BRKRST-3114 The Art of Network Architecture
BRKRST-3114 The Art of Network Architecture
BRKRST-3114 The Art of Network Architecture
BRKRST-3114
Russ White
Scott Morris
Denise Donohue
The Art of Network Architecture
Intersecting It
Driving It
Designing It
Selling It
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
The Intersection of Business and Technology
Why Let Business Drive
Technology Decisions?
– Projects get funded
– Business succeeds
– You get a raise???
How Does Technology Drive
Business Decisions?
– Technology Impact is Part of Design
Discussion
– Future Growth Constraints
– Future Functional Constraints
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Determining Business Requirements
Learn the Business Environment How Does the Network Serve its
– The Big Picture Customers
Information to gather – Internal users
How to gather it – External users
– The Competitive Environment – Guest users
Information to gather
How to gather it
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Learn the Business Environment
The Big Picture
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Learn the Business Environment
The Competitive Environment
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Competitive Environment Example
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
How Does the Network Serve the Business?
Does it hold you back…
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
How Does the Network Serve the Business?
Technologies in Use
Applications in Use
Network Evaluation
– LAN
– WAN
– Security
– Flexibility
Where does the network…
– Support and improve business processes
– Hinder them?
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
How Does the Network Serve Its Customers?
Find out who are the network’s customers, and how they use its resources
– Internal users
– External users
– Guest users
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Where Are There Gaps?
And How Can Technology Help?
– Update technologies to
Improve processes
Reduce cost
Increase efficiency
– Add capabilities, such as
VOIP/Video/Presence
Mobility (BYOD/CYOD)
– Redesign part (or all) of the network
Equipment refresh is a good time for this
Technology or capability additions often require it
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Drive It
Business Drivers
Capabilities
Continuity
Cost
Change
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Capabilities as a Business Driver
Changing Expectations Changing Capability Needs Network Changes
Competitive expectations
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Designing New Capabilities
How are changes in expectations and competition affecting the business?
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Designing New Capabilities
Changes required to business processes
Changes required to the network
Changes required to enterprise applications
User training required
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Continuity as a Business Driver
Most businesses lose $$ if the
network is unavailable
– Highly variable, dependant on the
location within the network
– For instance, within a bank’s
network:
ATM machines can be down for days
without impact
Branches can be down for ten or fifteen
minutes, but after that, losses mount
quickly
On the trading floor, over $1 million lost
in trading fees alone per minute (or
second) of downtime
– Many large networks are now 24/7
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Continuity
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Designing for Continuity
Design for failure
– Redundancy: links, servers, spares, etc.
– Hot or cold stand by
– Remote working
Plan for failure
– Detection
– Troubleshooting
– Repair
Test your plan
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Designing for Continuity
Worst Case Analysis
??
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Cost as a Business Driver
Most companies strive to reduce
costs
– Unfortunately, cost often
compromises the other design goals
– That can introduce risk
Two goals
– Managing costs
– Predicting costs
Two dimensions
– Operational Expense (OPEX)
– Capital Expense (CAPEX)
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Managing Costs
OPEX
• Reduces configuration complexity on individual devices
• Reduces build-out time
Modularity • Limits scope of equipment validation
• Reduces MTTR (keeping the network in service)
CAPEX
• Limits scope of equipment requirements
OPEX
Management • Automates configuration management
• Worst case analysis provides scoping and prioritization
OPEX
Security • Increases overall network service level
• Protects information and services
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Predicting Costs
OPEX
• Costs can be managed at the module, rather than equipment or network level
Modularity
CAPEX
• Modules can be treated as a group for equipment upgrades, etc.
• Provides analysis for predicting network needs over a longer period of time
• Externally facing OODA loop provides an environment of best practices and trends
on which to found modifications in the network
Management • Constant evaluation of the network in terms of business goals provides a “look
ahead” capability for predicting new problems to be solved and challenges to be met
• Worst case analysis provides a realistic estimate of what’s needed to meet real
world challenges
• Externally facing OODA loop picks up and anticipates new threats to the network
Security
which need to be planned for and met
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Change as a Business Driver
Business Growth Modularity
– Organic business growth – Set fixed limits on module sizes
– Scope creep within a well defined plan
– Mergers and acquisitions – Limit the size of each failure
domain
Business Shrinkage – Keep configurations repeatable for
– Organic business decline faster rollouts and modifications
– Spin-offs
Management
Changing Expectations – Accurate baseline and change
– Customers measurement and analysis
– Employees – Project network needs into the
future in a reliable way
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Managing Change
An Example
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Managing Change
An Example
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Managing Change
An Example
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Managing Change
Mergers and Acquisitions
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Design It
Design Toolbox
Modularity
Resilience
Management
Security
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Modularity
Repeatable Configurations
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Modularity
Assigning Functionality
Types of functionality
– Policy Aggregation
– Filtering/aggregating reachability
information
– Forwarding traffic over long(er)
geographic distances
Modularity divides these pieces up
into manageable chunks
– Much like we divide a piece of
software into multiple modules, and
connect them through an API
Packet Filtering
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Modularity
Fault Isolation
Increasing Parallelism
domains....
– Devices within each fault domain
only compute paths within their fault
domain
– This drags the network closer to the
MTTR/MTBF balance point
Divide complexity from complexity
B
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Modularity
How Do We Modularize?
Hide Information
Aggregate or filter control plane
state
– Create a hierarchical design between
the various network modules
Overlay Topology
Create multiple overlapping control BGP Overlay
planes
– BGP/IGP Aggregation
– Virtualization (covered in more detail
later)
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Modularity
The Tradeoff
Before
Aggregation
2001:DB8:9168:1::/64 2001:DB8:9168:2::/64
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Resilience
Redundancy
Increasing Parallelism
– Increases MTBF in one layer
– Increases MTTR in another layer
MTBF
The key is to balance MTBF and
MTTR
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Resilience
Redundancy
Redundant Modules
In the real world, the point where
MTTR and MTBF meet is between
two and three parallel structures Online Backup
– One is almost always too little if you Data Data
want resiliency Center Redundant Center
– Four is almost always too many Links
– And five is right out
This applies at all levels of
redundancy
Redundant
– Circuit/link Equipment
– Device
Core
– Module
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Resilience
Fast Convergence
Three steps
– Detect
– Notify
Link State Flooding
– Tuned flooding timers
– Reduce flooding domain
Distance Vector
– Reduce update scope (query range)
– Calculate Detect
– Switch Notify Calculate & Switch
Make each step as fast as possible
– But not at the cost of network
stability
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Resilience
Fast Reroute
Detect
Notify
– Link State Flooding
Tuned flooding timers
Reduce flooding domain
Fast reroute eliminates these steps
– Distance Vector
Reduce update scope (query range)
Detect
Calculate
Notify Switch
Switch
Calculate
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
The OODA Loop
Management and Security Background
Management
– A “slower” loop
– Reacts to organic threats
Changes in the business, technology,
etc.
Business drivers
Security
– A “faster” loop
– Reacts to inorganic threats
Attacks designed to deny service, obtain
access, discover information, etc.
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Management
Network Documentation
Baseline Performance Best Fit Analysis
Baseline Utilization Root Cause Analysis
Change Analysis Business Trends
Business Ecosystem Best Practices
Business Processes Case Studies
Technology Ecosystem
Shape to Models
Design Modification Technology Trends
Replace Technology Business Trends
Inject Technology Best Practices
Add Services Case Studies
Policy Modification Change Management
Worst Case Analysis
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Management
Observe — What You Should Document
Topology
– Layer 2 and 3
Policy
– Where its applied
– The intent behind the policy
Modular Boundaries
– Where they are
– The intent behind the boundary
Per link utilization
– Time of day, seasonal, etc.
Normal failure rates
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Management
Orient — What You Should Know
Best practices
Network architecture models
Business models
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Management
Decide — What You Should Plan
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Management
Act — What You Should Do
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Security
Design Modification
Shape to Models
Replace Technology
Technology Trends
Inject Technology
Best Practices
Add Services
Change Management
Modify Policy
Risks of Failure
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Security
Crunchy on the Outside…
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Security
Crunchy Through and Through
IDS
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Security
Comparison of OODA Loops
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Tools for “Selling” Your Design
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Tools for “Selling” Your Design
Typical Components of a Business Case
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Tools for “Selling” Your Design
ROI Illustrations
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Summary
The “Art” of Network Architecture lies in the intersection between business
needs and good technology
Network architects must be more than technical – they must have a foot in
the business world also
Use your network design toolbox:
– Modularity
– Resilience
– Management
– Security
Good design is not enough, you must be able to
– Understand and design to the underlying business drivers
– Present the business as well as technical advantages of your design
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
‟ You can't create a good design by adding Band-Aids to
a poor design.”
• Terry Slattery
• CCIE #1026
Complete Your Online Session Evaluation
Give us your feedback and
you could win fabulous prizes.
Winners announced daily.
Receive 20 Cisco Daily Challenge
points for each session evaluation
you complete.
Complete your session evaluation
online now through either the mobile
app or internet kiosk stations.
Maximize your Cisco Live experience with your
free Cisco Live 365 account. Download session
PDFs, view sessions on-demand and participate in
live activities throughout the year. Click the Enter
Cisco Live 365 button in your Cisco Live portal to
log in.
BRKRST-3114 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62