SlideShare a Scribd company logo
1 of 31
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1: Hierarchical
Network Design
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.0 Introduction
1.1 Hierarchical Network Design Overview
1.2 Cisco Enterprise Architecture
1.3 Evolving Network Architectures
1.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
 Describe how a hierarchical network model is used to design
networks.
 Explain the structured engineering principles for network design:
Hierarchy, Modularity, Resiliency, Flexibility.
 Describe the three layers of a hierarchical network and how they are
used in network design.
 Identify the benefits of a hierarchical design.
 Describe the Cisco Enterprise Architecture model.
 Describe the three new business network architectures: borderless
network architecture, collaboration network architecture, and the
data center or virtualization network architecture.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
1.1 Hierarchical Network
Design Overview
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Enterprise Network Campus Design
Network Requirements
 Small network – Provides services for 1 to 200 devices.
 Medium-sized network – Provides services for 200 to 1,000 devices.
 Large network – Provides services for 1,000+ devices.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Enterprise Network Campus Design
Structured Engineering Principles
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Network Hierarchy
 Access layer – Provides workgroup or user access to the network.
 Distribution layer – Provides policy-based connectivity.
 Core layer – Provides fast transport between distribution switches.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Access Layer
 Layer 2 switching
 High availability
 Port security
 QoS classification and
marking and trust boundaries
 Address Resolution Protocol
(ARP) inspection
 Virtual access control lists
(VACLs)
 Spanning tree
 Power over Ethernet (PoE)
and auxiliary VLANs for VoIP
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Distribution Layer
 Aggregation of LAN or WAN links
 Policy-based security in the form of access control lists (ACLs) and
filtering
 Routing services between LANs and VLANs and between routing
domains (e.g., EIGRP to OSPF)
 Redundancy and load balancing
 A boundary for route aggregation and summarization configured on
interfaces toward the core layer
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Core Layer
 Provides high-speed switching (i.e., fast transport)
 Provides reliability and fault tolerance
 Scales by using faster, and not more, equipment
 Avoids CPU-intensive packet manipulation caused by security,
inspection, quality of service (QoS) classification, or other processes
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hierarchical Network Design
Two-Tier Collapsed Core Design
 A two-tier hierarchical
“collapsed core” is when
the distribution layer and
core layer functions are
implemented by a single
device.
 Used by smaller
businesses to reduce
network cost while
maintaining most of the
benefits of the three-tier
hierarchical model.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
1.2 Cisco Enterprise
Architecture
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Modular Network Design
Modular Design
 As the complexity of networks increased, a modular network design
has been implemented.
 Modular design separates the network into various functional network
modules.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Modular Network Design
Modules in the Enterprise Architecture
 Access-distribution
module – Also called the
distribution block.
 Services module – A
generic block used to
identify services, such as
centralized Lightweight
Access Point Protocol
(LWAPP).
 Data center module –
Originally called the
server farm.
 Enterprise Edge module
– Consists of the Internet
Edge and the WAN
Edge.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Architecture Model
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Campus
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Edge
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Service Provider Edge
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Data Center
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Branch
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architecture Model
Cisco Enterprise Teleworker
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22
1.3 Evolving Network
Architectures
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architectures
IT Challenges
Some of the top trends include:
 Bring Your Own Device
(BYOD)
 Online collaboration
 Video communication
 Cloud computing
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Enterprise Architectures
Emerging Enterprise Architectures
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Emerging Network Architectures
Cisco Borderless Networks
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Emerging Network Architectures
Collaboration Architecture
Cisco’s collaboration architecture
is composed of three layers:
 Application and Devices –
Unified communications and
conference applications, such as
Cisco WebEx Meetings, WebEx
Social, Cisco Jabber, and
TelePresence.
 Collaboration Services –
Supports collaboration
applications.
 Network and Computer
Infrastructure – Allows
collaboration anytime, from
anywhere, on any device.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Emerging Network Architectures
Data Center and Virtualization
The data center architecture consists of three components:
 Cisco Unified Management Solutions – Simplifies and automates
the process of deploying IT infrastructure and services with speed and
enterprise reliability.
 Unified Fabric Solutions – Delivers network services to servers,
storage, and applications, providing transparent convergence, and
scalability.
 Unified Computing Solutions – Cisco’s next-generation data center
system unites computing, network, storage access, and virtualization
into a cohesive system designed to reduce total cost of ownership
(TCO).
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
1.4 Summary
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary
This chapter:
 Introduced the structured engineering principles of good network
design that include hierarchy, modularity, resiliency, and flexibility.
 Explained that the typical enterprise hierarchical LAN campus
network design incorporates the access layer, distribution layer, and
the core layer.
 Identified that smaller enterprise networks may use a “collapsed
core” hierarchy, whereas the distribution and core layer functions are
implemented in a single device.
 Described the benefits of a hierarchical network as scalability,
redundancy, performance, and ease of maintenance.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary (cont.)
 Explained that a modular design, which separates the functions of a
network, enables flexibility and facilitates implementation and
management.
 Discussed that the Cisco Enterprise Architecture modules are used
to facilitate the design of large, scalable networks.
 Identified the primary modules, including the Enterprise Campus,
Enterprise Edge, Service Provider Edge, Enterprise Data Center,
Enterprise Branch, and Enterprise Teleworker.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsVuz Dở Hơi
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemVuz Dở Hơi
 

What's hot (20)

CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
 
200 301-ccna
200 301-ccna200 301-ccna
200 301-ccna
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
 

Viewers also liked

CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1Irsandi Hasan
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingVuz Dở Hơi
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPVuz Dở Hơi
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationVuz Dở Hơi
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2Irsandi Hasan
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10Nil Menon
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3Irsandi Hasan
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architectureAmir Hossain
 

Viewers also liked (19)

CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
Ccna4
Ccna4Ccna4
Ccna4
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 

Similar to CCNAv5 - S4: Chapter 1 Hierarchical Network Design

Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewshah_ril1512
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERhasby if
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4Chaing Ravuth
 
Chapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksChapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksteknetir
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4Waqas Ahmed Nawaz
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Hamza Malik
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxsirajmohammed35
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
01 route routing services
01 route routing services01 route routing services
01 route routing servicesMarcus Reams
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1Andy Juan Sarango Veliz
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkjoehurst87
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksYaser Rahmati
 

Similar to CCNAv5 - S4: Chapter 1 Hierarchical Network Design (20)

Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
 
Chapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksChapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networks
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01
 
Week2 2
Week2 2Week2 2
Week2 2
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 

More from Vuz Dở Hơi

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyVuz Dở Hơi
 

More from Vuz Dở Hơi (20)

Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 
Cehv8 - Module 19: Cryptography
Cehv8 - Module 19: CryptographyCehv8 - Module 19: Cryptography
Cehv8 - Module 19: Cryptography
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

CCNAv5 - S4: Chapter 1 Hierarchical Network Design

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.0 Introduction 1.1 Hierarchical Network Design Overview 1.2 Cisco Enterprise Architecture 1.3 Evolving Network Architectures 1.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives  Describe how a hierarchical network model is used to design networks.  Explain the structured engineering principles for network design: Hierarchy, Modularity, Resiliency, Flexibility.  Describe the three layers of a hierarchical network and how they are used in network design.  Identify the benefits of a hierarchical design.  Describe the Cisco Enterprise Architecture model.  Describe the three new business network architectures: borderless network architecture, collaboration network architecture, and the data center or virtualization network architecture.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 1.1 Hierarchical Network Design Overview
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Enterprise Network Campus Design Network Requirements  Small network – Provides services for 1 to 200 devices.  Medium-sized network – Provides services for 200 to 1,000 devices.  Large network – Provides services for 1,000+ devices.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Enterprise Network Campus Design Structured Engineering Principles
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Network Hierarchy  Access layer – Provides workgroup or user access to the network.  Distribution layer – Provides policy-based connectivity.  Core layer – Provides fast transport between distribution switches.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Access Layer  Layer 2 switching  High availability  Port security  QoS classification and marking and trust boundaries  Address Resolution Protocol (ARP) inspection  Virtual access control lists (VACLs)  Spanning tree  Power over Ethernet (PoE) and auxiliary VLANs for VoIP
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Distribution Layer  Aggregation of LAN or WAN links  Policy-based security in the form of access control lists (ACLs) and filtering  Routing services between LANs and VLANs and between routing domains (e.g., EIGRP to OSPF)  Redundancy and load balancing  A boundary for route aggregation and summarization configured on interfaces toward the core layer
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Core Layer  Provides high-speed switching (i.e., fast transport)  Provides reliability and fault tolerance  Scales by using faster, and not more, equipment  Avoids CPU-intensive packet manipulation caused by security, inspection, quality of service (QoS) classification, or other processes
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hierarchical Network Design Two-Tier Collapsed Core Design  A two-tier hierarchical “collapsed core” is when the distribution layer and core layer functions are implemented by a single device.  Used by smaller businesses to reduce network cost while maintaining most of the benefits of the three-tier hierarchical model.
  • 12. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12 1.2 Cisco Enterprise Architecture
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Modular Network Design Modular Design  As the complexity of networks increased, a modular network design has been implemented.  Modular design separates the network into various functional network modules.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Modular Network Design Modules in the Enterprise Architecture  Access-distribution module – Also called the distribution block.  Services module – A generic block used to identify services, such as centralized Lightweight Access Point Protocol (LWAPP).  Data center module – Originally called the server farm.  Enterprise Edge module – Consists of the Internet Edge and the WAN Edge.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Architecture Model
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Campus
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Edge
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Service Provider Edge
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Data Center
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Branch
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architecture Model Cisco Enterprise Teleworker
  • 22. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22 1.3 Evolving Network Architectures
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architectures IT Challenges Some of the top trends include:  Bring Your Own Device (BYOD)  Online collaboration  Video communication  Cloud computing
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Enterprise Architectures Emerging Enterprise Architectures
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Emerging Network Architectures Cisco Borderless Networks
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Emerging Network Architectures Collaboration Architecture Cisco’s collaboration architecture is composed of three layers:  Application and Devices – Unified communications and conference applications, such as Cisco WebEx Meetings, WebEx Social, Cisco Jabber, and TelePresence.  Collaboration Services – Supports collaboration applications.  Network and Computer Infrastructure – Allows collaboration anytime, from anywhere, on any device.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Emerging Network Architectures Data Center and Virtualization The data center architecture consists of three components:  Cisco Unified Management Solutions – Simplifies and automates the process of deploying IT infrastructure and services with speed and enterprise reliability.  Unified Fabric Solutions – Delivers network services to servers, storage, and applications, providing transparent convergence, and scalability.  Unified Computing Solutions – Cisco’s next-generation data center system unites computing, network, storage access, and virtualization into a cohesive system designed to reduce total cost of ownership (TCO).
  • 28. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28 1.4 Summary
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary This chapter:  Introduced the structured engineering principles of good network design that include hierarchy, modularity, resiliency, and flexibility.  Explained that the typical enterprise hierarchical LAN campus network design incorporates the access layer, distribution layer, and the core layer.  Identified that smaller enterprise networks may use a “collapsed core” hierarchy, whereas the distribution and core layer functions are implemented in a single device.  Described the benefits of a hierarchical network as scalability, redundancy, performance, and ease of maintenance.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary (cont.)  Explained that a modular design, which separates the functions of a network, enables flexibility and facilitates implementation and management.  Discussed that the Cisco Enterprise Architecture modules are used to facilitate the design of large, scalable networks.  Identified the primary modules, including the Enterprise Campus, Enterprise Edge, Service Provider Edge, Enterprise Data Center, Enterprise Branch, and Enterprise Teleworker.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential