Chapter 1: Introduction To Scaling Networks
Chapter 1: Introduction To Scaling Networks
Chapter 1: Introduction To Scaling Networks
to Scaling Networks
Scaling Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1
1.0 Introduction
1.1 Implementing a Network Design
1.2 Selecting Network Devices
1.3 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 1: Objectives
Describe the use of a hierarchical network for a small business.
Describe recommendations for designing a network that is scalable.
Describe the type of switches available for small-to-medium-sized
business networks.
Describe the type of routers available for small-to-medium-sized
business networks.
Configure and verify basic settings on a Cisco IOS device.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
1.1 Implementing a
Network Design
Scaling Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Hierarchical Network Design
Network Scaling Needs
As they grow and expand, all enterprise networks must:
Support critical applications
Support converged network traffic
Support diverse business needs
Provide centralized administrative control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Hierarchical Network Design
Enterprise Business Devices
To provide a high-reliability network, enterprise class equipment is
installed in the enterprise network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Hierarchical Network Design
Hierarchical Network Design
The network functionality is divided into three distinct layers.
1. Access Layer
- Responsible in providing a connection to the final users in a local
network.
2. Distribution Layer
- Forwards traffic from/to different local networks.
3. Core Layer
- A high speed backbone of the network between dispersed
network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Hierarchical Network Design
Hierarchical Network Design
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Hierarchical Network Design
Cisco Enterprise Architecture
The primary Cisco
Enterprise Architecture
modules include:
Enterprise Campus
Enterprise Edge
Service Provider Edge
Remote
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Hierarchical Network Design
Cisco Enterprise Architecture
The primary Cisco Enterprise Architecture modules include:
Enterprise Campus
Compose of the entire campus infrastructure, to include the 3
layers such as access, distribution, and core layers.
Enterprise Edge
Compose of Internet, VPN, and WAN modules connecting the
enterprise with the service provider’s network.
Service Provider Edge
This provides Internet, Public Switched Telephone Network
(PSTN), and WAN services.
Remote
Responsible for connectivity of a number of different remote
functional elements, including enterprise branches, enterprise
data centers, and enterprise teleworkers.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Hierarchical Network Design
Failure Domains
Failure Domains are areas of a network that are impacted when a
critical device or network service experiences problems.
Redundant links and enterprise class equipment minimize
disruption of network.
Smaller failure domains reduce the impact of a failure on company
productivity.
Smaller failure domains also simplify troubleshooting.
Switch block deployment – each switch block acts independently of
the others. Failure of a single device does not impact the whole
network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Expanding the Network
Designing for Scalability
Use expandable, modular equipment or clustered devices.
Include design modules that can be added, upgraded, and
modified, without affecting the design of the other functional
areas of the network.
Create a hierarchical addressing scheme.
Use routers or multilayer switches to limit broadcasts and filter
traffic.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Expanding the Network
Planning for Redundancy
Installing duplicate equipment
Providing redundant paths
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Expanding the Network
Increasing Bandwidth
Link aggregation increases the amount of bandwidth between
devices by creating one logical link made up of several physical
links.
EtherChannel is a form of link aggregation used in switched
networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Expanding the Network
Expanding the Access Layer
Access layer connectivity can be extended through wireless
connectivity.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Expanding the Network
Fine-Tuning Routing Protocols
OSPF works well for large, hierarchical networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
1.2 Selecting Network
Devices
Scaling Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Switch Hardware
Switch Platforms
Select form factor:
Fixed
Modular
Stackable
Non-stackable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Switch Hardware
Port Density
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Switch Hardware
Forwarding Rates
The processing capabilities of a switch are rated by how much data
the switch can process per second.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Switch Hardware
Power over Ethernet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Switch Hardware
Multilayer Switching
Deployed in the core and distribution layers of an organization’s
switched network.
Can build a routing table, support a few routing protocols, and
forward IP packets.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Router Hardware
Router Requirements
Role of routers:
Interconnect multiple sites
Provide redundant paths
Connect ISPs
Translate between media
types and protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Router Hardware
Cisco Routers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Router Hardware
Router Hardware
Fixed configuration – Built-in interfaces.
Modular – Slots allow different interfaces to be added.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Managing Devices
Managing IOS Files and Licensing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Managing Devices
In-Band vs. Out-of-Band Management
In-Band requires, at least, one interface to be connected and
operational and use of Telnet, SSH, or HTTP to access device.
Out-of-Band requires direct connection to console or AUX port
and Terminal Emulation client to access device.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Managing Devices
Basic Router CLI commands
Basic router configuration
includes:
Hostname
Passwords (console,
Telnet/SSH, and privileged
mode)
Interface IP addresses
Enabling a routing protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Managing Devices
Basic Router show Commands
show ip protocols – Displays information about routing
protocol configured.
show ip route – Displays routing table information.
show ip ospf neighbor – Displays information about OSPF
neighbors.
show ip interfaces – Displays detailed information about
interfaces.
show ip interface brief – Displays all interfaces with IP
addressing , interface, and line protocol status.
show cdp neighbors – Displays information about all directly
connected Cisco devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Managing Devices
Basic Switch CLI Commands
Hostname
Passwords
In-Band access requires
the Switch to have an IP
address (assigned to VLAN
1).
Save configuration – copy
running-config
startup-
config command.
To clear switch – erase
startup-config, and
then reload.
To erase VLAN information
– delete
flash:vlan.dat.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Managing Devices
Basic Switch Show Commands
show port-security – Displays any ports with security
enabled.
show port-security address – Displays all secure MAC
addresses.
show interfaces – Displays detailed information about
interfaces.
show mac-address-table – Displays all MAC addresses the
switch has learned.
show cdp neighbors – Displays all directly connected Cisco
devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
1.3 Summary
Scaling Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Chapter 1: Summary
This chapter:
Introduces the hierarchical network design model that divides
network functionality into the access layer, the distribution layer, and
the core layer.
Describes how the Cisco Enterprise Architecture further divides the
network into functional components called modules.
Defines how routers and multilayer switches are used to limit failure
domains.
Explains that a good network design includes a scalable IP scheme,
fast converging and scalable routing protocols, appropriate Layer 2
protocols and devices that are modular or easily upgraded.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Chapter 1: Summary (cont.)
Identifies that a mission-critical server should have a connection to
two different access layer switches. It should also have redundant
modules and backup power.
Recognizes that routers and switches should be selected from the
appropriate categories to meet the network’s requirements.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35