advertisement

Design of a campus network

67 %
33 %
advertisement
Information about Design of a campus network
Education

Published on March 7, 2009

Author: atripathy86

Source: slideshare.net

Description

This is an introductory presentation regarding the issues in designing a campus network infrastructure. Unlike theoretical approaches, this presentation actually was used to describe some of the real configurations performed by Server Administrators and Network Managers. This is for an introductory audience with very little background in computer networks assumed.
advertisement

Computer Oriented Project Design & Configuration of a Campus Network Case : BITS Pilani Goa Campus (2005) Aalap Tripathy Faculty Guide : Mr Mangesh Bedekar, BITS Pilani Goa Campus, Zuari Nagar, GOA - 403726 COMPUTER PROJECT - BITS GC 335

Agenda Introduction to networks IP Addressing & Packet Analysis Brief Description of the servers installed DNS Server DHCP Server Proxy Server Incomplete Assignments LDAP server Packet Analysis on our network Q&A

Introduction to networks

IP Addressing & Packet Analysis

Brief Description of the servers installed

DNS Server

DHCP Server

Proxy Server

Incomplete Assignments

LDAP server

Packet Analysis on our network

Q&A

Basics … The internet works using two main address units: the IP Address and the port. For example, I want to load www.google.com it starts by asking the IP address of www.google.com for the webpage. asks www.google.com ‘s IP address on port 80--the universal webpage port. Our computer instructs the response to be sent back to our IP address on some port that we opened to recieve that data. By using ports, our computer can keep track of which stream of data belongs to what. main text content be sent back to it on port 10345 and the image be sent back on 10548. recieving instant messages on other ports and e-mails on yet other ports Our Computer’s Instructions : The ports here don't matter because our computer just makes them up on the fly . all of the ports from 1-1024 are set aside for such standardization.

The internet works using two main address units: the IP Address and the port.

For example, I want to load www.google.com

it starts by asking the IP address of www.google.com for the webpage.

asks www.google.com ‘s IP address on port 80--the universal webpage port.

Our computer instructs the response to be sent back to our IP address on some port that we opened to recieve that data.

By using ports, our computer can keep track of which stream of data belongs to what.

main text content be sent back to it on port 10345

and the image be sent back on 10548.

recieving instant messages on other ports and e-mails on yet other ports

two types of addresses public IP addresses private IP addresses Public IP addresses are those addresses that are routable on the internet. Addresses that begin with 10.x.y.z or 192.168.x.y (where x, y, and z can be anything 0-255) are strictly private addresses and cannot exist on the internet. 127.x.y.z is set asside as the local loop back address There are only 2^32 possible IP addresses, and worldwide there are many more than 2^32 devices (computers, printers, scanners, etc) that would like to have internet IP addresses.

4,294,967,296 2^32 =

Private Addresses and, more specifically, NAT were setup to solve the problem of a limited number of IP addresses. The new IP Protocol specification, IPv6 intends to solve this problem by increasing the number of addresses. Ipv6 is something BITS Pilani is spearhearding research on. Why not we have a lecture on this ? Someone volunteering ??

NAT can be done on a router – example the one you see infront of you or on a PC Let’s see how it is done !!!

WRT54G Wi-Fi Router firmware source code released to satisfy the obligations of the GNU GPL . All models come standard with a 4+1 ports network switch (the Internet/WAN port is also in the same switch, but on a different VLAN ) and a wireless chipset by Broadcom which provides Wi-Fi connectivity. The devices have two removable antennas connected through Reverse Polarity TNC connectors

firmware source code released to satisfy the obligations of the GNU GPL .

All models come standard with a 4+1 ports network switch (the Internet/WAN port is also in the same switch, but on a different VLAN ) and a wireless chipset by Broadcom which provides Wi-Fi connectivity.

The devices have two removable antennas connected through Reverse Polarity TNC connectors

 

A Little Primer on IP Addressing We write them in decimal form to make it more readable for humans. `the 1.2.3 network - meaning all 256 addresses from 1.2.3.0 to 1.2.3.255 1.2 network' which meant all addresses from 1.2.0.0 to 1.2.255.255 Each number between the dots in an IP address is actually 8 binary digits (00000000 to 11111111)

We write them in decimal form to make it more readable for humans.

`the 1.2.3 network - meaning all 256 addresses from 1.2.3.0 to 1.2.3.255

1.2 network' which meant all addresses from 1.2.0.0 to 1.2.255.255

Each number between the dots in an IP address is actually 8 binary digits (00000000 to 11111111)

A Little Primer on IP Addressing We usually don't write `1.2.0.0 - 1.2.255.255'. Instead, we shorten it to `1.2.0.0/16'. The `/16' means that the first 16 binary digits is the network address , in other words, the `1.2.' part is the the network So what is 10.0.0.0/8 ? A Big Network or small Network ? What is the range of IP Addresses

We usually don't write

`1.2.0.0 - 1.2.255.255'.

Instead, we shorten it to `1.2.0.0/16'.

The `/16' means that the first 16 binary digits is the network address , in other words, the `1.2.' part is the the network

So what is 10.0.0.0/8 ?

A Big Network or small Network ?

What is the range of IP Addresses

A Little Primer on IP Addressing We usually don't write `1.2.0.0 - 1.2.255.255'. Instead, we shorten it to `1.2.0.0/16'. The `/16' means that the first 16 binary digits is the network address , in other words, the `1.2.' part is the the network So what is 10.0.0.0/8 ? A Big Network or small Network ? What is the range of IP Addresses

We usually don't write

`1.2.0.0 - 1.2.255.255'.

Instead, we shorten it to `1.2.0.0/16'.

The `/16' means that the first 16 binary digits is the network address , in other words, the `1.2.' part is the the network

So what is 10.0.0.0/8 ?

A Big Network or small Network ?

What is the range of IP Addresses

A Little Primer on IP Addressing `10.0.0.0/8' is a big network Contains any address from 10.0.0.0 to 10.255.255.255 (over 16 million addresses!) 10.0.0.0/16 is smaller, containing only IP addresses from 10.0.0.0 to 10.0.255.255. 10.0.0.0/24 is smaller still, containing addresses 10.0.0.0 to 10.0.0.255.

`10.0.0.0/8' is a big network

Contains any address from 10.0.0.0 to 10.255.255.255 (over 16 million addresses!)

10.0.0.0/16 is smaller, containing only IP addresses from 10.0.0.0 to 10.0.255.255.

10.0.0.0/24 is smaller still, containing addresses 10.0.0.0 to 10.0.0.255.

BITS IP Addressing `10.0.0.0/8' is a description of the BITS Goa Network !!! Contains any address from 10.0.0.0 to 10.255.255.255 (over 16 million addresses!) 10.0.0.0/16 is mostly 1 hostel or a combination of nearby hostels 10.0.0.0/24 is most generally closest rooms in a hostel or classroom/faculty chambers in a corridor

`10.0.0.0/8' is a description of the BITS Goa Network !!!

Contains any address from 10.0.0.0 to 10.255.255.255 (over 16 million addresses!)

10.0.0.0/16 is mostly 1 hostel or a combination of nearby hostels

10.0.0.0/24 is most generally closest rooms in a hostel or classroom/faculty chambers in a corridor

Let’s get the concepts clear !!

 

 

 

 

 

ICANN The Internet Corporation for Assigned Names and Numbers

Root Servers There are 13 root authoritative DNS servers (super duper authorities) that all DNS servers query first. These root servers know all the authoritative DNS servers for all the main domains - .com, .net, and the rest. This layer of servers keep track of all the DNS servers that Web site systems administrators have assigned for their sub domains.

There are 13 root authoritative DNS servers (super duper authorities) that all DNS servers query first.

These root servers know all the authoritative DNS servers for all the main domains - .com, .net, and the rest.

This layer of servers keep track of all the DNS servers that Web site systems administrators have assigned for their sub domains.

 

Root Servers

Only one of the root servers that direct traffic and serve as the Internet's master directories is located outside the US -- in Tokyo, Japan Twelve of the 13 root servers that make the Internet run are located in the United States. US monopoly over the internet. We should have a debate sometime !!!

“ Many different Web sites can map to a single IP address, but the reverse isn't true; an IP address can map to only one FQDN. “ Default Server: dns3.bits-goa.ac.in Address: 10.1.1.61 > yahoo.com Server: dns3.bits-goa.ac.in Address: 10.1.1.61 Non-authoritative answer: Name: yahoo.com Addresses: 216.109.112.135, 66.94.234.13 > 216.109.112.135 Server: dns3.bits-goa.ac.in Address: 10.1.1.61 Name: w2.rc.vip.dcn.yahoo.com Address: 216.109.112.135 Forward Lookup Reverse Lookup Why ???

 

 

Everything is Logical !!! Ascii of a is 97 = 61 in hex

 

 

DHCP Dynamic Host Control Protocol

 

 

http://dakiya http://dakiya.bits-goa.ac.in What is its ip address ??? Ok got it .. 10.10.10.113 Let’s ask 10.1.1.61

External DNS

 

 

 

 

 

Internal DNS Primary

Relevant configuration details for configuring Authoritative Zone zone "bits-goa.ac.in" IN { type master; file "bits-goa.zone"; notify yes; allow-query {any;}; allow-update {any;}; allow-transfer {10.1.1.62;}; };

Example of A Reverse Zone Authoritative Zone Definition zone "1.1.10.in-addr.arpa" IN { type master; notify yes; file "pri.1.1.10.in-addr.arpa"; allow-transfer {10.1.1.62;}; };

zone "1.1.10.in-addr.arpa" IN {

type master;

notify yes;

file "pri.1.1.10.in-addr.arpa";

allow-transfer {10.1.1.62;};

};

The Full Zone file ; ; Zone File for bits-goa.ac.in ; The Full Zone File ; $TTL 3D @ IN SOA ns1.bits-goa.ac.in. admin.bits-goa.ac.in.( 200608228 ; Serial 3600 ; Refresh seconds 3600 ; retry, seconds 3600 ; expire, seconds 3600) ; minimum, seconds NS dns4.bits-goa.ac.in. www A 10.10.10.109 studentnet A 10.1.1.222 orion A 10.1.1.223 proxy A 10.1.1.20 proxy A 10.1.1.21 proxy A 10.1.1.22 titan A 10.1.1.225 glimpses06 A 10.1.1.222 library A 10.1.4.220 S1 A 10.1.1.58 S2 A 10.1.1.59 mailbox A 10.1.1.57 bits-goa.ac.in IN MX 10 mailbox.bits-goa.ac.in. dns3 A 10.1.1.61 dns4 A 10.1.1.62 dakiya A 10.10.10.113 central A 10.10.10.112 mail CNAME dakiya

;

; Zone File for bits-goa.ac.in

; The Full Zone File

;

$TTL 3D

@ IN SOA ns1.bits-goa.ac.in. admin.bits-goa.ac.in.(

200608228 ; Serial

3600 ; Refresh seconds

3600 ; retry, seconds

3600 ; expire, seconds

3600) ; minimum, seconds

NS dns4.bits-goa.ac.in.

www A 10.10.10.109

studentnet A 10.1.1.222

orion A 10.1.1.223

proxy A 10.1.1.20

proxy A 10.1.1.21

proxy A 10.1.1.22

titan A 10.1.1.225

glimpses06 A 10.1.1.222

library A 10.1.4.220

S1 A 10.1.1.58

S2 A 10.1.1.59

mailbox A 10.1.1.57

bits-goa.ac.in IN MX 10 mailbox.bits-goa.ac.in.

dns3 A 10.1.1.61

dns4 A 10.1.1.62

dakiya A 10.10.10.113

central A 10.10.10.112

mail CNAME dakiya

A Sample Reverse Zone file ; ; Reverse Zone File for bits-goa.ac.in ; Note Made By Aalap as Internal DNS server only ; ; The Full Reverse Zone File ; $TTL 3D @ IN SOA ns1.bits-goa.ac.in. admin.bits-goa.ac.in.( 200607213 ; Serial 3600 ; Refresh seconds 3600 ; retry, seconds 3600 ; expire, seconds 3600) ; minimum, seconds NS dns4.bits-goa.ac.in.; 61 PTR dns3.bits-goa.ac.in. 62 PTR dns4.bits-goa.ac.in. 222 PTR studentnet.bits-goa.ac.in 223 PTR orion.bits-goa.ac.in 225 PTR titan.bits-goa.ac.in 220 PTR library.bits-goa.ac.in Remember FQDN ?!?!?!?

;

; Reverse Zone File for bits-goa.ac.in

; Note Made By Aalap as Internal DNS server only

;

; The Full Reverse Zone File

;

$TTL 3D

@ IN SOA ns1.bits-goa.ac.in. admin.bits-goa.ac.in.(

200607213 ; Serial

3600 ; Refresh seconds

3600 ; retry, seconds

3600 ; expire, seconds

3600) ; minimum, seconds

NS dns4.bits-goa.ac.in.;

61 PTR dns3.bits-goa.ac.in.

62 PTR dns4.bits-goa.ac.in.

222 PTR studentnet.bits-goa.ac.in

223 PTR orion.bits-goa.ac.in

225 PTR titan.bits-goa.ac.in

220 PTR library.bits-goa.ac.in

 

Internal DNS Secondary

How is the Secondary DNS Config Different Because I never make the entries which it finally answers on it It is supposed to prefetch the primary DNS Servers entries as and when they change and keep onto local cache. My named.conf configuration is critical here

Because I never make the entries which it finally answers on it

It is supposed to prefetch the primary DNS Servers entries as and when they change and keep onto local cache.

My named.conf configuration is critical here

The Critical Lines in named.conf // query-source address * port 53; allow-notify {10.1.1.61;}; recursive-clients 6000; // the above line was added by RJ/AS/RS on 27/10/2006 }; // // a caching only nameserver config // controls { inet 10.1.1.62 allow { any; } keys { rndckey; }; };

// query-source address * port 53;

allow-notify {10.1.1.61;};

recursive-clients 6000;

// the above line was added by RJ/AS/RS on 27/10/2006

};

//

// a caching only nameserver config

//

controls {

inet 10.1.1.62 allow { any; } keys { rndckey; };

};

Definition of what it is the authoritative zone for it // Segment added to make This m/c a slave for bits-goa.ac.in Internal Zone It seeks its addresses from 10.1.1.61 which is defined to be the master zone "bits-goa.ac.in" IN { type slave; file "slaves/bits-goa.zone"; masters { 10.1.1.61; }; };

// Segment added to make This m/c a slave for bits-goa.ac.in Internal Zone It seeks its addresses from 10.1.1.61 which is defined to be the master

zone "bits-goa.ac.in" IN {

type slave;

file "slaves/bits-goa.zone";

masters { 10.1.1.61; };

};

Similarly defining reverse lookup for authoritative zones zone "1.1.10.in-addr.arpa" IN { type slave; file "slaves/pri.1.1.10.in-addr.arpa"; masters { 10.1.1.61; }; };

zone "1.1.10.in-addr.arpa" IN {

type slave;

file "slaves/pri.1.1.10.in-addr.arpa";

masters { 10.1.1.61; };

};

Remember.. We made a transfer entry on the primary server zone "1.1.10.in-addr.arpa" IN { type master; notify yes; file "pri.1.1.10.in-addr.arpa"; allow-transfer {10.1.1.62;}; };

zone "1.1.10.in-addr.arpa" IN {

type master;

notify yes;

file "pri.1.1.10.in-addr.arpa";

allow-transfer {10.1.1.62;};

};

A Jail !!! This is a Technology Lecture right ??? Ensures that if the system is ever compromised, the attacker will not have access to the entire file system. The attacker might feel that he has compromised the system but actually he has just exposed himself – as his activity has been logged !!

Ensures that if the system is ever compromised, the attacker will not have access to the entire file system.

The attacker might feel that he has compromised the system but actually he has just exposed himself – as his activity has been logged !!

 

 

Making the chroot Jail Effective This is important because running it as root defeats the purpose of the jail, and using a different user id that already exists on the system can allows services to access each others' resources. Check the /etc/passwd and /etc/group files for a free UID/GID number available. In my case, I used number 53 and the name named. [root@dns4] /# useradd -c DNS Server -u 53 -s /bin/false -r -d /chroot/named named 2>/dev/null || :

This is important because running it as root defeats the purpose of the jail, and using a different user id that already exists on the system can allows services to access each others' resources.

Check the /etc/passwd and /etc/group files for a free UID/GID number available.

In my case, I used number 53 and the name named.

[root@dns4] /# useradd -c DNS Server -u 53 -s /bin/false -r -d /chroot/named named 2>/dev/null || :

Proxies Types & Applications Proxy Client Browser Web Server

Proxies Web SSL Intercepting Open Split Traditional Caching CGI Proxies HTTPS to create an encrypted tunnel There are privacy concerns with SSL proxies. often incorrectly called transparent proxy (also known as a forced proxy) combines a proxy server with NAT . it is not possible to use user authentication, since the browser does not know there is a proxy in the middle, so it will not send any authentication headers. accept client connections from any IP address make connections to any Internet resource. a pair of proxies installed across two computers. Reverse Ex - Google Web Accelerator

Traditional

Caching

CGI Proxies

HTTPS to create an encrypted tunnel

There are privacy concerns with SSL proxies.

often incorrectly called transparent proxy (also known as a forced proxy) combines a proxy server with NAT .

it is not possible to use user authentication, since the browser does not know there is a proxy in the middle, so it will not send any authentication headers.

accept client connections from any IP address

make connections to any Internet resource.

a pair of proxies installed across two computers.

Reverse Proxies Instead of delivering pages for internal users, it delivers them for external users. It can be used to take some load off web servers and provide an additional layer of protection. This proxy placed outside the firewall as a stand-in for the content server. When outside clients try to access the content server, they are sent to the proxy server instead.

Instead of delivering pages for internal users, it delivers them for external users.

It can be used to take some load off web servers and provide an additional layer of protection.

This proxy placed outside the firewall as a stand-in for the content server.

When outside clients try to access the content server, they are sent to the proxy server instead.

Web Proxy

 

Why Web Proxy ?? Improve Performance: it saves the results of all requests for a certain amount of time (caching) Filter Requests: Pages to be accessed can be limited Ports / Services Accessed can be controlled Timing of Web Access can be controlled Bandwidth Control: Most Important Mandate in the system currently setup on campus

Improve Performance:

it saves the results of all requests for a certain amount of time (caching)

Filter Requests:

Pages to be accessed can be limited

Ports / Services Accessed can be controlled

Timing of Web Access can be controlled

Bandwidth Control:

Most Important Mandate in the system currently setup on campus

Caching – how is it done ? Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the documents that have been left the longest, while LFU removes the least popular documents. The algorithms can also be combined. “ expiration algorithm ”

Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU).

LRU removes the documents that have been left the longest, while LFU removes the least popular documents. The algorithms can also be combined.

CGI proxies A special case of web proxies These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity , called "Proxy Avoidance."

A special case of web proxies

These are web sites which allow a user to access a site through them.

They generally use PHP or CGI to implement the proxying functionality.

Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity , called "Proxy Avoidance."

 

We use Squid Web Proxy which is... a full-featured Web proxy cache free, open-source software the result of many contributions by unpaid (and paid) volunteers

We use Squid Web Proxy which is...

a full-featured Web proxy cache

free, open-source software

the result of many contributions by unpaid (and paid) volunteers

Some Relevant Proxy Configuration Entries http_port 10.1.2.100:8080 # The socket addresses where Squid will listen for HTTP client requests. cache_mem 100 MB # maximum_object_size 409600 KB #Objects larger than this size will NOT be saved on disk. # minimum_object_size 0 KB # Knowingly done so that everything is actually stored. This is for faster operation visible_hostname BITSGOA

http_port 10.1.2.100:8080

# The socket addresses where Squid will listen for HTTP client requests.

cache_mem 100 MB

# maximum_object_size 409600 KB

#Objects larger than this size will NOT be saved on disk.

# minimum_object_size 0 KB

# Knowingly done so that everything is actually stored. This is for faster operation

visible_hostname BITSGOA

Some Relevant Proxy Configuration Entries cache_replacement_policy lru memory_replacement_policy lru # cache_access_log /var/log/squid/access.log # TAG: cache_access_log # Logs the client request activity. Contains an entry for # every HTTP and ICP queries received. To disable, enter "none". log_fqdn on Remember fqdn ??

cache_replacement_policy lru

memory_replacement_policy lru

# cache_access_log /var/log/squid/access.log

# TAG: cache_access_log

# Logs the client request activity. Contains an entry for

# every HTTP and ICP queries received. To disable, enter "none".

log_fqdn on

Critical Proxy Configuration Lines auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/squid_passwd auth_param basic children 300 auth_param basic realm BITS GOA PROXY auth_param basic credentialsttl 1 minute

auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/squid_passwd

auth_param basic children 300

auth_param basic realm BITS GOA PROXY

auth_param basic credentialsttl 1 minute

Access Control & Definition on the Proxy Server # ACCESS CONTROLS acl ncsa_users proxy_auth REQUIRED acl all src 10.0.0.0/255.0.0.0 acl labs src 10.1.0.0/255.255.0.0 10.2.0.0/255.255.0.0 acl hostels src 10.3.0.0/255.255.0.0 10.4.0.0/255.255.0.0 acl SSL_ports port 443 563 acl Safe_ports port 80 # http acl day_time time 8:30-17:30 acl night_time time 17:30-24:00 0:00-8:30 acl other_time time 17:30-21:00

# ACCESS CONTROLS

acl ncsa_users proxy_auth REQUIRED

acl all src 10.0.0.0/255.0.0.0

acl labs src 10.1.0.0/255.255.0.0 10.2.0.0/255.255.0.0

acl hostels src 10.3.0.0/255.255.0.0 10.4.0.0/255.255.0.0

acl SSL_ports port 443 563

acl Safe_ports port 80 # http

acl day_time time 8:30-17:30

acl night_time time 17:30-24:00 0:00-8:30

acl other_time time 17:30-21:00

http_access directives – Most Critical instructions http_access allow ncsa_users http_access allow labs day_time other_time http_access allow hostels night_time http_access deny banned http_access deny !Safe_ports #http_access deny all #Last line. By default. The final directive is the reverse of the last okayed directive

http_access allow ncsa_users

http_access allow labs day_time other_time

http_access allow hostels night_time

http_access deny banned

http_access deny !Safe_ports

#http_access deny all

#Last line. By default. The final directive is the reverse of the last okayed directive

The actual configuration file Squid.conf

Squid.conf

 

 

 

What I didn’t cover The deep intricacies in the working of servers Many configuration settings : Secret !! Setting services on/off. Autorun facilities avaliable on the Linux platform

The deep intricacies in the working of servers

Many configuration settings : Secret !!

Setting services on/off. Autorun facilities avaliable on the Linux platform

Future Objectives In house Mail Server Development LDAP Server Deployment Cascading Proxies & “Atleast one proxy per hostel” Decentralization of the website – http://www.bits-goa.ac.in

In house Mail Server Development

LDAP Server Deployment

Cascading Proxies & “Atleast one proxy per hostel”

Decentralization of the website – http://www.bits-goa.ac.in

Bored ??? Let’s have some questions ? The Net is very very slow ??? Well if the bandwidth is too less and he user’s too many that’s what happens Proxy can handle only limited traffic. Future plans : One Proxy Per hostel My Net isn’t working ?? Ensure that you give the correct proxy name i.e. proxy and port 8080 In case you give the ip address – there is no guarentee that it will work always Come on More …. ????? Let us confine ourselves to the Server configurations only.

The Net is very very slow ???

Well if the bandwidth is too less and he user’s too many that’s what happens

Proxy can handle only limited traffic. Future plans : One Proxy Per hostel

My Net isn’t working ??

Ensure that you give the correct proxy name i.e. proxy and port 8080

In case you give the ip address – there is no guarentee that it will work always

Come on More …. ????? Let us confine ourselves to the Server configurations only.

#objects presentations

Add a comment

Related presentations

Related pages

Campus Network for High Availability Design Guide - Cisco

Campus network devices can currently provide a high level of availability within the individual nodes. The Cisco Catalyst 6500 and 4500 switches can ...
Read more

Campus Network Design Software - Edraw Max

Campus Network Design - Examples to demo how to design the campus network
Read more

Introduction to Cisco Network Design > Designing Campus ...

Chapter Description This chapter from Cisco Press provides an overview of the technologies available today to design networks. Discussions are divided into ...
Read more

Campus Network Design Guideline - Cisco Support

Introduction. Building a Campus network is more than only interconnecting physical network infrastructure devices. The most challenging and important part ...
Read more

Recommended Resilient Campus Network Design Best ... - GÉANT

Recommended Resilient Campus Network Design Best Practice Document Produced by CESNET led working group on Network monitoring (CBPD114) Authors: Tomas ...
Read more

Design Zone for Campus - Cisco

Design Zone for Campus. Hierarchical Navigation. HOME; SOLUTIONS. ENTERPRISE. PROGRAMS FOR ENTERPRISE. ... Borderless Networks Campus 1.0 Design Guide ...
Read more

Campus network - Wikipedia, the free encyclopedia

A campus network, campus area network, ... Much like a university campus network, a corporate campus network serves to connect buildings.
Read more

This chapter introduces general campus switching and data ...

This chapter introduces general campus switching and data center design considerations. It includes the following sections: Campus Design Considerations
Read more

Princeton University Network Architecture

Princeton University Network Architecture ... The Campus Data Network ... The design of the campus network is an Ethernet collapsed backbone, ...
Read more