to increase capabilities. Device modules can be added to the existing equipment to
support new features and devices without requiring major equipment upgrades.
Some devices can be integrated in a cluster to act as one device to simplify
management and configuration.
Design a hierarchical network to include modules that can be added, upgraded, and
modified, as necessary, without affecting the design of the other functional areas of
IT6205A - Data Communication and Networking 3
5
Week 1: LAN Design
the network. For example, creating a separate access layer that can be expanded
without affecting the distribution and core layers of the campus network.
Create an IPv4 or IPv6 address strategy that is hierarchical. Careful address planning
eliminates the need to re-address the network to support additional users and
services.
Choose routers or multilayer switches to limit broadcasts and filter other undesirable
traffic from the network. Use Layer 3 devices to filter and reduce traffic to the
network core.
As shown in the figure 1-4, more advanced network design requirements include:
Implementing redundant links in the network between critical devices and between
access layer and core layer devices.
Implementing multiple links between equipment, with either link aggregation
(EtherChannel) or equal cost load balancing, to increase bandwidth. Combining
multiple Ethernet links into a single, load-balanced EtherChannel configuration
increases available bandwidth. EtherChannel implementations can be used when
budget restrictions prohibit purchasing high-speed interfaces and fiber runs.
Using a scalable routing protocol and implementing features within that routing
protocol to isolate routing updates and minimize the size of the routing table.
Implementing wireless connectivity to allow for mobility and expansion.
For many organizations, the availability of the network is essential to supporting business
needs. Redundancy is an important part of network design for preventing disruption of
network services by minimizing the possibility of a single point of failure. One method of
implementing redundancy is by installing duplicate equipment and providing failover
services for critical devices.
STP eliminates Layer 2 loops when redundant links are used between switches. It does this
by providing a mechanism for disabling redundant paths in a switched network until the
path is necessary, such as when failures occur. STP is an open standard protocol,
used in a switched environment to create a loop-free logical topology.
More details about LAN redundancy and the operation of STP are covered in the chapter
titled “STP”.
Failure Domains
A well-designed network not only controls traffic, but also limits the size of failure
domains. A failure domain is the area of a network that is impacted when a critical
device or network service experiences problems.
The function of the device that initially fails determines the impact of a failure domain.
For example, a malfunctioning switch on a network segment normally affects only the
hosts on that segment. However, if the router that connects this segment to others fails,
the impact is much greater.
The use of redundant links and reliable enterprise-class equipment minimize the
chance of disruption in a network. Smaller failure domains reduce the impact of a
failure on company productivity. They also simplify the troubleshooting process,
thereby, shortening the downtime for all users.
Increasing Bandwidth
Implementing EtherChannel
In hierarchical network design, some links between access and distribution switches may
need to process a greater amount of traffic than other links. As traffic from multiple links
converges onto a single, outgoing link, it is possible for that link to become a bottleneck. Link
aggregation allows an administrator to increase the amount of bandwidth between devices
by creating one logical link made up of several physical links. EtherChannel is a form of link
aggregation used in switched networks.
EtherChannel uses the existing switch ports; therefore, additional costs to upgrade the link
to a faster and more expensive connection are not necessary. The EtherChannel is seen as
one logical link using an EtherChannel interface. Most configuration tasks are done on the
EtherChannel interface, instead of on each individual port, ensuring configuration
consistency throughout the links. Finally, the EtherChannel configuration takes advantage of
load balancing between links that are part of the same EtherChannel, and depending on the
hardware platform, one or more load-balancing methods can be implemented.
EtherChannel operation and configuration will be covered in more detail in the chapter titled
“Etherchannel and HSRP”.
IT6205A - Data Communication and Networking 3
9
Week 1: LAN Design
The network must be designed to be able to expand network access to individuals and
devices, as needed. An increasingly important aspect of extending access layer connectivity
is through wireless connectivity. Providing wireless connectivity offers many advantages,
such as increased flexibility, reduced costs, and the ability to grow and adapt to changing
network and business requirements.
To communicate wirelessly, end devices require a wireless NIC that incorporates a radio
transmitter/receiver and the required software driver to make it operational. Additionally,
a wireless router or a wireless access point (AP) is required for users to connect.
