© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.

Slides:



Advertisements
Presentaciones similares
Configuración básica de un router CISCO
Advertisements

Control en cascada.
Editing Slides With Polaris Office, you can create new .ppt and .pptx presentations or edit your presentation with ease.
Chapter 1: Introduction to Scaling Networks
SOCIEDAD PARA EL DESARROLLO REGIONAL DE CANTABRIA (SODERCAN) Knowledge Management tools Knowledge management tools.
Lesson three: The Internet Lección tres: El Internet What is the Internet and how does it work? What can I do on the Internet? How can I view the Internet?
Telling Time.
DHCP Redes de computadores: un enfoque descendente basado en Internet, 2ª edición. Jim Kurose, Keith Ross.
FACULTAD DE INGENIERIA UNIVERSIDAD DE BUENOS AIRES FIUBA Redes de Datos – Ing. Marcelo Utard / Ing. Pablo Ronco “Routing Protocols” Curso de Especialización.
Notes #18 Numbers 31 and higher Standard 1.2
Subject pronouns In order to use verbs, you will need to learn about subject pronouns. A subject pronoun replaces the name or title of a person or thing.
Sistemas de Información Agosto-Diciembre 2007 Sesión # 3.
What has to be done today? It can be done in any order. Make a new ALC form Do the ALC Get two popsicle sticks Get 16 feet of yarn. That is 4 arms width.
Science Career Research Project By Jose pineda. Name of Job: Electrical Engineering I like that I would like to invent new electric and new social networks.
WWW. WIRELESS WIFI Wireless-Fidelity Es un mecanismo de conexión de dispositivos electrónicos de forma inalámbrica.
OBJECTIVO: SWBAT distinguish between greetings for people using tu and Ud. El 25 de Septiembre 2012.
FACULTAD DE INGENIERIA DE SISTEMAS, CÓMPUTO Y TELECOMUNICACIONES Enhanced Interior Gateway Protocol (EIGRP)
Photo Vocabulary Scavenger Hunt Rich Bradshaw. What is this? - A group activity for middle or high school students. - Highly interactive and very fun.
Introducción Nivel 4. Modelo OSI Propiedades Nivel 4 Entrega de mensajes garantizada. Entrega de mensajes en el mismo orden en el que fueron enviados.
+ Four Square Vocabulary. + What it is. Whole class, small group or individual activity that: Presents new vocabulary Reviews vocabulary Practices sentence.
©2008 The McGraw-Hill Companies, Inc. All rights reserved. Digital Electronics Principles & Applications Seventh Edition Chapter 2 Numbers We Use in Digital.
Un juego de adivinanzas: ¿Dónde está el tesoro? A1B1C1D1E1F1 A4B4C4D4E4F4 A2B2C2D2E2F2 A5B5C5D5E5F5 A3B3C3D3E3F3 A6B6C6D6E6F6 Inténtalo de nuevo Inténtalo.
Campanada guidelines in your composition notebook ¿Cómo es tu familia? (10 points) Ex. Hoy es Miercoles el 27 de enero First line will start with the date.
© Copyright Showeet.com E XAMPLE 1 A BSTRACT 3D P APER I NFOGRAPHICS Your own text goes here.
IVESDA User Guide.  Downloadable application that can be installed on Android and iOS handheld devices to monitor and maintain VESDA-E systems with unprecedented.
EQUILIBRIUM OF A PARTICLE IN 2-D Today’s Objectives: Students will be able to : a) Draw a free body diagram (FBD), and, b) Apply equations of equilibrium.
Cómo asignar IP Address estáticos en un host
header Oscar Fernando Jerez Rey
Reflexive Verbs Uses: 1. Reflexive verbs are used to indicate that the person doing the action is also receiving the action. 2. Reflexive verbs are.
Para conectarse a Internet
Configuración básica de un router CISCO
8 de febrero de 2017.
Chapter 5 Lessons & Materials
In Lección 1, you learned how to conjugate and use the verb ser (to be). You will now learn a second verb which means to be, the verb estar. Although.
Centro de Operaciones de John Deere
Getting to know you more!
Introduction & Agenda Introduction to Microchip Device Blocksets Introduction to MATLAB Plug-In in MPLAB®IDE Creating a SIMULINK model with Microchip.
El Chocolate.
First Grade Dual High Frequency Words
More sentences that contain if…
La Ilustración en la Inversión:
GRAPHIC MATERIALS 1. GRAPHIC MATERIALS. GRAPHIC MATERIALS 1. GRAPHIC MATERIALS.
International Conference on Computer and Applications (CCA 2012), Proceedings Abstract: E-D2HCP: Enhanced Distributed Dynamic Host Configuration Protocol.
Youden Analysis. Introduction to W. J. Youden Components of the Youden Graph Calculations Getting the “Circle” What to do with the results.
Thematic Unit: La familia y su ritmo de vida. Targeted Language Level: Spanish Novice-High Essential Question: How does having different kinds of families.
Page 1 CITS Active Directory Implementation UMass Dartmouth.
© 2017 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: EIGRP Tuning and Troubleshooting Scaling Networks.
Best Practice Instalacion de motores SQL.
FRACTIONAL REGULATION ENERGY SAVING DEVICE
“To Be” or not “To Be” Ser vs. Estar.
Comparison of Data-driven Link Estimation Methods in Low-power Wireless Networks HONGWEI ZHANG LIFENG SANG ANISH ARORA.
© ERICO ®, Inc NFPA 70 National Electric Code (NEC) Grounding & Bonding.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching.
An Animated PowerPoint Template. This 2007 PowerPoint contains video animation, but does not support text over video. The PowerPoint 2010 version includes.
Fabian López, Jordi Martí, Galdric Ruiz
Vamonos Write a full sentence for each class, including one thing that you would need for that class. Ex. Math → Para la clase de matemáticas yo necesito.
JKSimMet Software (windows & buttons) Split Engineering Chile Ltda. General Salvo #331 oficina 201 Casilla Sucursal Panorámico Providencia – Santiago,
Introduction to CAN. What is CAN and what are some of its features? Serial communication Multi-Master Protocol Compact –Twisted Pair Bus line 1 Megabit.
The Windows File System and Windows Explorer To move around the file system and examine your files or get to one you want (say, to modify, delete or copy.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Development of the concert programme
BONUS IDEAS 0-10 pts. Canciónes, arte, videos, poemas, etc.
Connectivity MODELS OF NETWORK COMPUTING Centralized computing Distributed computing Collaborative or cooperative computing.
Juliana Carmona Esteban Cano
1 © 2017 Citrix | Summit 2017 | Confidential – Content in this presentation is under NDA LABS604 - Essentials for quickly deploying and configuring NetScaler.
Welcome to PowerPoint gdskcgdskfcbskjc. Designer helps you get your point across PowerPoint Designer suggests professional designs for your presentation,
How to write my report. Checklist – what I need to include Cover page Contents page – with sections Introduction - aims of project - background information.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: DHCP Routing and Switching Essentials v6.0.
“ The Heart of a Leader ” based on the book by Ken Blanchard presentation written by Michelle Spradley, CPS/CAP presented by Emily Garner, CAP-OM.
Globalization Politics and the preservation of nation state.
Transcripción de la presentación:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter Introduction 1.1 Implementing a Network Design 1.2 Selecting Network Devices 1.3 Summary

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Objectives  Describe the use of a hierarchical network for a small business.  Describe recommendations for designing a network that is scalable.  Describe the type of switches available for small-to-medium-sized business networks.  Describe the type of routers available for small-to-medium-sized business networks.  Configure and verify basic settings on a Cisco IOS device.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Implementing a Network Design Scaling Networks

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Hierarchical Network Design Network Scaling Needs As they grow and expand, all enterprise networks must:  Support critical applications  Support converged network traffic  Support diverse business needs  Provide centralized administrative control

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Hierarchical Network Design Enterprise Business Devices To provide a high-reliability network, enterprise class equipment is installed in the enterprise network.

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Hierarchical Network Design This model divides the network functionality into three distinct layers.

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Hierarchical Network Design Cisco Enterprise Architecture The primary Cisco Enterprise Architecture modules include:  Enterprise Campus  Enterprise Edge  Service Provider Edge  Remote

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Hierarchical Network Design Failure Domains  Failure Domains are areas of a network that are impacted when a critical device or network service experiences problems.  Redundant links and enterprise class equipment minimize disruption of network.  Smaller failure domains reduce the impact of a failure on company productivity.  Smaller failure domains also simplify troubleshooting.  Switch block deployment – each switch block acts independently of the others. Failure of a single device does not impact the whole network.

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Expanding the Network Designing for Scalability  Use expandable, modular equipment or clustered devices.  Include design modules that can be added, upgraded, and modified, without affecting the design of the other functional areas of the network.  Create a hierarchical addressing scheme.  Use routers or multilayer switches to limit broadcasts and filter traffic.

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Expanding the Network Planning for Redundancy  Installing duplicate equipment  Providing redundant paths

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Expanding the Network Increasing Bandwidth  Link aggregation increases the amount of bandwidth between devices by creating one logical link made up of several physical links.  EtherChannel is a form of link aggregation used in switched networks.

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Expanding the Network Expanding the Access Layer Access layer connectivity can be extended through wireless connectivity.

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Expanding the Network Fine-Tuning Routing Protocols OSPF works well for large, hierarchical networks.

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Expanding the Network Fine-Tuning Routing Protocols EIGRP uses multiple tables to manage the routing process, as shown in figure. EIGRP contains many features that are not found in any other routing protocols. It is an excellent choice for large, multi-protocol networks that employ primarily Cisco devices.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Selecting Network Devices Scaling Networks

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switch Hardware Switch Platforms Select form factor:  Fixed  Modular  Stackable  Non-stackable

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switch Hardware Switch Platforms

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switch Hardware Port Density

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switch Hardware Forwarding Rates The processing capabilities of a switch are rated by how much data the switch can process per second.

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switch Hardware Power over Ethernet PoE allows the switch to deliver power to a device over the existing Ethernet cabling. This feature can be used by IP phones and some wireless access points.

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Switch Hardware Multilayer Switching  Deployed in the core and distribution layers of an organization’s switched network.  Can build a routing table, support a few routing protocols, and forward IP packets.

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Router Hardware Router Requirements Role of routers:  Interconnect multiple sites  Provide redundant paths  Connect ISPs  Translate between media types and protocols

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Router Hardware Cisco Routers Three categories of routers:  Branch – Highly available 24/7.  Network Edge – High performance, high security, and reliable services.  Connect campus, data center, and branch networks.  Service provider routers

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Router Hardware  Fixed configuration – Built-in interfaces.  Modular – Slots allow different interfaces to be added.

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Managing IOS Files and Licensing

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices In-Band vs. Out-of-Band Management  Out-of-Band requires direct connection to console or AUX port and Terminal Emulation client to access device.  In-Band requires, at least, one interface to be connected and operational and use of Telnet, SSH, or HTTP to access device.

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Router CLI commands Basic router configuration includes:  Hostname  Passwords (console, Telnet/SSH, and privileged mode)  Interface IP addresses  Enabling a routing protocol

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Router CLI commands The figure shows the results of the configuration commands that were entered. To clear the router configuration, use the erase startup-config command and then the reload command.

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Router show Commands  show ip protocols – Displays information about routing protocol configured.  show ip route – Displays routing table information.  show ip ospf neighbor – Displays information about OSPF neighbors.  show ip interfaces – Displays detailed information about interfaces.  show ip interface brief – Displays all interfaces with IP addressing, interface, and line protocol status.  show cdp neighbors – Displays information about all directly connected Cisco devices.

Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Router show Commands

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Router show Commands

Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Switch CLI Commands  Hostname  Passwords  In-Band access requires the Switch to have an IP address (assigned to VLAN 1).  Save configuration – copy running-config startup-config command.  To clear switch – erase startup-config, and then reload.  To erase VLAN information – delete flash:vlan.dat.

Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Switch Show Commands  show port-security – Displays any ports with security enabled.  show port-security address – Displays all secure MAC addresses.  show interfaces – Displays detailed information about interfaces.  show mac-address-table – Displays all MAC addresses the switch has learned.  show cdp neighbors – Displays all directly connected Cisco devices.

Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Managing Devices Basic Switch Show Commands

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Summary Scaling Networks

Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Summary This chapter:  Introduces the hierarchical network design model that divides network functionality into the access layer, the distribution layer, and the core layer.  Describes how the Cisco Enterprise Architecture further divides the network into functional components called modules.  Defines how routers and multilayer switches are used to limit failure domains.  Explains that a good network design includes a scalable IP scheme, fast converging and scalable routing protocols, appropriate Layer 2 protocols and devices that are modular or easily upgraded.

Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Summary (cont.)  Identifies that a mission-critical server should have a connection to two different access layer switches. It should also have redundant modules and backup power.  Recognizes that routers and switches should be selected from the appropriate categories to meet the network’s requirements.

Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential