cc/td/doc/product/voice/ics7750
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Designing Your Converged Network

Designing Your Converged Network

This chapter is based on a five-step network design process. It includes the following sections:

Converged Network Design Process

This chapter outlines a five-step network design process. Each of the five steps is described in detail in the following sections.


Step 1   Audit your network. If you already have a networking infrastructure in place, carefully itemize your equipment, as well its associated costs and capabilities.

Step 2   Set network objectives. Based on the type and volume of traffic your network must carry, set goals that are in line with your budget.

Step 3   Calculate the voice delay budget. For voice traffic, delays on the network can be particularly problematic. Determine how much delay, if any, your organization is willing to accept.

Step 4   Plan for capacity. Determine how many trunks and how much bandwidth is required to meet your needs as defined in the previous steps.

Step 5   Analyze the costs. Determine whether the costs of implementing, operating, and maintaining the network design you have specified are realistic now and in the future.


Auditing Your Network

The first step in designing a network is to evaluate what currently exists. Consider the following issues:

Setting Network Objectives

Identify the key objectives of your network:

Calculating the Voice Delay Budget

The delay budget is the amount of delay that your organization is willing to tolerate in your planned network. Consider the following types of delay when calculating the delay budget:

The International Telecommunication Union (ITU) recommends that there be no more than 150 milliseconds (ms) of one-way delay. Take a combined score of all of the above delays and compare the result with this standard.


Note   Delays ranging from 150 to 400 ms may be acceptable in some cases. For example, a 200-ms delay from Chicago to New York is unacceptable, but the same delay from Chicago to Singapore might be acceptable. Furthermore, higher delays can be acceptable if cost savings are taken into account.

Planning for Capacity

Capacity planning involves provisioning the number of lines and trunks necessary to achieve bandwidth goals. (For details on provisioning trunks, see "Traffic Engineering.")

Provisioning Trunks

When planning the number of system trunks that you need, the main considerations are traffic volume and flow, selected grade of service, and your objectives.

Calculating Bandwidth

Based on your proposed network design and the required number of trunks between locations, you can calculate the required bandwidth. When calculating bandwidth, you will need to consider issues such as compression, network overhead, and network utilization.

Analyzing the Costs

Once you have conducted a network audit, set your objectives, computed the delay budget, and completed capacity planning, you are ready to do a complete financial analysis. Determine whether the projected costs of the network you intend to build are justified in relation to the benefits received, and calculate the expected return on investment.

The cost of your internetwork is much more than the sum of equipment purchase orders. You must consider the entire life cycle of your internetworking environment. A brief list of costs associated with internetworks follows:

Topologies for Simple Internetworks

A topology is the arrangement of the interconnected networks in a wide-area network (WAN). Numerous topologies are possible, each offering a different mix of cost, performance, and scalability (the degree to which future growth is possible). The following represent some of the simplest topologies:

Each topology is examined in the rest of this section, including its relative cost, performance, scalability, and technology implications.

Peer-to-Peer Topology

A peer-to-peer WAN is a relatively simple way to interconnect a small number of sites using leased lines or virtually any other media. (WANs that comprise only two locations must be interconnected in this way.) Figure 3-1 depicts a small, peer-to-peer WAN.


Figure 3-1: Peer-to-Peer WAN Constructed with Leased Lines


The peer-to-peer topology is the least expensive solution for WANs that comprise a small number of internetworked sites. Because each site comprises, at most, one or two links to the rest of the network, static routing can be used.

Routers can route in a two basic ways. They can use preprogrammed static routes, or they can dynamically calculate routes using any one of a number of dynamic routing protocols. Routers use dynamic routing protocols to discover routes. Routers then forward packets over those routes.

Limitations

Static routing can take time to establish but avoids the network overheads of dynamic routing protocols. However, this lack of route redundancy is an important limitation of the peer-to-peer topology.

Peer-to-peer WANs have two other limitations. First, they do not scale very well. As sites are added to the WAN, the number of hops (devices, typically routers or switches) between any two sites tends to increase, resulting in inconsistent performance in cross-site communications. The actual degree to which performance varies depends on many factors, including the following:

The degree to which this lack of scalability affects your internetwork depends on how much you expect it to grow. If you do not expect your internetwork to grow beyond a few sites, peer-to-peer might be the appropriate topology.

The second limitation of this approach is its vulnerability to component failure. There is only a single path between any two sites. Consequently, an equipment or facility failure anywhere in a peer-to-peer WAN can split the WAN. Depending on the actual traffic flows and the type of routing implemented, this kind of failure can severely disrupt communications in the entire WAN.


Note   See "Data Networking Fundamentals," for more information about routers, switches, routing protocols, and scalability.

Ring Topology

A peer-to-peer internetwork becomes a ring internetwork when you add a node (typically a router or PBX) and an extra port to two of the routers or PBXs, which provides route redundancy. The additional route enables small networks to implement dynamic routing protocols because traffic has an additional path over which it can travel. Because the cost of most media is affected by distance, you should design the ring to minimize distances. Figure 3-2 illustrates this WAN topology.


Figure 3-2: Ring-Shaped WAN


You can use a ring-shaped WAN constructed with leased lines to connect a small number of sites and provide route redundancy at a potentially small incremental cost. With redundant routes and a dynamic routing protocol, you have more flexibility than you do with static routing. For example, dynamic routing protocols can automatically detect and recover from adverse changes in the WAN operating condition by routing around degraded or non-operational links.

Limitations

Ring topologies have several limitations. First, depending on the geographic dispersion of the sites, adding an extra node to complete the ring could be cost-prohibitive.

A second limitation of rings is that they are not very scalable. Adding new sites to the WAN increases the number of hops required to access other sites in the ring. For example, in Figure 3-2, adding a new location (X) that is in geographic proximity to User Locations C and D would require terminating the circuit from location C to D. Two new circuits would have to be ordered to preserve the integrity of the ring: one running from C to X and the other from D to X.

The final limitation of a ring is its potential hop intensity. A ring is not a good way to minimize the number of hops—each interior gateway router on a ring is only adjacent to two other interior gateway routers. The number of hops to any other site depends on the way in which these sites are connected. A ring does offer route redundancy, but the hop count between any given source and destination address pair can vary widely.

The ring topology, given its limitations, is likely to be of value in connecting only a very small number of sites. It is preferable to the peer-to-peer topology only because it can provide a redundant path to the locations within the ring.

Star Topology

A variant of the peer-to-peer topology is the star topology, so named for its shape. A star is constructed by connecting all nodes (routers or PBXs) to a common node in the center, called a concentration node. The concentration node in a star topology can also be used to interconnect the LANs installed at that location with each other as well as with the WAN.

You can build a star topology with almost any dedicated media, including leased lines. Figure 3-3 shows an example of a star-shaped WAN.


Figure 3-3: Star-Shaped WAN


A star topology WAN with leased lines is much more scalable than a peer-to-peer or ring network. Adding locations to the star does not require re-engineering existing media. Only a new facility between the concentration node and the node at the new location is required.

The star topology improves upon the scalability of peer-to-peer networks by using a node to interconnect, or concentrate, all the other networked nodes. This scalability is achieved with a modest increase in the number of nodes, node ports, and media compared to a comparable peer-to-peer topology. Star topologies can actually be developed with fewer resources than ring topologies, as Figure 3-2 and Figure 3-3 demonstrate. The scalability of a star topology is limited by the number of ports that the concentration node can support. Expansion beyond its capacity requires re-engineering the topology into a multitiered topology or replacing the concentration node (if it is a low-end router) with a more robust device.

Another benefit of a star topology is improved network performance. Overall performance in a star topology is, in theory, always better than in a ring or peer-to-peer network because all network-connected devices are no more than three hops away from each other. These three hops are the node at the user's location, the concentration node, and the node at the destination. This degree of consistency is unique to the star topology.


Note   In very small WANs, such as those with only two or three internetworked locations, it might be difficult to perceive any difference between a star topology and a peer-to-peer topology. The benefits of a star topology become increasingly apparent as your network increases in size.

Limitations

Star topologies have two problems; they are subject to single points of failure and there is no route redundancy. A single point of failure means that all WAN communications can be disrupted if the concentration node experiences a failure. The lack of route redundancy means that if the concentration node fails, you are out of service until that failure is rectified.

You can compensate for these limitations in a variety of ways: by implementing a slightly more complex topology, such as the partial meshed, or even by splitting the star into two smaller stars that are linked together. In the event of a failure, only half of the remote locations would be affected. Additionally, you can use dial-on-demand technologies such as Integrated Services Digital Network (ISDN) to reestablish a limited amount of communications.

Partial Meshed Topology

Partial meshed topologies are highly flexible and can have very different configurations. In a partial meshed topology, the nodes are more closely integrated than in any other basic topology, but they are not fully interconnected. (Fully interconnected nodes form a fully meshed topology.) Figure 3-4 shows a partial meshed topology.


Figure 3-4: Partial Meshed Topology


A partial meshed WAN topology is readily identified by its almost complete interconnection of every node with every other node.

This topology can minimize hops for most of the WAN's users. Unlike fully meshed networks, a partial meshed network can reduce startup and operational expenses by not interconnecting low-traffic segments of the WAN, which makes it somewhat more scalable and affordable than a fully meshed topology.

General Network Design Guidelines

Good network design is based on the following key principles:


Note   See "Data Networking Fundamentals," for a more detailed explanation of data networking terms and concepts.

The Hierarchical Model

Figure 3-5 shows a general view of a hierarchical network design. A hierarchical network has three layers—core, distribution, and access.

Each layer of the hierarchical model has a specific role:

  For example, the access layer could consist of multiple Cisco ICS 7750s, possibly used with multiple routers or other devices at the edge of one or more campus networks. In a campus network the access layer might require only a single Cisco ICS 7750.

Figure 3-5:
Hierarchical Network Model


Why Use a Hierarchical Model?

Some of the main reasons to use a hierarchical model are listed below:


Tips Today's fast-converging routing protocols are designed for hierarchical topologies. To control routing CPU overhead and bandwidth consumption, use modular hierarchical topologies with such protocols as Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and Enhanced Interior Gateway Routing Protocol (Enhanced IGRP).


Note   See "Data Networking Fundamentals," for a more detailed explanation of routers, switches, and routing protocols and for an in-depth discussion of design issues related to fault tolerance and scalability.

Designing the Core Layer

The core layer of a three-layer hierarchical topology is the high-speed backbone of the internetwork. Because the core layer is critical for interconnectivity, you should design the core layer with redundant components.

When configuring nodes in the core layer, use routing features that optimize packet throughput. Avoid using packet filters (see "Data Networking Fundamentals") or other features that slow down the manipulation of packets. You should optimize the core for low latency and good manageability.

The core should have a limited and consistent diameter. You can add distribution-layer nodes and client LANs to the model without increasing the diameter of the core. Limiting the diameter of the core provides predictable performance and easy troubleshooting.

If you need to connect to other enterprises via the Internet, the core topology should include one or more links to external networks. By centralizing these functions in the core layer you can reduce the potential for routing problems, and by keeping Internet connections to a minimum, you can reduce security concerns.

Designing the Distribution Layer

The distribution layer lies between the access and core layers of the network. The distribution layer has many roles, including controlling access to resources for security reasons and controlling network traffic that traverses the core for performance reasons. The distribution layer often delineates broadcast domains (sets of devices that receive broadcasts from any other device in the set), although you can define broadcast domains at the access layer as well.

To improve routing protocol performance, the distribution layer can summarize routes from the access layer. For some networks, the distribution layer offers a default route to access-layer routers and runs only dynamic routing protocols when communicating with core nodes.

Another function of the distribution layer is address translation. With address translation, devices in the access layer can use private addresses. The address-translation function converts the private addresses to legitimate Internet addresses for packets that traverse the rest of the organization's internetwork or the Internet.

Designing the Access Layer

The access layer gives end users access to the internetwork. Nodes are implemented at the access layer in campus networks to meet the demands of applications that need a considerable amount of bandwidth or cannot withstand the variable delay characteristic of shared bandwidth.

For internetworks that include small branch offices and telecommuter home offices, the access layer can provide access into the corporate internetwork using wide-area technologies such as ISDN, leased lines, and analog modem lines. You can implement routing features such as dial-on-demand (DDR) routing and static routing to control bandwidth utilization and minimize cost on access layer remote links. (DDR keeps a link inactive except when specified traffic needs to be sent.)

Prioritizing Network Design Goals

You will have to make difficult decisions when budgeting for and building (or upgrading) your internetwork. The following are examples of typical design decisions:

Try to prioritize your most important network design goals. Prioritizing should help you get through this difficult decision-making process.

The most important goals typically include the following:


Note   Scalability, availability, and security are discussed in more detail in "Data Networking Fundamentals."

Keep in mind that sometimes making design decisions is more complex than what has been described because goals can differ for various parts of an internetwork. One group of users might value availability more than affordability. Another group might deploy state-of-the-art applications and value performance more than availability. In addition, sometimes a particular group's goals are different from the goals for the internetwork as a whole. If this is the case, document individual group goals as well as goals for the entire internetwork. Later you might be able to implement LAN technologies that meet individual group goals and WAN technologies that meet overall goals.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Oct 2 13:19:37 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.