Cisco Discovery 3 ? Module 1 Picture Descriptions Module 1.0 - Networking in the Enterprise 1.0 - Chapter Introduction 1.0.1 - Introduction Single Diagram Diagram 1, Animation This animation shows contains five slides, which contain the following text: Enterprise networks provide application and resource support to local and remote users anywhere and at any time. Intranets and extranets form the structure of a large enterprise network. Internal and external traffic patterns affect security and network performance. Advanced security and networking technology supports telecommuters so they can work productively away from the office. After completion of this course you should be able to: * Describe an enterprise. * Identify traffic flows through an enterprise and describe the importance of an intranet and extranet. * Describe the different types and handling of traffic in the enterprise. * Define the role and importance of a telecommuter. * Describe the function and importance of VPNs. 1.1 ? Describing the Enterprise Network 1.1.1 ? Supporting the Business Enterprise 2 Diagrams Diagram 1, Animation The diagram depicts a small single location company. The concept being communicated by this animation is that of a small business expanding, first with a connection to the Internet and then the establishment of a branch network in the same city. Branches open in 2 additional cities and are connected back to the head office via the Internet. Home users (teleworkers) are added and finally an international office is connected. The NOC is shown as centralized in the head office. Diagram 2, Image The diagram depicts redundant connections in a network . Multiple hosts are connected to switches, the switches also have connections between them. The same switches are connected to routers that, in turn, connect to the Internet. A redundant link is between the 2 routers Hosts on separate networks have speech bubbles stating ?I have a redundant route to the Internet? 1.1.2 ? Traffic Flow in the Enterprise Network 4 Diagrams Diagram 1, Image The diagram depicts the three layers of hierarchical design model. The access layer contains three switches and connected to these switches are 8 computers, 5 IP telephones, 1 server and a network printer. The distribution layer consists of 3 routers, switch, Web server, DNS server and an email server. The core layer has the high speed concentrator links to the internet cloud. The hierarchical design model layers are defined below: Access Layer - Provides a connection point for end-user devices to the network - Allows multiple hosts to connect to other hosts through a network device such as a switch - Exists on the same logical network -Forwards traffic to other hosts on the same logical network - Passes traffic to the Distribution Layer for delivery if the message is destined for a host on another network Distribution Layer - Provides a connection point for separate local networks - Controls the flow of information between local networks - Ensures that traffic between hosts on the same local network stays local - Passes on traffic that is destined for other networks - Filters incoming and outgoing traffic for security and traffic management purposes - Contains more powerful switches and routers than the Access Layer - Passes data to the Core Layer for delivery to a remote network if the local network is not directly connected Core Layer - provides a high-speed Backbone layer with redundant (backup) connections - Transports large amounts of data between multiple end networks - includes very powerful high-speed switches and routers. Diagram 2, Image The diagram depicts the Cisco Enterprise Architecture with three sub-blocks labeled Enterprise Campus, Enterprise Edge, WAN and Internet and two smaller blocks named Enterprise Branch and Tele-worker. The component breakdown for each of these blocks is as follows: Cisco Enterprise Architectures Enterprise Campus Building Access ? two layer 3 switches This Access Layer module contains Layer 2 or Layer 3 switches to provide the required port density. Implementation of VLANs and trunk links to Building Distribution layer occurs here. Redundancy to Building Distribution switches is important. Building Distribution ? two layer 2/3 distribution switches This Distribution Layer module aggregates building access using Layer 3 devices. Routing, access control, and QoS are performed at this layer. It is critical to provide redundancy in this area. Campus Core ? two layer 2/3 distribution switches, directly connected with multiple links. This Core Layer module provides high-speed interconnectivity between Distribution Layer modules, data center server farms, and the Enterprise Edge. Redundancy, fast convergence, and fault tolerance are the focus of the design in this area. Server Farm and Data Center ? two servers and a single computer, Network Management takes place here. This module provides high-speed connectivity and protection for servers. It is critical to provide security, redundancy, and fault tolerance in this area. Management - This critical area monitors performance by monitoring device and network availabilit Enterprise Edge Enterprise Edge - This module extends the enterprise services to remote sites and enables the enterprise to use Internet and partner resources. It provides QoS, policy enforcement, service levels, and security. E-Commerce ? one departmental server and router Internet Connectivity ? one departmental server and router WAN and Metro Ethernet Site-to-Site VPN ? one router Remote Access and VPN ? one bridge and one switch WAN and Internet ISP A ? defined as multiple networking devices ISP B ? defined as multiple networking devices Frame Relay /ATM/Metro Ethernet ? defined as multiple networking devices PSTN ? defined as multiple networking devices Enterprise Connection Enterprise Branch ? one layer 2/3 distribution switch Enterprise Tele-worker ? one desktop computer Diagram 3, Activity The concept being communicated in this diagram is the impact of failure domains. An edge router connects to the Internet and to 2 switches. Switch 1 has a small network attached. Switch 2 has 1 hub and 1 switch attached, each of these have several computers attached.˙ If the router fails, the entire network fails. If switch 1 fails only its network fails.˙ If switch 2 fails both the networks attached fail If the hub or switch 3 fails only˙their˙networks fail. Diagram 4, Packet Tracer Lab 1.1.3 ? Enterprise LAN?s and WAN?s 3 Diagrams Diagram 1, Image The diagram depicts the cloud which has been labeled the ?Public WAN? and has four links extending out of it. The first link has an ISP connected that is located in North America. The second link is to an ISP located in Europe. The third link is to a private LAN located in South America Diagram 2, Image The diagram depicts two buildings named Paris and Hong Kong. Paris has the following network hardware a CSU/DSU that connects directly to the boundary router located inside Paris. Directly connected to router R1 is a is a small switched LAN. The CSU/DSU forms the link to the WAN, which can use a myriad of protocols to connect to the Hong Kong business. The common protocols implemented are HDLC, PPP, Frame Relay and ATM. The CSU/DSU at the Hong Kong business location receives the transmission from the Paris business and forwards it to the relevant client located within its premises. Diagram 3, Activity Match the terms to the correct definition of either LAN or WAN technology 1. Frame Relay 2. 100Mb UTP 3. T1/E1 4. Services provided by ISP 5. Access Layer 6. POP 7. Services provided by enterprise 8. Ethernet 9. Distribution Layer switches 10. CSU/DSU 11. ATM 1.1.4 ? Intranets and Extranets 2 Diagrams 1 Diagram, Image The diagram depicts a map of the world with people spread out over large distances. The people are all connected to each other by the communications medium that is the internet. This is known as a large Enterprise Intranet and employee?s access the intranet from around the world. Diagram 2, Image The diagram depicts Company ABC that is connected to two suppliers that are geographically separated around the world. The two partners and the two customers are also connected to Company ABC and this is defined as a Large Enterprise Extranet. Preferred external suppliers and customers with approved access to the company intranet. Module 1.2 - Identifying Enterprise Applications 1.2.1 - Traffic Flow Patterns Two Diagrams Diagram 1, Animation Traffic Flow Patterns The animation depicts a LAN and WAN implementation. When a packet is sent to the local network (LAN) it only travels through the local Switch(es) and to the destination. When a packet is sent to a user on another network (WAN) it is routed through the Sending and Receiving Routers. External trafficc is sent to the Internet via the edge routers. Diagram 2, Activity Traffic Flow Patterns Identify the flow pattern for each type of traffic. If the traffic has more than one flow pattern select pattern with highest coverage. Flow Patterns ? LAN, WAN, External Traffic type 1. Company Email 2. File Sharing 3. Off-site Data Backup and Recovery 4. Internal Backup and Restore Operations 5. System Update 6. Printing 7. On-line Transaction Processing 8. Internet Traffic 9. VPN 10. Intra-campus Voice 1.2.2 - Applications and Traffic on an Enterprise Network Three Diagrams Diagram 1, Image Applications and Traffic on an Enterprise Network The picture depicts people working in a call centre environment. There is a caption, which says ?New technologies support voice and data on a converged network?. Diagram 2, Image Applications and Traffic on an Enterprise Network The picture depicts a screen capture of Packet Sniffer Application window, The window is showing packet transmission information. The packets information relates to the in and out layers of the OSI Reference Model. Diagram 3, Hands on Lab 1.2.3 - Network Traffic Prioritization Three Diagrams Diagram 1, Image Diagram depicts an environment (airport) with differing types of traffic being generated. FTP or Email Traffic - High volume sustained data traffic; tolerates delays Online or Transaction Delays - Sporadic and bursty; tolerates delays Mobile Voice Traffic - Sporadic conversation; delays cause interrupted or dropped conversations VoIP Traffic - Requires uninterrupted stream of data; does not tolerate delays Video Traffic - High volume uninterrupted video traffic; does not tolerate delays Diagram 2, Animation Network Traffic Prioritization The animation depicts the queuing process, as data from different applications travel toward an interface. Classification Data from different applications moving toward output router interface. Press Play to continue the animation. Pre-Queuing Data classified based on application, such as voice traffic, video traffic, FTP traffic, and so on. Red items represent unwanted traffic being filtered from the group. Press Play to continue the animation. Queuing and Scheduling Traffic is placed into queues based on preconfigured priority. Traffic in the higher priority queues (ex. P1, P2) is sent before lower priority traffic (ex. P5, P6). Example: Voice traffic does not tolerate delays so it is placed into the highest priority queue and sent first. After the above stages the packets are sent one at a time in order of priority.. Diagram 3, Activity Network Traffic Prioritization Match the term with its corresponding definition. Terms A: UDP B: QoS C: Jitter D: delay E: queue F: TCP G: voice H: Latency Definitions 1. Protocol used for time-sensitive traffic 2. Sorts traffic into queues 3. Variation in arrival time caused by network congestion 4. Same meaning as latency 5. Line of traffic ordered based on priority 6. Protocol that retransmits packets 7. Type of traffic that is time-sensitive 8. Time delay based on packets going through network devices 1.3 - Supporting Remote Workers 1.3.1- Teleworking Five Diagrams Diagram 1, Image Office building with a sign in front of it that says: FOR LEASE RETAIL/OFFICE PREMISES 144.25 sq m (1,553 sq ft) Diagram 2, Image A picture of a woman wearing a telephonists headset. She is working on her laptop from home. Diagram 3, Image This is a picture of a Teleworker working on a laptop outside. The picture is surrounded by a number of graphics as follows: Email Delivers a written message to a remote user for reply and response at a later point in time Chat Delivers a written message to a user in real time for reply and response immediately ftp Transfers files between computers telnet Connects and starts a terminal session on a remote device Application Sharing Allows multiple users to view the same application simultaneously VoIP Allows real time voice communications between users over the Internet Video Conferencing Allows users to communicate face-to-face over video with participants at multiple locations Diagram 4, Image This is a picture of a group of men and women sitting at a boardroom table. Diagram 5, Activity Identify scenarios appropriate for telecommuting. State Yes or No if the scenario represents a telecommuting opportunity. 1. Paula, Tyler, and Bobby are developing a new e-learning course. They all live in different cities and are very self-directed. (Yes or No) 2. Josh manages the IT Help desk at a small company. He is responsible for answering questions over the phone and for providing on-site hardware and software support for all company computers. (Yes or No) 3. Carlos is the receptionist at a small publishing company. He is responsible for answering the phones, completing correspondence as well as greeting walk-in customers. (Yes or No) 4. Tabitha has a company that developes interactive websites for real estate agents. She meets with her clients over the phone and uses collaboration software to show them her work. (Yes or No) 1.3.2 - Virtual Private Networks Two Diagrams Diagram 1, Image A picture of two buildings separated by two roads, one above ground and one in a tunnel. There is a car on the road and one in the tunnel bellow. The car above ground represents unencrypted traffic. The car below ground represents encrypted traffic. Diagram 2, Animation A simple 3-host network (Hi, H2 and H3) is connected to a router (R1) via a switch (S1). The router (R1) is connected to Router (R2) over the Internet. Router (R2) is connected to a host (H4). H2 sends an unencrypted packet to H4. The packet travels via S1 to R1 where it is encrypted and sent over the Internet to R2 where it is decrypted and forwarded to H4. More Information One of the most common encapsulation protocols for VPNs is IPSec which is short for IP Security IPSec is actually a suite of protocols that provide many services including: Data encryption Integrity validation Peer authentication Key management 1.4 ? Chapter Summary 1.4.1 ? Summary Four Slide Markers Slide Marker 1, Image The points listed outline the learning outcomes for this chapter: - A large business environment with many users and locations or many systems is referred to as an enterprise. - The enterprise network supports mission critical applications, network traffic, centralized control, and diverse business needs. - The Enterprise Network - Provides 99.99% uptime - Uses both LAN and WAN components - Utilizes many different types of technology - Makes uses of services of ISP?s - Carries many types of traffic, including voice, video and data Slide Marker 2, Image The diagram depicts the Cisco Enterprise Architecture with three sub-blocks labeled Enterprise Campus, Enterprise Edge, WAN and Internet and two smaller blocks named Enterprise Branch and Tele-worker. The component breakdown for each of these blocks is as follows: Cisco Enterprise Architectures Enterprise Campus Building Access ? two layer 3 switches This Access Layer module contains Layer 2 or Layer 3 switches to provide the required port density. Implementation of VLANs and trunk links to Building Distribution layer occurs here. Redundancy to Building Distribution switches is important. Building Distribution ? two layer 2/3 distribution switches This Distribution Layer module aggregates building access using Layer 3 devices. Routing, access control, and QoS are performed at this layer. It is critical to provide redundancy in this area. Campus Core ? two layer 2/3 distribution switches, directly connected with multiple links. This Core Layer module provides high-speed interconnectivity between Distribution Layer modules, data center server farms, and the Enterprise Edge. Redundancy, fast convergence, and fault tolerance are the focus of the design in this area. Server Farm and Data Center ? two servers and a single computer, Network Management takes place here. This module provides high-speed connectivity and protection for servers. It is critical to provide security, redundancy, and fault tolerance in this area. Management - This critical area monitors performance by monitoring device and network availabilit Enterprise Edge Enterprise Edge - This module extends the enterprise services to remote sites and enables the enterprise to use Internet and partner resources. It provides QoS, policy enforcement, service levels, and security. E-Commerce ? one departmental server and router Internet Connectivity ? one departmental server and router WAN and Metro Ethernet Site-to-Site VPN ? one router Remote Access and VPN ? one bridge and one switch WAN and Internet ISP A ? defined as multiple networking devices ISP B ? defined as multiple networking devices Frame Relay /ATM/Metro Ethernet ? defined as multiple networking devices PSTN ? defined as multiple networking devices Enterprise Connection Enterprise Branch ? one layer 2/3 distribution switch Enterprise Tele-worker ? one desktop computer The summary points for this slide marker are as follows: - Enterprise Campus: Consists of the campus infrastructure with server farms and network management. - Enterprise Edge: Consists of the Internet, VPN and WAN modules connecting the enterprise with the service providers networks. - Service Provider Edge: Provides Internet, Public Switched Telephone Network (PSTN), and WAN devices. - Failure Domain: Describe the devices impacted on a portion of a network when a key device or service experiences problems. Slide Marker 3, Image The diagram depicts a map of the world with people spread out over large distances. The people are all connected to each other by the communications medium that is the internet. This is known as a large Enterprise Intranet and employee?s access the intranet from around the world. The summary points for this slide marker are as follows: An intranet is a private network that utilizes TCP/IP and other services to provide private services for company employee?s. If vendors and customers, and other outside individuals access the intranet, it is known as an extranet. Confine network traffic only to the segment where it is required. Some traffic moves the enterprise WAN and other traffic moves external to the enterprise network. QoS allows some traffic to be given preferential treatment over other traffic, for example voice and video traffic over data traffic. Slide Marker 4, Image The summary points for this slide marker are as follows: Tele-working is the use of technology tor replace business travel. Tele-working has many advantages for the employer, employee and the environment As technology advances, the numbers of jobs suited for telecommuting are increasing Tele-workers use tools like email, chat, desktop and application sharing, FTP, Telnet, VOIP and video conferencing to make there jobs easier VPN?s address the security needs of tele-workers by creating an encrypted tunnel between the sites.