Cisco Discovery 4 Module 4 Picture Descriptions 4.0 ? Chapter introduction 4.0.1 ? Introduction Slideshow Slide 1 text ?The success of a network upgrade depends on meeting the goals of the network user.? Slide 2 text ?End users view the performance of the network based on their use of the application and services the network provides.? Slide 3 text ?Network designers need to take into account characteristics of the applications the new network must support.? Slide 4 text ?Quality of service, performance and availability must be designed into the network to support advanced technology applications, such as voice and video.? Slide 5 text ?Upon successful completing this chapter, you will be able to: * Explain how the characteristics of various applications affect the design of the network. * Describe the network requirements of various common applications including voice and video. * Explain the need for Quality of Service to support converged networking, and methods to implement it in the network design. * Diagram the various application traffic flows to determine where bandwidth is needed and where potential bottlenecks exist.? 4.1 ? Characterizing Network Applications 4.1.1 ? The Importance of Application Performance 2 Diagrams Diagram 1, Image The diagram depicts a man at a ticket vending machine purchasing a ticket. Diagram 2, Image The diagram depicts several images of men and women in various types of IT derived activity. The first is a man on a Cellular phone talking with his hands free kit to someone located somewhere else in his town or country. The second image is a security officer monitoring two surveillance screens that may form part of a monitored security application in a retail business. The third image is a security camera pointing out into the open environment monitoring the surroundings and relaying the image back to the control room. 4.1.2 ? Characteristics of Different Application Categories. 3 Diagrams Diagram 1, Image The diagram depicts a computer connected to a VOIP phone which is then connected to a switch on the boundary of the cloud. Inside the cloud is a layer 2/3 distribution switch. Another switch is located on the boundary of the cloud and this is connected to a VOIP phone and a single desktop computer. There are four radio buttons located below the image and they indicate the following: Client-Client: Typically client-client applications include the following: IP Telephony: Two peers establish communication with the help of a telephone manager workstation, however, the conversation occurs directly between the two peers when the connection is established. Videoconference systems ? This application is similar to IP telephony, however, the network requirements for this type of application are usually higher, particularly handwidth consumption and QoS requirements. Client-Distribution Server: Typically client-distributed server applications include the following: Servers and users are located in the same virtual LAN (VLAN). Department administrators manage and control the servers. The majority of department traffic occurs in the same segment but some traffic passes to different segments. The diagram depicts a three segmented areas named, ?Management Services?, ?Team Support? and ?Vendor Services.? Each department segment is joined to the layer 2/3 distribution switch. Client-Server Farm: Typically client-server farm applications include the following: Organizational mail servers (such as Lotus Notes and Microsoft Exchange) Common file servers (such as Novell, Microsoft and Sun) Common database servers for organizational applications (such as Sybase, Oracle and IBM) The diagram depicts three servers named, Application server, Active Directory Server and DHCP/DNS server all directly connected to two switches. The two switches are in turn connected to two layer 2/3 distribution switches which are also linked to the Stadium switch. The two layer 2/3 distribution switches are linked to a central distribution switch and then directly connected to a switch which has three computers directly connected to it. Client-Enterprise Edge: Typically client-enterprise edge applications include the following: Applications installed on the Enterprise Edge can be crucial to organizational process flow, therefore, any outages can increase costs. Typically Enterprise Edge applications are based on web technologies. Some examples of these application types are external mail servers and public web servers. Organizations that support e-commerce applications also place their e-commerce servers into the Enterprise Edge. Client traffic to the internet goes out the Enterprise Edge with less bandwidth than traffic to the local servers. Diagram 2, Image The diagram depicts the outputs for the NBAR (Network Based Application Recognition) and NetFlow are Cisco IOS tools that provide a set of services for IP applications. The printouts are available by entering the following commands at the Router#: - show ip nbar protocol-discovery interface FastEthernet 6/0 - show ip cache flow To view an animation on the functions of Netflow, follow the link below. http://cisco.com/go/netflow Diagram 3, Hands on Lab 4.1.3 ? How Traffic Flow Affects Network Design 2 Diagrams Diagram 1, Image The diagram depicts four small networks linked to an edge router that is then in turn linked to the ISP router and then out onto the Internet. There are two radio buttons at the bottom of the page labeled Internal Traffic and External Traffic. With the Internal Traffic button selected, a speech bubble appears saying, ?Internal traffic: I am a file being sent to the file server. I am internal traffic.? A message is sent from one of the hosts in one of the networks to the e-commerce server located on a different network segment but still within the confines of the business network. The External Traffic button is selected and the speech bubble appears saying, ?External Traffic: I am an email being sent to another network via the Internet. I am external traffic.? The message originates on one of the networks connected to the Internet. While traversing the Internet, the correct network is found to match the destination address listed in the email header. The message moves from the external network to the internal network and onto the correct host. Diagram 2, Activity Identify internal and external traffic. Match the traffic to the appropriate traffic type, Internal or External. Traffic A. Email to Remote office B. File transfer to a Local Server C. Local System Backup D. Internal Email E. Emergency Services (Fire/Police) F. Web Sports and News 4.1.4 ? How Application Characteristics Affect Network Design 2 Diagrams Diagram 1, Image The diagram depicts the Internet cloud directly connected by serial link to three routers named: ISP1: 192.168.2.254 VPN over DSL ? ISP2: 192.168.4.1/24 ISP3: 192.168.5.1/24 ISP2 and ISP3 have switches directly connected to the routers and a server on each connection. The ISP1 router links to a backbone segment that has the Stadium Management switch 192.168.2.4, the Team Switch 192.168.2.2, Edge Router 192.168.2.1, the Vendor switch 192.168.2.5 and the Luxury Suites Switch 192.168.2.3 all on the backbone network segment. Also part of this back-bone segment is the Stadium LAN Devices, Web DHCP and E-Commerce and Accounting, Payroll Accounting and Team Services Devices, Vendor Services Devices that includes Accounting and last but not least the Luxury Suites Devices. Detailed information about the devices used in this diagram are listed below: Switch: The switches forward traffic based the physical address of the destination device. While the processing time may be short, it is still a delay that must be considered. Router: Routers take time to filter and forward traffic. This processing time adds delays that could interfere with time sensitive applications such as streaming video. Cabling: Cabling must support the required bandwidth of the application traffic. Otherwise the network can experience a significant reduction in throughput. Diagram 2, Activity Which of the following communications are considered the main types of application communications? A. Client-to-Client B. Client-to-Access Point C. Client-to-Server Farm D. Client-to-Enterprise Edge E. Client-to-Switch 4.2 ? Explaining Common Network Applications 4.2.1 ? Transaction Processing 4 Diagrams Diagram 1, Image The diagram depicts a Transaction Process Example and in this case it Is an example of Purchasing a Ticket Online. The process is listed below from top to bottom: Customer Query The customer accesses the online catalog to see if there are tickets available. Online Catalog Simply viewing the catalog is a transaction that places traffic on the stadium network by accessing the database stored on a server. Order for tickets The customer places an order based on what was viewed in the catalog Customer order transaction If tickets are available, the database will begin to process the transaction Tickets processed The database verifies the number of tickets, costs and prepares the tickets for delivery Ticket database updated The database is updated to ensure proper accountability of available tickets and to accurately support future orders for the remaining tickets. Tickets delivered The tickets are shipped to the client or delivered as online tickets that can be printed later. Diagram 2, Image The diagram depicts a woman sitting at her desktop computer with a link to the network cloud and then a link to the server. Listed below this diagram are the four words, Atomic, Consistent, Isolated and Durable. The key ideas for each word are listed below: Atomic: A customer that purchases tickets online expects the payment to be received and the tickets to be mailed or made available for printing. The database is updated so those tickets are no longer for sale. Consistent: If the customer cancels the transaction before it is completed, the customer account is not debited and the database still shows the tickets are available for sale. Isolated: The customer must be assured that his or her transactions are secure. For example, the customer?s financial details are not visible to other users. Durable: The record of the transaction must be retained even after a system failure so the tickets are available to the customer and the account is debited correctly. Diagram 3, Image The diagram depicts three servers all linked to two switches and the two switches are each individually linked a router. The information pertaining to servers, switches and routers is listed below. Servers If one server fails, another is there to handle customer requests. Switches (Links) If the link to one switch fails, the link to the second switch is still available. Routers Router redundancy can help to ensure that application transactions received from external traffic can be handled in the event of a router or route failure. Diagram 4, Image The diagram depicts an image the server farm all linked to two switches. One of the switches is linked to a layer 2/3 distribution switch and then onto a router which has a firewall active and is the port used to access the WAN. Still located within the server farm environment is another switch which is linked to both the layer 2/3 distribution switches. Connected ot the second layer 2/3 distribution switch is another router with a firewall active and a link to the WAN. Both router?s have the access lists above deployed: Access-list 101 deny ip any host 171.16.23.1 fragments Access-list 101 permit tcp any host 171.16.23.1 eq 80 Access-list 101 deny ip any any 4,2,2 ? Real Time Streaming and Voice 3 Diagrams Diagram 1, Image There are three different images to this diagram, the first is of a man working in front of several screens and he may work in a multitude of different environments. The second is a woman working in a business environment with a speakerphone call In progress on her Cisco VoIP phone. The third image is of a group of people in a board room environment conversing and communicating with each other and those located all over the world with internet conferencing hardware. Diagram 2, Image The diagram depicts three images, the first is two Cisco switches rack mounted in a MDF and with blue Cat 5 Straight Through cables connected to the switches. The second image is of the range of Cisco VoIP phones that can be purchased for the enterprise environment. The third image is of a Cisco Unified Communications 500 Series device that supports several different types of media. Diagram 3, Image The diagram depicts an image of people at a social gathering enjoying themselves while they converse and communicate. It appears that the gathering is being videoed so that the footage can be streamed on the Internet. 4.2.3 ? File Transfer and Email 4 Diagrams Diagram 1, Image The diagram depicts a man sitting at his desktop computer and he is defined as the FTP Client. Also depicted in this diagram is the FTP server which is linked by a TPC data connection in both directions from the client to the server and back again. The flow diagram associated to both the client and the server are as follows: FTP Client User FTP Process Client User Interface User Protocol Interpreter User Data Transfer Process Client File System FTP Server Server FTP Process Server Protocol Interpreter Server Data Transfer Process Server File System Diagram 2, Image The diagram depicts a defined area in which is housed three dedicated email servers which are all directly linked to two switches. Both the switches are directly connected to a layer 2/3 distribution switch on either switch. Diagram 3, Image The diagram depicts a defined area in which there is housed three servers named the File Server, the Mail Server and the Web Server. Each of these servers is directly connected to two switches in a mesh type configuration. The two switches are directly connected to a layer 2/3 distribution switch, ne for each switch. Diagram 4, Hands on Lab The diagram depicts the launch window for the hands on lab named, ?Analyzing Network Traffic.? The lab can be downloaded from the Cisco website in accessible format. 4.2.4 ? HTTP and Web Traffic 2 Diagrams Diagram 1, Image The diagram depicts an image of a man working on his laptop computer. Diagram 2, Image The diagram depicts an image of the Internet cloud which has ISP 1 router directly connected. The link between the ISP 1 router and the boundary routers has a CSU/DSU module in place. The boundary routers have firewalls active and also by implementing ACL?s on these routers. The two boundary routers have been named Edge1 and Edge2 and are both directly connected by mesh topology to two layer 2/3 distribution switches. 4.2.5 ? Microsoft Domain Services 2 Diagrams Diagram 1, Image The diagram depicts four servers named, DNS server, File Server and Mail server as well as a redundant storage server. These four servers are connected by mesh topology to two layer 2/3 distribution switches which also have a CSU/DSU connected to one distribution switch, and a secure dial in connection connected to the other distribution switch. All of these devices are encapsulated in the data centre work area. On the outside of this work area is two other layer 2/3 distribution switches which link to the data centre. Diagram 2, Activity The network administrator received a call from the help desk. None of the network users at the stadium can currently login to the local Microsoft Domain nor access information on the shared network drives. The network administrator makes a list of possible causes for this problem. From the list below, choose which statements best list the possible causes. Statements A. The firewall is denying UDP port 25 traffic to the server farm B. The firewall is denying UDP port 53 traffic to the server farm C. Microsoft service ports are being denied at the router connecting to the Internet D. No Microsoft DNS server is configured for the users. E. DHCP is not giving the correct Microsoft DNS server address to the users. F. The ISP does not have the correct Microsoft DNS server address. 4.3 ? Introducing Quality of Service (QoS) 4.3.1 ? What is Quality of Service and Why is it Needed? 2 Diagrams Diagram 1, Image The diagram depicts an information bit stream that undergoes filtering based on the types defined below: Classification Data from different applications moving toward output router interface Pre-queuing Data classified based on application, such as voice traffic, video traffic, FTP traffic and so on. Red items in the bit stream represent unwanted traffic being filtered from the group. Queuing and Scheduling Traffic is placed into queues based on preconfigured priority. Traffic in the higher priority queues (eg P1, P2) is sent before lower priority traffic (eg, P5 and P6). Example, Voice traffic does not tolerate delays so it is placed into the highest priority queue and sent first. Diagram 2, Image The diagram depicts a bit stream of information flowing toward a router interface. The queue has been broken down into four parts, these are, Priority Queue, Queue 1, Queue 2 through to Queue X. The bit stream has been defined as being made up of Voice Traffic, SMTP traffic and FTP traffic. Since video streaming is on demand, the video traffic is given the higher priority and is pushed to the higher priority queue. The SMTP traffic is pushed to queue 1 and the FTP traffic is pushed to queue 2. The information is then de-queued with the video traffic leaving the interface first then the SMTP traffic and lastly the FTP traffic. 4.3.2 ? Traffic Queues 2 Diagrams Diagram 1, Image The diagram depicts priority queuing which has four queues, the high-priority queue us always emptied first. The flow of information is as follows, traffic sent to the router without any priority. Voice----> High Priority SMTP---> Medium Priority FTP---->Normal Priority Instant Messaging---->Low Priority Traffic sent to backbone in order of priority----> Backbone network Diagram 2, Image The diagram depicts two queues forming at the stadium entrance to a major event. Priority tickets has a short queue and they already have the relevant requirements to gain entry to the event. The general admission queue is lengthy and congested as the people waiting in this queue are waiting for the required informational requirements to gain entry to the event. 4.3.3 ? Priorities and Traffic Management 3 Diagrams Diagram 1, Image The diagram depicts four examples of Traffic Priorities for Students. These are listed below: High Priority Packets Sent with highest preference treatment, such as replies to an instant message about plans fort he weekend that should be decided immediately. Medium Priority Packet Sent with some preferential treatment, such as a response to a text message for coordinating a group homework project that is due in three days. Normal Priority Packet Sent with regular treatment such as responding to a voice message from a parent about a potential present for a birthday party next week for a friend. Low Priority Packet Sent with best effort means, such as responding to an email request from a brother about lending camping supplies for a trip in a few weeks. Diagram 2, Image The diagram depicts the Cisco AutoQoS ? Automating the Critical Elements of QoS Deployment. The pie chart is broken down in the following way: Five Parts Consistency Application Classification Policy Generation Configuration Monitoring and Reporting Centre Bulls Eye Critical Elements of QoS Deployment Diagram 3, Hands on Lab The diagram depicts the launch window for the hands on lab named, ?Prioritizing Traffic.? The lab can be downloaded in accessible format from the Cisco website. 4.3.4 ? Where Can QoS Be Implemented 2 Diagrams Diagram 1, Image The diagram depicts two switches with two computers directly connected to each switch. The switches and the computers make up the L2 Access Switching area and become part of the Classification and Marking Process. The L2 switches are directly connected to two layer 3 switches which are then in turn directly connected to two layer 3 backbone switches. Diagram 2, Hands on Lab The diagram depicts the hands on lab named, ?Exploring Network QoS.? This lab can be downloaded in accessible format from the Cisco website. 4.4 ? Examining Voice and Video Options 4.4.1 ? Converged Network Considerations 1 Diagram Diagram 1, Image The diagram depicts a typical converged network with the following boxes linked and leading towards the IP network bubble. The bubble headings and the contents of the bubbles are listed below: Real-Time Traffic - Voice over IP (VoIP) - Videoconferencing Transactional Traffic - Order processing and billing - Inventory and shipping - Accounting and Reporting Streaming Traffic - Video on Demand - Movies Web Content - Browsing - Shopping Bulk Traffic - Email - Data Backups - Print Files 4.4.2 ? Requirements of an IP Telephony Solution Five Diagrams Diagram 1, Image The diagram depicts an IP cloud with several communication devices connected to it. These devices are listed below: MCU Supports conference for audio and video calls. Cisco Unified Video-Conferencing 3515 MCU is an example of an MCU. Application Server Voice Gateway ? PSTN Devices such as voice enabled routers, that connect a traditional PSTN or analog phone to an IP network. The gateway converts between analog voice and IP packets. Software Telephone Software application installed on a PC or laptop that supports voice calls. Cisco IP communicator is an example Video Endpoint Device that provides video to end users. IP Phone Telephone that supports voice calls over an IP network. An example is Cisco Unified IP Phone 7940G. Call Agent Control devices that process calls and administer gateways. The Call Agent performs the functions of a PBX in a traditional phone system. Two examples are the Cisco Unified Communications Manager and the Cisco Unified Communications Manager Express. Diagram 2, Image The diagram depicts the phones and computers on Separate VLANs. The first VLAN has been named Data VLAN=10 and Voice VLAN=110 and the switch as the boundary for each of the these four VLAN?s. The four switches that are acting as boundary switches for the each VLAN are directly connected to Distribution switches. The other three VLAN?s are named as follows: Voice VLAN=110, Data VLAN=11 Voice VLAN-132, Data VLAN=32 Voice VLAN=131, Data VLAN=31 Accurate calculations of power requirements are critical for an effective IP telephony solution. IP phones are best implemented with Power over Ethernet (PoE). Power can be supplied to the IP phones directly from Cisco Catalyst switches with inline power capabilities, or by inserting a Cisco Catalysr Inline Patch Panel. Calculate power based on the network rather than the device. Diagram 3, Image The diagram depicts 3 Telephony Options with the topologies for these options listed below: The first is the PSTN cloud directly connected to a PBX with three traditional telephones directly connected. The second is a WAN cloud with a Voice router directly connected. Connected directly to this router is the PBX and three VoIP phones. The last is the WAN cloud with a IP Telephony Router connected. Directly connected to this router is a switch and connected to the switch are three IP telephones. Diagram 4, Image The diagram depicts two network situations, these being ?Separate Voice and Data Networks? and ?IP Telephony Network.? Both network situations are described in further detail below. Separate Voice and Data Networks The diagram depicts three locations linked by a router and an IP connection between the three routers in each location. Situated in the centre of the cluster of locations is the PSTN cloud the sits on the boundary of each of the location clouds. At the boundary of each location is PBX module that links the voice communications network. Linked to the PBX?s are the traditional telephones in each location. The three PBX?s that make up the PSTN are linked to each other by voice trunks. IP Telephony Network There are two clouds linked by two routers sitting on the boundary of each cloud. The clouds have been named, ?Enterprise Campus? and ?Remote Location.? The enterprise campus consists of a Voice Mail module, a Cisco Unified Communications Manager linked to the network segment. Also on this segment is a switch with an IP Telephone and a computer connected. Also directly connected to the network segment is an IP telephone and a computer. The switch connects directly to the router that sits on the boundary of the network Enterprise Campus cloud. This router connects to the router sitting on the boundary of the remote location. Connected to the remote location router is a switch and directly connected to the switch are two IP telephones and a two computers. Both routers are voice enabled routers and they have links by voice trunks to the PSTN network. Diagram 5, Activity Identify the features of traditional telephone systems, and IP telephone systems. System 1. Traditional Phone 2. VoIP 3. IP Telephony Statements A. Uses PBX for call control B. Converts voice signals to IP traffic at voice enabled routers. C. Converts voice signals to IP traffic at the phone D. Depends on physical cable infrastructure for phone addressing E. Uses a server such as Cisco Unified Communications Manager for call control and signaling F. Voice traffic uses the corporate WAN G. Integrated voice and data over the IP network H. Connects to the PSTN 4.4.3 ? Video ? Live and On-Demand 2 Diagrams Diagram 1, Image The diagram depicts three images with different types of streaming video and audio. The first is the Video On-Demand with the ability to stream video to your desktop of display device from the internet with dedicated bandwidth for the transmission. The other two images are of situations like the boardroom or the office where video streaming for live presentation, and audio communication through IP telephones make it effective to use the Internet as a communications medium. Diagram 2, Activity Choose which scenarios are VoD and which are streaming video. Statement A. The video data packets are unicast to the user. B. The data packets are multicast to the user. C. The video can be stored for later viewing by the user D. The can be viewed as it is delivered to the user E. The live streaming of video data packets are prioritized by the network 4.4.4 ? Supporting Remote Workers with Voice and Video 3 Diagrams Diagram 1, Image The diagram depicts four clouds and they are named, ISP, POTS or Wireless, DSL and Frame Relay. These four clouds are directly linked to the Central Site. Connected to the Frame Relay and DSL cloud is the Branch Office. Connected directly to the DSL cloud is Telework site which houses its own router. Connected to the POTS or Wireless cloud is Mobile User. The network depicted in the diagram has a Frame Relay connection as the primary link and a DSL connection as a backup. Telecommuters may also require access to the branch office through various different connection types. Therefore, the branch office routers need the capability to support a variety of WAN connections. Diagram 2, Image The diagram depicts a man sitting in the open environment working on his laptop. The man Is working on the internet using his wireless internet access card. Diagram 3, Hands on Lab 4.5 ? Documenting Applications and Traffic Flow 4.5.1 ? What is Traffic Flow Four Diagrams Diagram 1, Image The diagram depicts three horizontal layers, the core layer, the distribution layer and the Access layer. The diagram is also split vertically into three layers, these are the Data Centre, the Distribution Edge and the Enterprise Edge. The devices at each layer are as follows: Core Layer/Data Center Four servers with connections to two switches in mesh topology configuration. The two switches are directly connected to two layer 2/3 distribution switches. Core Layer/Distribution Edge One layer 2/3 distribution switch. Core Layer/Enterprise Edge One firewalled router and this has a serial link to the internet cloud. Distribution Layer/Data Centre Two layer 2/3 distribution switches. Distribution Layer/Distribution Edge One layer 2/3 distribution switch. Distribution Layer/Enterprise Edge One fire-walled router with serial links to the internet cloud and the frame relay cloud. Access Layer/Data Center The four switches are labeled Stadium Management LAN, Team Services LAN, Vendor services LAN and both these LAN?s have IP telephones connected and computers making up the LAN. Access Layer/Distribution Edge A unified communications module connected to the PSTN cloud. A remote worker is sitting at the edge of this cloud. Access Layer/Enterprise Edge One distribution switch. Connected to the Frame Relay cloud are two routers. Connected to these two routers is a switch and a DSL enabled router. The two switches indicate that the Ticket Sales Branch and the Souvenir shop house each of these networks respectively. Diagram 2, Table The diagram depicts an image of a table, the information contained in this table is referenced below: Application Type Internal email Application Outlook Priority High Comments Application Type External email Application Outlook Priority Normal Comments Application Type Voice Networking Application IP Telephony Priority High Comments Company introducing IP phones as a replacement for basic telephones. Application Type Web browsing Application Internet Explorer Priority Low Comments Application Type Video on Demand Application IP/TV Priority High Comments Wireless video will be available throughout the stadium Application Type Database Application Priority High Comments Servers are located around the network Application Type Customer Support Applications Application Application list for stadium Priority High Comments Diagram 3, Image The diagram depicts the Internet cloud connected by serial link to router R1. Router R1?s other serial link is connected to the WAN cloud. Router R1?s fast Ethernet port is connected to distribution switch S1. S1 is directly connected to an access point and switch s2. The access point has a single wireless client attached. Switch S2 has the client H1 and a server connected. On the far side of the WAN cloud is the serial link to router R2. R2 has one of it?s fast Ethernet ports in use and connected to the distribution switch S3. Directly connected to S3 are switches S4 and S5. Connected to S4 are clients H2 and H3. Directly connected to S5 are clients H4 and H5. There are three scenario?s listed below and they show the outcomes of packet release onto the network from source to destination. LAN The flash file shows a packet traveling from client H2 through switch S3 to client H5. The packet is then re-sent by H5 back through switch S3 to client H2. WAN The flash file shows a packet traveling from H2 through switch S4 then through distribution switch S3 to Router R2. The packet then traverses the WAN to router R1. R1 forwards the packet to distribution switch S1. S1 then forwards the packet to switch S2. S2 forwards the packet to the destination server that is directly connected. The packet travels the same path in reverse back to the source. EXTERNAL Client H3 sends a message out through switch S4. The message is then passed on to a distribution switch S3 who then forwards it to router R2. R2 passes the message to the greater WAN which it is directly connected by a serial link. On the far side of the WAN there is a serial link to router R1. The message passes from the WAN to Router R1 who then forwards it out it?s other serial interface onto the internet. The message follows the same path on return to the source from the destination. Diagram 4, Hands on Lab 4.5.2 ? Diagramming Internal (Intranet) Traffic Flows 2 Diagrams Diagram 1, Image The diagram depicts a complex network topology situation with two messages traversing the network at defined locations. The first message is on an Ethernet link between a switch and a router. The information attached to this message is as follows: Traffic that originates inside the internal network can be easily characterized. The impact is then measured b he designer to calculate the impact on the network. The second message Is traversing a serial link on another part of the network. The message has this information attached: Traffic that originates outside of the network is extremely difficult to characterize and requires the designer to estimate its impact on the internal network. Diagram 2, Hands on Lab 4.5.3 ? Diagramming Traffic Flow To and From Remote Sites 2 Diagrams Diagram 1, Image The diagram depicts three network segments with traffic on two serial links to two routers. There is a fast Ethernet link to another network where traffic is flooding the ISP and the Edge router. The other messages that are flowing over the network are through a VPN connection to ISP 2 then through to the Ticket Sales Office. There is a information bubble pointing to ISP 1 router and the Edge Router, the text in this bubble is listed below: As traffic flows from remote sites to the stadium network, bottlenecks can occur at the ISP router and the Edge Router causing traffic delays. ACL?s can attribute to the delays as well. Diagram 2, Hands on Lab 4.5.4 ? Diagramming External Traffic Flows 2 Diagrams Diagram 1, Image The diagram depicts an image of an Internet cloud directly connected by serial link to ISP router 1. ISP 1 is directly connected to Edge Router 1 and Edge Router 2. Both these routers are connected to layer 2/3 distribution switches. The two layer 2/3 distribution switches are then directly connected to two other layer 2/3 distribution switches which then connect to an access point, four servers and a Unified Communications Manager module. There is a information bubble that contains the following information: Internet traffic flows that originate from outside the internal network enter the network through the router. Once the traffic enters, it becomes part of the internal network traffic flow. Diagram 2, Hands on Lab 4.5.5 ? Diagramming External Traffic Flows 2 Diagrams Diagram 1, Image The diagram depicts two serial links to the internet cloud. The first serial link is between the internet cloud and ISP 1 router. This router has an access point and two Edge routers named Edge1 and Edge2. These two routers are connected to two layer 2/3 distribution switches. The Edge2 router is connected by serial link to the Frame Relay cloud. The second serial link is from the internet cloud to the ISP2 router. Connected to the ISP2 router is the Ticket Sales Office switch which is also housing ISP 3. Another Boundary router named BR2 is directly connected to the Frame Relay cloud by serial link. The ticket sales office has a server housed at its location. Diagram 2, Hands on lab The diagram depicts the launch window for the hands on lab named, ?Diagramming Extranet traffic Flow.? The lab is available for download from the Cisco website in accessible format. 4.6 ? Chapter Summary 4.6.1 ? Summary 5 Slide Markers Slide Marker 1, Summary Text Summary Information: - End users evaluate the performance of the network based on the availability and responsiveness of their applications. - The measurement of application performance should combine user satisfaction with normal technical metrics, such as throughput on the network, or the number of successful transactions. - There are four main types of network applications communication patterns: - Client to Client - Client to Distribution Server - Client to server farm - Client to Enterprise Edge - The first step in characterizing applications on an existing network Is to gather information through a number of methods, including input from the customer staff, the results of a network audit and an analysis of the network traffic. Slide Marker 2, Summary Text Summary Information - The choice of hardware installed in the network can affect the performance of the applications. - Hardware delays can be caused by the processing time that the device takes to filter and forward the traffic. - Delays can be caused by devices that do not have enough processing power or memory to handle the traffic loads generated by modern applications. - The top-down approach adapts the design of the physical infrastructure to the needs of the network applications. - When adding a new application, the network designer needs to consider the impact on the performance of existing applications. Slide Marker 3, Summary Text Summary Information - Application traffic types and the mix of applications on the network determine the bandwidth and throughput requirements of the network design. - Common network application categories include: - Transaction processing applications - Real-time streaming and voice applications - File transfer and email applications - HTTP and web applications - Microsoft domain services - Transaction processing requires the network to provide high availability, fast response times and secure transmission methods. - In order to produce high quality output, streaming and IP telephony applications cannot tolerate delays. These applications prevent unique requirements to the network designer. - Real-time transport protocol (RTP) and real-time transport control protocol (RTCP) are two protocols that support applications that have delay-sensitive delivery requirements. Slide Marker 4, Summary Text Summary Information - File transfer and email applications use large packet sizes and can put high volumes of traffic on the network at unpredictable intervals. This traffic can interfere with the delivery of delay-sensitive applications like voice and video. - Reliability and availability are more important for file transfer and email applications than sensitivity to traffic delays. - Security and reliability are the primary concerns in a network supporting high volume web traffic. Active Directory requires DNS services to be active on the Microsoft domain controllers and a number of specific TCP and UDP ports to be open between the servers and clients. Slide Marker 5, Summary Text Summary Information - The primary goal of QoS is to provide priority, including dedicated bandwidth, controlled jitter and latency, and reduced packet loss. - QoS does not actually create more bandwidth, QoS uses traffic queues to manage bandwidth use to support the applications, such as IP telephony, that are the most sensitive to delays. - There are three basic steps to ensure that traffic is properly prioritized: Step 1: Identify Traffic Requirements Step 2: Define Traffic Classes Step 3: Define QoS Policies - When designing a network to support IP telephony, there are a number of ner components that must be considered. These include the phones, IP gateways and call control units. - Voice over IP (VoIP) services can be used on voice enabled routers to convert traditional voice traffic to IP packets for transmitting over WAN connections. This can be done to eliminate long distance call charges for calls between branch locations. - IP telephony replaces standard telephones with IP phones that immediately convert voice traffic to IP packets. These systems use call control units, such as Cisco Unified Communications Manager, to set up and route calls between phones. - Live streaming video and video-on-demand have different traffic requirements. Broadcast video may be multicast as it happens, while video-on-demand is usually unicast on request.