Designing Scalable Networks

Table of Contents

Table of Contents

Module 2 - Design the Network Structure

Section 6 - Provision Software Features

Section Objectives

Upon completion of this section, you will be able to:

Time Required to Complete This Section

Approximately 3 hours

Completing This Section

Follow these steps to complete this section:

Resources Required to Complete This Section

To complete this section, you will need:

Reading Assignment

Goals for Provisioning Router Software

When designing internetworks that meet your customer's needs for performance and security, you will need to provision router software features. Your goals for provisioning software features might include one or more of the following:

Cisco IOS Software Features

Depending on your customer's requirements for network performance and security, you might need to implement the following Cisco IOS software features:

Cisco IOS Software Access Lists

Use access lists to:  
Access List Numbers 
Type of Access List
Range 
IP standard 1 - 99
IP extended 100 - 199
Bridge type code 200 - 299 
DECnet standard and extended 300 - 399 
XNS standard 400 - 499
XNS extended 500 - 599
AppleTalk zone 600 - 699
Bridge MAC 700 - 799
IPX standard 800 - 899
IPX extended 900 - 999
IPX SAP 1000 - 1099
Bridge extended 1100 - 1199 
NLSP route aggregation 1200 - 1299 
   
Enhancements to Access Lists 
Cisco IOS Software Release
Performance Enhancement 
9.21 Inbound and outbound access lists can be fast switched 
10.0 Standard outbound access lists can be SSE switched on Cisco 7000 series routers 
10.3 Extended outbound access lists can be SSE switched on Cisco 7000 series routers 
11.0 (3) Inbound and outbound, standard and extended lists can be SSE switched on Cisco 7000 series routers 
11.1 Access lists can use NetFlow switching on Cisco 7500 series and Cisco 7000 series routers with an RSP 
11.1 (5) Access lists can use NetFlow switching on Cisco 7200 series routers 
 
 

Cisco IOS Software Proxy Services

Cisco offers numerous "proxy services" that you can recommend at customer sites where there are performance or connectivity concerns due to the topology and behavior of network applications. Examples of proxy services that the Cisco IOS software provides include the following:

Cisco IOS Software Encryption Options

Safeguarding network data has become increasingly important to many organizations as they extend their private internetworks to use public, unprotected networks such as the Internet. To safeguard IP data, Cisco IOS Release 11.2 provides packet-level encryption that enables you to protect the confidentiality and integrity of network data traveling between cooperating (peer) encrypting routers by providing mechanisms to do the following: Cisco's packet-level encryption is supported in the following implementations: The VIP2 EPA greatly improves encryption performance because the encryption is offloaded to the dedicated port adapter hardware. It also has added tamper-proof features for session keys.

In Cisco IOS Release 11.2, packet-level encryption can be used with any Layer 2 encapsulation. IP is the only Layer 3 protocol that is supported. Other Layer 3 protocols, such as IPX and AppleTalk, can be encrypted if they are encapsulated in IP.

Cisco IOS Software Compression Services

The basic function of data compression is to reduce the size of a frame of data to be transmitted over a network link. Data compression algorithms use two types of encoding techniques: statistical and dictionary.

Cisco IOS Software Queuing Services

Queuing services let a network administrator manage the varying demands applications put on networks and routers. Because Cisco started supporting weighted fair queuing in Cisco IOS Release 11.0, there has been less need for more drastic types of queuing, such as priority and custom queuing. However, in some cases, mission-critical applications that are running on congested serial links might still require priority or custom queuing.

Custom queuing is a less drastic solution for mission-critical applications than priority queuing. Custom queuing guarantees some level of service to all traffic, while priority queuing makes sure that one type of traffic will get through at the expense of all other types of traffic.

Cisco IOS Software Resource Reservation Protocol (RSVP)

RSVP is another service that supports varying requirements for bandwidth and delay. RSVP is an outgrowth of the Internet Engineering Task Force's (IETF's) work on integrated services, which enable networks to support special qualities of service for applications that need them while preserving current internetworking methods. Cisco supports RSVP in Cisco IOS Release 11.2.

Traditional network functions, such as file transfers, are not sensitive to delay. Although network users may prefer that a file transfer occur quickly, the transfer will take place regardless of the amount of time it takes. Traffic generated by these applications is called elastic, because it can stretch to work under any delay conditions.

However, new multimedia network applications, such as voice and video, require that certain minimum numbers of bits be transferred within a specific time frame. The inelastic traffic generated by these applications requires the network to allocate specific resources for it.

The mission of RSVP is to allow routers to communicate among themselves and with end systems so that they can reserve end-to-end network resources for inelastic applications.

RSVP is a receiver-based protocol. Applications that receive inelastic traffic inform networks of their needs, while applications that send inelastic traffic inform these receivers about traffic characteristics. The router that is connected to the receiver of a particular data flow (for example, the transmission of a video file) is responsible for initiating and maintaining the resources used for that data flow.

Cisco IOS Software Traffic Shaping

Cisco IOS Release 11.2 supports both generic traffic shaping and Frame Relay traffic shaping. Generic traffic shaping helps reduce the flow of outbound traffic from a router interface into a backbone transport network when congestion is detected in the downstream portions of the backbone transport network or in a downstream router. Generic traffic shaping works on a variety of Layer 2 data-link technologies including Frame Relay, SMDS, and Ethernet.

Topologies that have high-speed links (such as at a central site) feeding into lower-speed links (such as at remote or branch sites) often experience bottlenecks at the remote end because of the speed mismatch. Generic traffic shaping helps eliminate the bottleneck situation by throttling back traffic volume at the source end.

Routers can be configured to transmit at a lower bit rate than the interface bit rate. Service providers or large enterprises can use the feature to partition, for example, T1 or T3 links into smaller channels to match service ordered by customers. Packet loss in the service provider's network can be limited by throttling the traffic back at the source, thus improving service predictability.

Cisco IOS Software Tag Switching

In order to scale large internetworks, including the Internet and large corporate intranets, Cisco is working with the IETF to develop tag switching, a new technology that combines the performance and traffic management capabilities of Layer 2 (data link layer) switching with the proven scalability of Layer 3 (network layer) routing. Tag switching assigns tags to multiprotocol frames for transport across packet or cell-based networks. It is based on the concept of label swapping, in which units of data carry a short, fixed-length label that tells switching nodes how to process the data.
 


Case Studies

In this section, you will provision Cisco IOS software features.

Read each case study and complete the questions that follow. Keep in mind that there are potentially several correct answers to each question.

When you complete each question, you can refer to the solutions provided by our internetworking experts. The case studies and solutions will help prepare you for the Sylvan exam following the course.

In this section, you will review the following case studies:


Case Study: Market Mavericks

Ms. Martin is the MIS manager at Market Mavericks, a money market management firm in New York City. Ms. Martin has the task of planning a new state-of-the-art network for the brokers that work at Market Mavericks. The 80 brokers will be on floors 74 through 77 in a skyscraper.

Ms. Martin has the task of designing a WAN that will connect the 60 branch offices at Market Mavericks. She has chosen Frame Relay and a hub-and-spoke topology. At her site (corporate headquarters), she will have a 1.5-Mbps T1/E1 serial link to the Frame Relay cloud.

She plans to route IP using IGRP. She also plans to route AppleTalk using RTMP and Novell NetWare using IPX RIP. (She will upgrade to Enhanced IGRP for IP, AppleTalk, and NetWare.)

At headquarters, five NetWare print servers and five NetWare file servers are installed. Each remote site has one NetWare print server and one NetWare file server.

The corporate router is a Cisco 4000 series running Cisco IOS Release 10.3. The branch offices have Cisco 2500 routers also running Cisco IOS Release 10.3.
 
     1. Users at corporate headquarters need to access all the Novell file servers. Users at the branch offices 
         need to access only their own servers and the corporate file servers (though not the corporate print servers). 
         Ms. Martin is tentatively planning to apply an outbound SAP filter on the serial link of the Cisco 4000 
         router to deny all branch-office servers from being advertised. She will also deny all corporate print servers. 
         What scalability constraints should you discuss with Ms. Martin as she considers using the scheme to filter 
         SAPs?



     
     
     2. How will an inbound IP access list at the corporate router affect IP performance for all the other branch 
         offices? Remember that Ms. Martin  has a Cisco 4000 router running Cisco IOS Release 10.3 at 
         headquarters.


     3. The financial data that the brokers at the branch offices send over TCP/IP is highly confidential. 
         Ms. Martin is considering using encryption features on the branch routers and the corporate router. 
         How might these features affect performance?


     4. Ms. Martin wants to know if you recommend priority queuing for the TCP/IP brokerage applications. 
         The data that the brokers generate is considered mission-critical, but the marketing and administrative 
         data on the AppleTalk and Novell networks is not as critical. What would you tell Ms. Martin regarding 
         priority queuing? What are the advantages and disadvantages? Would custom queuing work better for her?


Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: CareTaker Publications

Remember CareTaker Publications? If not, click here to review the case study.

You might find it useful to refer to your topology diagram for CareTaker Publications in Section 3.
 
     1. The manager of Warehouse and Distribution is concerned about PC performance over a leased line. 
         What recommendations could you make to increase performance using Cisco IOS software?

Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: PH Network Services Corporation

Remember PH Network Services Corporation? If not, click here to review the case study.

You might find it useful to refer to your topology diagram created for PH Network Services Corporation in Section 3.
 
     1. The general manager of PH called again to ask about the possibility of patients' medical information 
         being exposed with the system you will present. How will you accommodate for this concern in your design?

Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: Pretty Paper Ltd.

Remember Pretty Paper? If not, click here to review the case study.

You might find it useful to refer to your topology diagram created for Pretty Paper in Section 3.
 
     1. The Sales and Marketing managers are concerned about the possibility of someone stealing new designs 
         as they are being transmitted over the network and when they are stored on the servers. What are the 
         performance trade-offs he should be aware of when considering encryption of all data transmissions 
         on the Frame Relay network?

Now that you have completed the exercise, click here to view the solutions provided by our internetworking design experts.


Case Study: Jones, Jones, & Jones

Remember Mr. Jones? If not, click here to review the case study.

You might find it useful to refer to your topology diagram created for Pretty Paper in Section 3.
 
     1. Mr. Jones has been reading about hackers accessing confidential data by hacking into the network from 
         the Internet. How have you addressed his concerns with your design?
 
 

Now that you have completed the exercise, click here to view the solutions provided  by our internetworking design experts.


Click here to go on to Section 7.


Copyright Cisco Systems, Inc. -- Version 2.0 7/98