There are many considerations when implementing a wireless network, such as the types of
wireless devices to use, wireless coverage requirements, interference considerations, and
security considerations.
Advanced routing protocols, such as OSPF and EIGRP are used in large networks.
Link-state routing protocols such as Open Shortest Path First (OSPF), as shown in Figure 1,
works well for larger hierarchical networks where fast convergence is important. OSPF
routers establish and maintain neighbor adjacency or adjacencies, with other connected
OSPF routers. When routers initiate an adjacency with neighbors, an exchange of link-state
updates begins. Routers reach a FULL state of adjacency when they have synchronized views
on their link-state database. With OSPF, link state updates are sent when network changes
occur. Single Area OSPF configuration and concepts will be covered in Chapter 8.
Another popular routing protocol for larger networks is Enhanced Interior Gateway Routing
Protocol (EIGRP). Cisco developed EIGRP as a proprietary distance vector routing protocol
with enhanced capabilities. Although configuring EIGRP is relatively simple, the underlying
features and options of EIGRP are extensive and robust. For example, EIGRP uses multiple
tables to manage the routing process. EIGRP contains many features that are not found in
any other routing protocols. It is an excellent choice for large, multi-protocol networks that
employ primarily Cisco devices.
IT6205A - Data Communication and Networking 3
11
Week 1: LAN Design
Campus LAN Switches - To scale network performance in an enterprise LAN, there are core,
distribution, access, and compact switches. These switch platforms vary from fanless
switches with eight fixed ports to 13-blade switches supporting hundreds of ports. Campus
LAN switch platforms include the Cisco 2960, 3560, 3650, 3850, 4500, 6500, and 6800
Series.
Cloud-Managed Switches - The Cisco Meraki cloud-managed access switches enable virtual
stacking of switches. They monitor and configure thousands of switch ports over the web,
without the intervention of onsite IT staff.
Data Center Switches - A data center should be built based on switches that promote
infrastructure scalability, operational continuity, and transport flexibility. The data center
switch platforms include the Cisco Nexus Series switches and the Cisco Catalyst 6500 Series
switches.
Service Provider Switches - Service provider switches fall under two categories:
aggregation switches and Ethernet access switches. Aggregation switches are carrier-grade
Ethernet switches that aggregate traffic at the edge of a network. Service provider Ethernet
access switches feature application intelligence, unified services, virtualization, integrated
security, and simplified management.
Virtual Networking - Networks are becoming increasingly virtualized. Cisco Nexus virtual
networking switch platforms provide secure multi-tenant services by adding virtualization
intelligence technology to the data center network.
When selecting switches, network administrators must determine the switch form factors.
This includes fixed configuration, modular configuration, stackable, or non-stackable. The
thickness of the switch, which is expressed in the number of rack units, is also important for
switches that are mounted in a rack.
Port Density
The port density of a switch refers to the number of ports available on a single switch. The
figure shows the port density of three different switches.
Fixed configuration switches support a variety of port density configurations. The Cisco
Catalyst 3850 24 port and 48 port switches are shown on the left in the figure. The 48 port
switch has an option for four additional ports for small form-factor pluggable (SFP) devices.
Modular switches can support very high-port densities through the addition of multiple
switch port line cards. The modular Catalyst 6500 switch can support in excess of 1,000
switch ports.
Large networks that support many thousands of network devices require high density,
modular switches to make the best use of space and power. Without using a high-density
modular switch, the network would need many fixed configuration switches to
accommodate the number of devices that need network access. This approach can consume
many power outlets and a lot of closet space.
The network designer must also consider the issue of uplink bottlenecks: A series of fixed
configuration switches may consume many additional ports for bandwidth aggregation
between switches, for the purpose of achieving target performance. With a single modular
IT6205A - Data Communication and Networking 3
13
Week 1: LAN Design
switch, bandwidth aggregation is less of an issue, because the backplane of the chassis can
provide the necessary bandwidth to accommodate the devices connected to the switch port
line cards.
Forwarding Rates
Forwarding rates define the processing capabilities of a switch by rating how much data the
switch can process per second. Switch product lines are classified by forwarding rates..
Entry-level switches have lower forwarding rates than enterprise-level switches.
Forwarding rates are important to consider when selecting a switch. If the switch forwarding
rate is too low, it cannot accommodate full wire-speed communication across all of its switch
ports. Wire speed is the data rate that each Ethernet port on the switch is capable of attaining.
Data rates can be 100 Mb/s, 1 Gb/s, 10 Gb/s, or 100 Gb/s.
For example, a typical 48-port gigabit switch operating at full wire speed generates 48 Gb/s
of traffic. If the switch only supports a forwarding rate of 32 Gb/s, it cannot run at full wire
speed across all ports simultaneously. Fortunately, access layer switches typically do not
need to operate at full wire speed, because they are physically limited by their uplinks to the
distribution layer. This means that less expensive, lower performing switches can be used at
the access layer, and more expensive, higher performing switches can be used at the
distribution and core layers, where the forwarding rate has a greater impact on network
performance.
Multilayer Switching
Multilayer switches are typically deployed in the core and distribution layers of an
organization's switched network. Multilayer switches are characterized by their ability to
build a routing table, support a few routing protocols, and forward IP packets at a rate close
to that of Layer 2 forwarding. Multilayer switches often support specialized hardware, such
as application-specific integrated circuits (ASICs). ASICs along with dedicated software data
structures can streamline the forwarding of IP packets independent of the CPU.
There is a trend in networking toward a pure Layer 3 switched environment. When switches
were first used in networks, none of them supported routing; now, almost all switches
support routing. It is likely that soon all switches will incorporate a route processor because
the cost of doing so is decreasing relative to other constraints.
The Catalyst 2960 switches illustrate the migration to a pure Layer 3 environment. With IOS
versions prior to 15.x, these switches supported only one active switched virtual interface
(SVI). With IOS 15.x, these switches now support multiple active SVIs. This means that the
switch can be remotely accessed via multiple IP addresses on distinct networks.
Router Requirements
In the distribution layer of an enterprise network, routing is required. Without the routing
process, packets cannot leave the local network.
Routers play a critical role in networking by connecting homes and businesses to the
Internet, interconnecting multiple sites within an enterprise network, providing redundant
paths, and connecting ISPs on the Internet. Routers can also act as a translator between
different media types and protocols. For example, a router can accept packets from an
Ethernet network and re-encapsulate them for transport over a Serial network.
Routers use the network portion of the destination IP address to route packets to the proper
destination. They select an alternate path if a link or path goes down. All hosts on a local
network specify the IP address of the local router interface in their IP configuration. This
router interface is the default gateway. The ability to route efficiently and recover from
network link failures is critical to delivering packets to their destination.
Cisco Routers
As the network grows, it is important to select the proper routers to meet its requirements.
There are three categories of routers:
Branch Routers - Branch routers optimize branch services on a single platform while
delivering an optimal application experience across branch and WAN infrastructures.
Maximizing service availability at the branch requires networks designed for 24x7x365
uptime. Highly available branch networks must ensure fast recovery from typical faults,
while minimizing or eliminating the impact on service, and provide simple network
configuration and management.
Network Edge Routers - Network edge routers enable the network edge to deliver high-
performance, highly secure, and reliable services that unite campus, data center, and branch
networks. Customers expect a high-quality media experience and more types of content than
ever before. Customers want interactivity, personalization, mobility, and control for all
content. Customers also want to access content anytime and anyplace they choose, over any
device, whether at home, at work, or on the go. Network edge routers must deliver enhanced
quality of service and nonstop video and mobile capabilities.
Service Provider Routers - Service provider routers differentiate the service portfolio and
increase revenues by delivering end-to-end scalable solutions and subscriber-aware
IT6205A - Data Communication and Networking 3
17
Week 1: LAN Design
services. Operators must optimize operations, reduce expenses, and improve scalability and
flexibility, to deliver next-generation Internet experiences across all devices and locations.
These systems are designed to simplify and enhance the operation and deployment of
service-delivery networks.
Router Hardware
Routers also come in many form factors. Network administrators in an enterprise
environment should be able to support a variety of routers, from a small desktop router to a
rack-mounted or blade model.
Routers can also be categorized as fixed configuration or modular. With the fixed
configuration, the desired router interfaces are built-in. Modular routers come with multiple
slots that allow a network administrator to change the interfaces on the router. As an
example, a Cisco 1941 router comes with two Gigabit Ethernet RJ-45 interfaces built-in, and
two slots that can accommodate many different network interface modules. Routers come
with a variety of different interfaces, such as Fast Ethernet, Gigabit Ethernet, Serial, and
Fiber-Optic.
When selecting or upgrading a Cisco IOS device, it is important to choose the proper IOS
image with the correct feature set and version. IOS refers to the package of routing,
switching, security, and other internetworking technologies integrated into a single
multitasking operating system. When a new device is shipped, it comes preinstalled with the
software image and the corresponding permanent licenses for the customer-specified
packages and features.
Note: Telnet and HTTP are less secure and are not recommended.
Routing Related:
show ip protocols - Displays information about the routing protocols configured. If RIP is
configured, this includes the version of RIP, networks the router is advertising, whether or
not automatic summarization is in effect, the neighbors the router is receiving updates from,
and the default administrative distance, which is 120 for RIP.
show ip route - Displays routing table information, including: routing codes, known
networks, administrative distance and metrics, how routes were learned, next hop, static
routes, and default routes.
Interface Related:
show interfaces - Displays interfaces with line (protocol) status, bandwidth, delay,
reliability, encapsulation, duplex, and I/O statistics. If specified without a specific interface
designation, all interfaces will be displayed. If a specific interface is specified after the
command, information about that interface only will be displayed.
show ip interfaces - Displays interface information, including: protocol status, the IPv4
address, if a helper address is configured, and whether an ACL is enabled on the interface. If
specified without a specific interface designation, all interfaces will be displayed. If a specific
interface is specified after the command, information about that interface only will be
displayed.
show ip interface brief - Displays all interfaces with IPv4 addressing information and
interface and line protocols status.
show protocols - Displays information about the routed protocol that is enabled, and the
protocol status of interfaces.
Other connectivity related commands include the show cdp neighbors command. This
command displays information on directly connected Cisco devices including Device ID, the
local interface the device is connected to, capability (R = router, S = switch), the platform,
and Port ID of the remote device.
IT6205A - Data Communication and Networking 3
21
Week 1: LAN Design
Figure 1-16 shows the results of the configuration commands that were entered. Verify and
save the switch configuration using the copy running-config startup-config command. To
clear the switch configuration, use the erase startup-config command and then
the reload command. It may also be necessary to erase any VLAN information using the
command delete flash:vlan.dat. When switch configurations are in place, view the
configurations using the show running-config command.
show port-security - Displays any ports with security activated. To examine a specific
interface, include the interface ID. Information included in the output: the maximum
addresses allowed, current count, security violation count, and action to be taken.
show port-security address - Displays all secure MAC addresses configured on all switch
interfaces.
show interfaces - Displays one or all interfaces with line (protocol) status, bandwidth,
delay, reliability, encapsulation, duplex, and I/O statistics.
show mac-address-table - Displays all MAC addresses that the switch has learned, how
those addresses were learned (dynamic/static), the port number, and the VLAN assigned to
the port.
Like the router, the switch also supports the show cdp neighbors command.
The same in-band and out-of-band management techniques that apply to routers also
applies to switch configuration.
Summary
The hierarchical network design model divides network functionality into the access layer,
the distribution layer, and the core layer. The campus wired LAN enables communications
between devices in a building or group of buildings, as well as interconnection to the WAN
and internet edge at the network core.
A well-designed network controls traffic and limits the size of failure domains. Routers and
switches can be deployed in pairs so that the failure of a single device does not cause service
disruptions.
A mission-critical server should have a connection to two different access layer switches. It
should have redundant modules when possible, and a power backup source. It may be
appropriate to provide multiple connections to one or more ISPs.
Security monitoring systems and IP telephony systems must have high availability and often
have special design considerations.
It is important to deploy the appropriate type of routers and switches for a given set of
requirements, features and specifications, and expected traffic flow.
IT6205A - Data Communication and Networking 3
23
Week 1: LAN Design