SlideShare una empresa de Scribd logo
1 de 31
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1: Hierarchical
Network Design
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.0 Introduction
1.1 Hierarchical Network Design Overview
1.2 Cisco Enterprise Architecture
1.3 Evolving Network Architectures
1.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
 Describe how a hierarchical network model is used to design
networks.
 Explain the structured engineering principles for network design:
Hierarchy, Modularity, Resiliency, Flexibility.
 Describe the three layers of a hierarchical network and how they are
used in network design.
 Identify the benefits of a hierarchical design.
 Describe the Cisco Enterprise Architecture model.
 Describe the three new business network architectures: borderless
network architecture, collaboration network architecture, and the
data center or virtualization network architecture.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
1.1 Hierarchical Network
Design Overview
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Enterprise Network Campus Design
Network Requirements
 Small network – Provides services for 1 to 200 devices.
 Medium-sized network – Provides services for 200 to 1,000 devices.
 Large network – Provides services for 1,000+ devices.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Enterprise Network Campus Design
Structured Engineering Principles
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Network Hierarchy
 Access layer – Provides workgroup or user access to the network.
 Distribution layer – Provides policy-based connectivity.
 Core layer – Provides fast transport between distribution switches.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Access Layer
 Layer 2 switching
 High availability
 Port security
 QoS classification and
marking and trust boundaries
 Address Resolution Protocol
(ARP) inspection
 Virtual access control lists
(VACLs)
 Spanning tree
 Power over Ethernet (PoE)
and auxiliary VLANs for VoIP
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Distribution Layer
 Aggregation of LAN or WAN links
 Policy-based security in the form of access control lists (ACLs) and
filtering
 Routing services between LANs and VLANs and between routing
domains (e.g., EIGRP to OSPF)
 Redundancy and load balancing
 A boundary for route aggregation and summarization configured on
interfaces toward the core layer
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Core Layer
 Provides high-speed switching (i.e., fast transport)
 Provides reliability and fault tolerance
 Scales by using faster, and not more, equipment
 Avoids CPU-intensive packet manipulation caused by security,
inspection, quality of service (QoS) classification, or other processes
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Two-Tier Collapsed Core Design
 A two-tier hierarchical
“collapsed core” is when
the distribution layer and
core layer functions are
implemented by a single
device.
 Used by smaller
businesses to reduce
network cost while
maintaining most of the
benefits of the three-tier
hierarchical model.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
1.2 Cisco Enterprise
Architecture
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Modular Network Design
Modular Design
 As the complexity of networks increased, a modular network design
has been implemented.
 Modular design separates the network into various functional network
modules.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Modular Network Design
Modules in the Enterprise Architecture
 Access-distribution
module – Also called the
distribution block.
 Services module – A
generic block used to
identify services, such as
centralized Lightweight
Access Point Protocol
(LWAPP).
 Data center module –
Originally called the
server farm.
 Enterprise Edge module
– Consists of the Internet
Edge and the WAN
Edge.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Architecture Model
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Campus
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Edge
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Service Provider Edge
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Data Center
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Branch
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Teleworker
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22
1.3 Evolving Network
Architectures
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architectures
IT Challenges
Some of the top trends include:
 Bring Your Own Device
(BYOD)
 Online collaboration
 Video communication
 Cloud computing
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architectures
Emerging Enterprise Architectures
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Emerging Network Architectures
Cisco Borderless Networks
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Emerging Network Architectures
Collaboration Architecture
Cisco’s collaboration architecture
is composed of three layers:
 Application and Devices –
Unified communications and
conference applications, such as
Cisco WebEx Meetings, WebEx
Social, Cisco Jabber, and
TelePresence.
 Collaboration Services –
Supports collaboration
applications.
 Network and Computer
Infrastructure – Allows
collaboration anytime, from
anywhere, on any device.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Emerging Network Architectures
Data Center and Virtualization
The data center architecture consists of three components:
 Cisco Unified Management Solutions – Simplifies and automates
the process of deploying IT infrastructure and services with speed and
enterprise reliability.
 Unified Fabric Solutions – Delivers network services to servers,
storage, and applications, providing transparent convergence, and
scalability.
 Unified Computing Solutions – Cisco’s next-generation data center
system unites computing, network, storage access, and virtualization
into a cohesive system designed to reduce total cost of ownership
(TCO).
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
1.4 Summary
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary
This chapter:
 Introduced the structured engineering principles of good network
design that include hierarchy, modularity, resiliency, and flexibility.
 Explained that the typical enterprise hierarchical LAN campus
network design incorporates the access layer, distribution layer, and
the core layer.
 Identified that smaller enterprise networks may use a “collapsed
core” hierarchy, whereas the distribution and core layer functions are
implemented in a single device.
 Described the benefits of a hierarchical network as scalability,
redundancy, performance, and ease of maintenance.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary (cont.)
 Explained that a modular design, which separates the functions of a
network, enables flexibility and facilitates implementation and
management.
 Discussed that the Cisco Enterprise Architecture modules are used
to facilitate the design of large, scalable networks.
 Identified the primary modules, including the Enterprise Campus,
Enterprise Edge, Service Provider Edge, Enterprise Data Center,
Enterprise Branch, and Enterprise Teleworker.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Más contenido relacionado

La actualidad más candente

CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 

La actualidad más candente (20)

CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
vlan
vlanvlan
vlan
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System Design
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 

Destacado

CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
Irsandi Hasan
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
Irsandi Hasan
 

Destacado (19)

CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
Ccna4
Ccna4Ccna4
Ccna4
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 

Similar a CCNAv5 - S4: Chapter 1 Hierarchical Network Design

Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
CamTESOL2015
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
shah_ril1512
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
hasby if
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
Marcus Reams
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
 

Similar a CCNAv5 - S4: Chapter 1 Hierarchical Network Design (20)

Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
 
Chapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksChapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networks
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01
 
Week2 2
Week2 2Week2 2
Week2 2
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 

Más de Vuz Dở Hơi

Más de Vuz Dở Hơi (20)

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Último (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

CCNAv5 - S4: Chapter 1 Hierarchical Network Design

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.0 Introduction 1.1 Hierarchical Network Design Overview 1.2 Cisco Enterprise Architecture 1.3 Evolving Network Architectures 1.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives  Describe how a hierarchical network model is used to design networks.  Explain the structured engineering principles for network design: Hierarchy, Modularity, Resiliency, Flexibility.  Describe the three layers of a hierarchical network and how they are used in network design.  Identify the benefits of a hierarchical design.  Describe the Cisco Enterprise Architecture model.  Describe the three new business network architectures: borderless network architecture, collaboration network architecture, and the data center or virtualization network architecture.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 1.1 Hierarchical Network Design Overview
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Enterprise Network Campus Design Network Requirements  Small network – Provides services for 1 to 200 devices.  Medium-sized network – Provides services for 200 to 1,000 devices.  Large network – Provides services for 1,000+ devices.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Enterprise Network Campus Design Structured Engineering Principles
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Network Hierarchy  Access layer – Provides workgroup or user access to the network.  Distribution layer – Provides policy-based connectivity.  Core layer – Provides fast transport between distribution switches.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Access Layer  Layer 2 switching  High availability  Port security  QoS classification and marking and trust boundaries  Address Resolution Protocol (ARP) inspection  Virtual access control lists (VACLs)  Spanning tree  Power over Ethernet (PoE) and auxiliary VLANs for VoIP
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Distribution Layer  Aggregation of LAN or WAN links  Policy-based security in the form of access control lists (ACLs) and filtering  Routing services between LANs and VLANs and between routing domains (e.g., EIGRP to OSPF)  Redundancy and load balancing  A boundary for route aggregation and summarization configured on interfaces toward the core layer
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Core Layer  Provides high-speed switching (i.e., fast transport)  Provides reliability and fault tolerance  Scales by using faster, and not more, equipment  Avoids CPU-intensive packet manipulation caused by security, inspection, quality of service (QoS) classification, or other processes
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Two-Tier Collapsed Core Design  A two-tier hierarchical “collapsed core” is when the distribution layer and core layer functions are implemented by a single device.  Used by smaller businesses to reduce network cost while maintaining most of the benefits of the three-tier hierarchical model.
  • 12. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12 1.2 Cisco Enterprise Architecture
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Modular Network Design Modular Design  As the complexity of networks increased, a modular network design has been implemented.  Modular design separates the network into various functional network modules.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Modular Network Design Modules in the Enterprise Architecture  Access-distribution module – Also called the distribution block.  Services module – A generic block used to identify services, such as centralized Lightweight Access Point Protocol (LWAPP).  Data center module – Originally called the server farm.  Enterprise Edge module – Consists of the Internet Edge and the WAN Edge.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Architecture Model
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Campus
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Edge
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Service Provider Edge
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Data Center
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Branch
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Teleworker
  • 22. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22 1.3 Evolving Network Architectures
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architectures IT Challenges Some of the top trends include:  Bring Your Own Device (BYOD)  Online collaboration  Video communication  Cloud computing
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architectures Emerging Enterprise Architectures
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Emerging Network Architectures Cisco Borderless Networks
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Emerging Network Architectures Collaboration Architecture Cisco’s collaboration architecture is composed of three layers:  Application and Devices – Unified communications and conference applications, such as Cisco WebEx Meetings, WebEx Social, Cisco Jabber, and TelePresence.  Collaboration Services – Supports collaboration applications.  Network and Computer Infrastructure – Allows collaboration anytime, from anywhere, on any device.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Emerging Network Architectures Data Center and Virtualization The data center architecture consists of three components:  Cisco Unified Management Solutions – Simplifies and automates the process of deploying IT infrastructure and services with speed and enterprise reliability.  Unified Fabric Solutions – Delivers network services to servers, storage, and applications, providing transparent convergence, and scalability.  Unified Computing Solutions – Cisco’s next-generation data center system unites computing, network, storage access, and virtualization into a cohesive system designed to reduce total cost of ownership (TCO).
  • 28. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28 1.4 Summary
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary This chapter:  Introduced the structured engineering principles of good network design that include hierarchy, modularity, resiliency, and flexibility.  Explained that the typical enterprise hierarchical LAN campus network design incorporates the access layer, distribution layer, and the core layer.  Identified that smaller enterprise networks may use a “collapsed core” hierarchy, whereas the distribution and core layer functions are implemented in a single device.  Described the benefits of a hierarchical network as scalability, redundancy, performance, and ease of maintenance.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary (cont.)  Explained that a modular design, which separates the functions of a network, enables flexibility and facilitates implementation and management.  Discussed that the Cisco Enterprise Architecture modules are used to facilitate the design of large, scalable networks.  Identified the primary modules, including the Enterprise Campus, Enterprise Edge, Service Provider Edge, Enterprise Data Center, Enterprise Branch, and Enterprise Teleworker.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential