Date post: | 06-Apr-2018 |
Category: |
Documents |
Upload: | httpheiserzcom |
View: | 224 times |
Download: | 0 times |
of 39
8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
1/39
Chapter 1 Networking in the Enterprise
CCNA Discovery 4.0
8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
2/39
Intruduction
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
3/39
Intruduction
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
4/39
Intruduction
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
5/39
Intruduction
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
6/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Objectives
Describle an enterprise
Indentify traffic flows through an enterpriseand describe the importance of an intranet
and extranet. Describe the different types and handling of
traffic in the enterprise.
Define the role and importance of atelecommuter. Describe the function and importance of
VPNs
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
7/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Describing theEnterprise
Network
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
8/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Supporting the Bussiness Enterprise
The network that is used tosupport the businessenterprise is called anenterprise network.
Support for criticalapplications
Support for convergednetwork traffic
Need for centralized
controlSupport for diverse
business requirements
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
9/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Supporting the Bussiness Enterprise
Businessesincreasingly rely ontheir networkinfrastructure toprovide mission
critical services.
Enterprise classequipment is designedfor reliability, with
features such asredundant powersupplies and failovercapabilities.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
10/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow in the Enterprise Network
To optimize bandwidth on an enterprise network, thenetwork must be organized so that traffic stays localizedand is not propagated onto unnecessary portions of thenetwork.
Using the three-layer hierarchical design model helpsorganize the network.
This model divides the network functionality into threedistinct layers: Access Layer, Distribution Layer, and CoreLayer.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
11/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow in the Enterprise Network
Enterprise Campus:Consists of the campusinfrastructure with serverfarms and networkmanagement
Enterprise Edge: Consistsof the Internet, VPN, andWAN modules connectingthe enterprise with the
service provider's network Service Provider Edge:
Provides Internet, PublicSwitched TelephoneNetwork (PSTN), and WAN
services
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
12/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow in the Enterprise Network
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
13/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow in the Enterprise Network
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
14/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow in the Enterprise Network
A well-designed network not onlycontrols traffic but also limits thesize of failure domains.
A failure domain is the area of anetwork impacted when a keydevice or service experiencesproblems.
The function of the device thatinitially fails determines theimpact of a failure domain.
For example, a malfunctioning
switch on a network segmentnormally impacts only hosts onthat segment. However, if therouter that connects thissegment to others fails, theimpact is much greater.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
15/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Enterprise LANs and WAN
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
16/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Enterprise LANs and WAN
Features of a LAN: The organization has the responsibility of installing and managing
the infrastructure.
Ethernet is the most common technology used.
The focus of the network is in the Access and Distribution Layers.
The LAN connects users, provides support for localizedapplications and server farms.
Connected devices are usually in the same local area, such as abuilding or a campus.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
17/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Enterprise LANs and WAN
Features of a WAN:Connected sites are usually geographically dispersed.
Connectivity to the WAN requires a device such as amodem or CSU/DSU to put the data in a form
acceptable to the network of the service provider.Services are provided by an ISP. WAN services
include T1/T3, E1/E3, DSL, Cable, Frame Relay, andATM.
The ISP has the responsibility of installing and
managing the infrastructure.
The edge devices modify the Ethernet encapsulation toa serial WAN encapsulation.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
18/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Intranets and Extranets
Enterprise networks contain both WAN and LAN technologies. These networks provide many of the services associated with the
Internet, including:
Web
FTP Telnet/SSH
Discussion forums
Many companies use this private network or intranet to provideaccess for local and remote employees using LAN and WAN
technologies Intranets may have links to the Internet. If connected to the Internet, firewalls control the traffic that enters and
exits the intranet.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
19/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Intranets and Extranets
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
20/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Intranets and Extranets
An extranet is a private network (intranet) that allowscontrolled access to individuals and companies outsidethe organization.
An extranet is not a public network.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
21/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
IdentifyingEnterprise
Applications
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
22/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow Patterns
LAN traffic:File sharing
Printing
Internal backup and mirroring
Intra-campus voice WAN traffic:
System updates
Company email
Transaction processing External traffic is traffic that originates from or is destined
to the Internet.
VPN and Internet traffic is considered external traffic flow.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
23/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Traffic Flow Patterns
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
24/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Applications and Traffic on an Enterprise Network
Database transactionprocessing
Mainframe or data centeraccess
File and print sharing Authentication Web services Email and other
communications
VPN services Voice calls and voicemail Video and video conferencing
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
25/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Applications and Traffic on an Enterprise Network
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
26/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Network Traffic Prioritization
Data TrafficSome data applications are more concerned about
time-sensitivity than reliability, and most dataapplications can tolerate delays.
For this reason, data traffic usually employsTransmission Control Protocol (TCP).
TCP uses acknowledgments to determine when lostpackets must be retransmitted and thereforeguarantees delivery.
While the use of acknowledgements makes TCP amore reliable delivery protocol, it also incurs a delay.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
27/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Network Traffic Prioritization
Voice and Video TrafficVoice traffic and video traffic are different from data
traffic.
Voice and video applications require an uninterrupted
stream of data to ensure high quality conversations andimages.
Therefore, voice and video applications employ UserDatagram Protocol (UDP) instead of TCP.
Since UDP does not have mechanisms for
retransmitting lost packets, it minimizes delays.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
28/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Network Traffic Prioritization
In addition to understanding the delays of TCP versusUDP, it is also necessary to understand the delay, orlatency, caused by the networking devices that mustprocess the traffic on its path to the destination.
OSI Layer 3 devices create more delay than Layer 2devices due to the number of headers they have toprocess.
Jitter, caused by network congestion, is the variation intime of the packets arriving at their destination.
Quality of Service (QoS) is a process used to guarantee aspecified data flow. QoS mechanisms sort traffic intoqueues, based on priority.
Ex: Detail on 1.2.3 Currirulum
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
29/39
Network Traffic Prioritization
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
30/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
SupportingRemote Workers
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
31/39
Teleworking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Teleworking, also referred to as telecommuting and e-commuting, allows employees to use telecommunicationstechnology to work from their homes or other remotelocations.
The remote worker using the technology is called ateleworker or telecommuter.
Teleworking provides many advantages and opportunitiesfor both employer and employee.
Some companies have even reduced the expense of air
travel and hotel accommodations to bring their employeestogether by using teleconferencing and collaborationtools.
Is the method for a group of people to communicate inreal time online.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
32/39
Teleworking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Employees save time and money, and reduce stress, byeliminating the daily travel to and from the office.
Working from home allows employees to spend more timewith their families.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
33/39
Teleworking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
34/39
Teleworking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
By combining large video displays and high quality audio inspecially-designed rooms, it appears as if all participants,regardless of their physical location, are sitting across theboardroom table from each other.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
35/39
Teleworking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
36/39
Virtual Private Networks
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
A much easier choice is to encrypt all traffic movingbetween the remote site and the enterprise network usingVirtual Private Networks (VPNs).
VPNs are often described as tunnels.
Anything that uses the underground tunnel to travelbetween the two points is surrounded and protected fromview.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
37/39
Virtual Private Networks
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
When using a VPN, a virtual tunnel is created by linking thesource and destination addresses.
VPNs are a client/server application; therefore, telecommutersmust install the VPN client on their computers in order to form a
secure connection with the enterprise network.
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
38/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Summary
A large bussiness environment with manyusers and locations or many system isreferred to as an enterprise.
Cisco Enterprise Architectures: An Internet Network Traffic
Teleworking, teleworkers VPNs
http://www.bkacad.com/http://www.bkacad.com/8/3/2019 CCNA Dis3 - Chapter 1 - Networking in the Enterprise_ppt [Compatibility Mode]
39/39
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
http://www.bkacad.com/http://www.bkacad.com/