Module 001 Introduction To Scaling Networks PDF
Module 001 Introduction To Scaling Networks PDF
1
Week 1: Introduction to Scaling Networks
Introduction
As today’s business grows and so with the technology requirements, this means this goes with the
networking requirements. Todays businesses rely heavily on the network infrastructure on both
internet and corporate network to provide mission-critical services. Network down events can result in
lost revenue and lost customers even in a little amount of time.
● A computer network designed to cater and capable to support the needs for growth is called scalable.
● First thing to do in properly design network. The traffic must be controlled and organized so that it
doesn't unnecessarily propagate through the network at the cost of bandwitdth.
● We can achieve this goal through a hierarchical design: Access, Distribution, Core. Each layer has a
specific function.
● The Core Layer is a high speed backbone of the network between dispersed network.
● Usually user traffic starts at the access layer and it's not passed to the upper layer unless their
functionality is required.
● In smaller enteprise networks or corporate network such as stores or small offices, Core and
distribution Layers can be combined into a single one, reducing cost and complexity.
Figure 1-1
IT213 – Data Communications and Networking 3 (Cisco 3)
3
Week 1: Introduction to Scaling Networks
Even though the hierarchical model has three layers, some smaller network setup might implement a
two-tier hierarchical design. In a two-tier hierarchical design, the core and distribution layers are
collapsed combined into one layer, reducing cost and complexity, as shown in Figure 1-2.
Fig 1-2
● The Enteprise Campus includes Access, Distribution and Core Layers. The entire enterprise
infrastructure belongs to this module.
● For Access Layer,L2/L3 switches provides port density and links/trunks to the distribution layer of
the building.
● The Distribution layer aggregates these links/trunks with L3 devices that provides routing, access
control and QoS.
● The Core Layer provides high speed connectivity between distribution layer modules and the
Enterprise Edge modules.
Figure 1-3
The Cisco Enterprise Architecture divides the network into functional components while still
maintaining the core, distribution, and access layers. As shown above in Figure 1-3, the primary
Cisco Enterprise Architecture modules compose of:
A. Enterprise Campus
B. Enterprise Edge
C. Service Provider Edge
D. Remote
IT213 – Data Communications and Networking 3 (Cisco 3)
5
Week 1: Introduction to Scaling Networks
Enterprise Campus
The Enterprise Campus compose of the entire campus infrastructure, to include the 3 layers such as
access, distribution, and core layers. The access layer module contains Layer 2 or Layer 3 switches
to provide the required port density. Implementation of VLANs and trunk links to the building
distribution layer occurs here. Redundancy to the building distribution switches is important. The
distribution layer module aggregates building access using Layer 3 devices. Routing, access control,
and QoS are performed at this distribution layer module. The core layer module provides high-speed
interconnectivity between the distribution layer modules, data center server farms, and the enterprise
edge. Where fast convergence, fault tolerance and redundancy are the main focus of the design in
this module.
In addition to these modules, the Enterprise Campus can include other submodules such as
Server Farm and Data Center Module: This section provides high-speed connectivity and
protection for servers. It is critical to provide redundancy, fault tolerance and security as well.
The network management systems monitor performance by monitoring device and network
availability.
Services Module: This section provides access to all services, such as IP Telephony
services, wireless controller services, and unified services.
Enterprise Edge
The Enterprise Edge compose of Internet, VPN, and WAN modules connecting the enterprise with
the service provider’s network. This said module extends the enterprise services to remote sites and
enables the enterprise to use Internet and partner resources. It gives QoS, policy reinforcement,
service levels, and security.
The Service Provider Edge provides Internet, Public Switched Telephone Network (PSTN), and
WAN services.
All data that enters or exits the Enterprise Composite Network Model (ECNM) passes through an
edge device.This is the area where all packets can be examined and a decision made whether the
packet should be allowed on the enterprise network.Intrusion detection systems(IDS) and intrusion
prevention systems (IPS) can also be configured at the enterprise edge to protect against malicious
activity.
● These submodules provided network monitoring and unified control of services such as wireless
controlling or telephony services.
● The Enterprise Edge includes modules that connect the enterprise to remote resources through the
service provider network: Internet connectivity, VPN tunnels and WAN.
● The Service Provider Edge provides services through a service provider such as internet
connection and phone lines.
● Each of these services has a corresponding edge device in the Enterprise Edge that examines all
packet and decides whether it should be allowed on the enterprise network.
Failure Domains
● A failure domain is the area of the network that is impacted by a problem or failure.
● The impact of a failure domain is determined by the functionality provided by the faulty device.
● If in case a problem occurs, smaller failure domains reduce the impact of the problem to the whole
network, and it simplify repair and thus decrease downtime.
● Reducing of down events in the core layer is expensive, so designer concentrate on prevention
such as redundancy and failovers. Making sure network errors affect a smaller area in the distribution
layer is easier.
● Distribution device (L3 switches or routers) are usually deployed in pair, with access devices evenly
distributed. This is called a switch block. Switch blocks act independently of the others.
IT213 – Data Communications and Networking 3 (Cisco 3)
7
Week 1: Introduction to Scaling Networks
Failure Domains
Figure 1-4
● Think about an IPv4 or IPv6 addressing strategy that will accomodate future users
● Use routers and L3 switches to limit broadcast and filter traffic to the core.
● Use redundant links between network devices. Link aggregation (such as Cisco's EtherChannel)
methods increase bandwidth without more expensive media channels and reduce downtime.
● Using scalable routing protocol that minimizes the size of the routing table.
Redundant paths offer alternate physical paths for data to traverse the network. Redundant paths in a
switched network support high availability. However,redundant paths in a switched Ethernet network
can cause logical Layer 2 loops. For this reason, Spanning Tree Protocol (STP) must be
implemented.
STP allows for the redundancy required for reliability but eliminates the switching loops. It does this
by providing a mechanism for disabling redundant paths in a switched network until the path is
necessary, such as when failures occur. STP is an open standard protocol, used in a switched
environment to create a loop-free logical topology.
IT213 – Data Communications and Networking 3 (Cisco 3)
9
Week 1: Introduction to Scaling Networks
Increasing Bandwidth
Bandwidth demand continues to grow as users increasingly access video content and migrate to IP
phones. An EtherChannel implementation can add more bandwidth capacity to a connection.
Implementing EtherChannel
In hierarchical network design, some links between access and distribution switches might need to
process a greater amount of traffic than other links. As traffic from multiple links converges onto a
single, outgoing link, it is possible for that link to become a bottleneck. Using Link
aggregation allows an administrator to increase the amount of bandwidth between devices by
creating one logical link made up of several physical links. EtherChannel is a form of link aggregation
used in switched networks, as shown below in Figure 1-6.
EtherChannel
● Multiple traffic links between access and distribution switches will need to converge in a single
outgoing link that could becomen a bottleneck.
● It is possible to tie multiple physical links together in a single logical one, increasing the available
bandwidth. This is called link aggregation.
● EtherChannel is a Cisco protocol that use ports of the existing switches to create a logical
EtherChannel interface.
● All configuration is done on the EtherChannel interface, ensuring consistency between ports.
● EtherChannel implementations can do load balancing between the links that are part of the
EtherChannel interface, using several methods.
Data Communications and Networking 3 (Cisco 3)
IT213 – Data Communications and Networking 3 (Cisco 3)
10
Week 1: Introduction to Scaling Networks
Wireless Connectivity
● Wireless connectivity is crucial in expanding a network, because it increases flexibility without
excessive costs.
1. Types of devices
2. Coverage
3. Interference
4. Security
5. Speed and protocols
Enterprise networks and ISPs often use more advanced protocols, such as link-state protocols,
because of their hierarchical design and ability to scale for large networks.
Link-state routing protocols such as Open Shortest Path First (OSPF), as shown below, this work
well for larger hierarchical networks, where fast convergence is necessary.
OSPF routers establish and maintain neighbor adjacency or adjacencies with other connected OSPF
routers. When routers initiate an adjacency with neighbors, an exchange of link-state updates begins.
Routers reach a FULL state of adjacency when they have synchronized views on their link-state
database. With OSPF, link-state updates are sent when network changes occur.
Additionally, OSPF supports a two-layer hierarchical design, or multiarea OSPF, as shown in Figure
1-9.
All OSPF networks begin with Area 0, also called the backbone area. As the network is expanded,
other nonbackbone areas can be created. All nonbackbone areas must directly connect to area 0.
Chapter 6, “Multiarea OSPF,” introduces the benefits, operation, and configuration of multiarea
OSPF.
Another popular routing protocol for larger networks is Enhanced Interior Gateway Routing
Protocol (EIGRP). Cisco developed EIGRP as a proprietary distance vector routing protocol with
enhanced capabilities. Although configuring EIGRP is relatively simple, the underlying features and
options of EIGRP are extensive and robust. For example, EIGRP uses multiple tables to manage the
routing process using Protocol Dependent Modules (PDM).
EIGRP contains many features that are not found in any other routing protocols. It is an excellent
choice for large, multiprotocol networks that employ primarily Cisco devices.
Switch Platforms
Cisco has 5 categories for enterprise switches: Campus LAN switches, Cloud-Managed switches,
Data Center switches, Service Provider switches, and Virtual Networking switches.
For switches that are mounted in racks, thickness is important. It is measured in rack units(RU).
These are the most commons parameters that need to be evaluated when choosing a switch solution:
cost, port density, power specifications, reliability, port speed, frame buffers, scalability.
Campus LAN Switches: To scale network performance in an enterprise LAN, there are core,
distribution, access, and compact switches. These switch platforms vary from fanless switches
with eight fixed ports to 13-blade switches supporting hundreds of ports. Campus LAN switch
platforms include the Cisco 2960, 3560, 3750, 3850, 4500, 6500, and 6800 Series.
Cloud-Managed Switches: The Cisco Meraki cloud-managed access switches enable virtual
stacking of switches. They monitor and configure thousands of switch ports over the web,
without the intervention of onsite IT staff.
Data Center Switches: A data center should be built based on switches that promote
infrastructure scalability, operational continuity, and transport flexibility. The data center switch
platforms include the Cisco Nexus Series switches and the Cisco Catalyst 6500 Series
switches.
IT213 – Data Communications and Networking 3 (Cisco 3)
13
Week 1: Introduction to Scaling Networks
Service Provider Switches: Service provider switches fall under two categories: aggregation
switches and Ethernet access switches. Aggregation switches are carrier-grade Ethernet
switches that aggregate traffic at the edge of a network. Service provider Ethernet access
switches feature application intelligence, unified services, virtualization, integrated security,
and simplified management.
Virtual Networking: Networks are becoming increasingly virtualized. Cisco Nexus virtual
networking switch platforms provide secure multitenant services by adding virtualization
intelligence technology to the data center network.
When selecting switches, network administrators must determine the switch form factors. This
includes the fixed configuration shown in Figure 1-11, the modular configuration shown in Figure
1-12, the stackable configuration shown in Figure 1-13, or the nonstackable configuration.
The height of the switch, which is expressed in the number of rack units, is also important for
switches that are mounted in a rack. For example, the fixed configuration switches shown in Figure 1-
13 are all one rack unit (1U) high.
In addition to these considerations, the following list highlights other common business considerations
when selecting switch equipment:
Cost: The cost of a switch will depend on the number and speed of the interfaces, supported
features, and expansion capability.
Port Density: Network switches must support the appropriate number of devices on the
network.
IT213 – Data Communications and Networking 3 (Cisco 3)
15
Week 1: Introduction to Scaling Networks
Power: It is now common to power access points, IP phones, and even compact switches
using Power over Ethernet (PoE). In addition to PoE considerations, some chassis-based
switches support redundant power supplies.
Reliability: The switch should provide continuous access to the network.
Port Speed: The speed of the network connection is of primary concern to end users.
Frame Buffers: The ability of the switch to store frames is important in a network where there
might be congested ports to servers or other areas of the network.
Scalability: The number of users on a network typically grows over time this means the switch should
provide the opportunity for growth.
Port Density
● Port density is the number of port available on a single switch.High-port density switches allow
better use of space and power.Consider a single 48-ports vs dual 24-ports switches, than scale the
advantages to networks made of 1000+ end devices.Modular switches can support extremely high
port density through multiple expansion cards. Catalyst 6500 switches can support more than 1000
ports. Link aggregation reduces available ports, something less of an impact with modular switches.
Forwarding Rates
Forwarding rates define the processing capabilities of a switch by rating how much data the switch
can process per second. Switch product lines are classified by forwarding rates, as shown in Figure
1-15.
Entry-level switches have lower forwarding rates than enterprise-level switches. Forwarding rates are
important to consider when selecting a switch. If the switch forwarding rate is too low, it cannot
accommodate full wire-speed communication across all of its switch ports. Wire speed is the data
rate that each Ethernet port on the switch is capable of attaining. Data rates can be 100 Mb/s, 1 Gb/s,
10 Gb/s, or 100 Gb/s.
Such as, a typical 48-port gigabit switch operating at full wire speed generates 48 Gb/s of traffic. If the
switch only supports a forwarding rate of 32 Gb/s, it cannot run at full wire speed across all ports
simultaneously. Fortunately, access layer switches typically do not need to operate at full wire speed,
because they are physically limited by their uplinks to the distribution layer. This means that less
expensive, lower-performing switches can be used at the access layer, and more expensive, higher-
performing switches can be used at the distribution and core layers, where the forwarding rate has a
greater impact on network performance.
PoE allows more flexibility when installing wireless access points and IP phones, allowing them to be
installed anywhere that there is an Ethernet cable. A network administrator should ensure that the
PoE features are required, because switches that support PoE are expensive.
The relatively new Cisco Catalyst 2960-C and 3560-C Series compact switches support PoE pass-
through, as shown in Figure 1-17.
PoE pass-through allows a network administrator to power PoE devices connected to the switch, as
well as the switch itself, by drawing power from certain upstream switches.
Multilayer Switching
Multilayer switches are often deployed in the core and distribution layers of an organization’s
switched network. Multilayer switches are characterized by their ability to build a routing table,
support a few routing protocols, and forward IP packets at a rate close to that of Layer 2 forwarding.
Multilayer switches often support specialized hardware, such as application-specific integrated
circuits (ASIC). ASICs, along with dedicated software data structures, can streamline the forwarding
of IP packets independent of the CPU.
Before switches were first used in networks, none of them supported routing; now, almost all switches
support routing. It is likely that soon all switches will incorporate a route processor because the cost
of doing so is decreasing relative to other constraints. Eventually the term multilayer switch will be
redundant.
As shown in Figure 1-18, the Catalyst 2960 switches illustrate the migration to a pure Layer 3
environment.
With IOS versions prior to 15.x, these switches supported only one active switched virtual interface
(SVI). The Catalyst 2960 also supports multiple active SVIs. This means that the switch can be
remotely accessed through multiple IP addresses on distinct networks.
Router Requirements
Routing is an essential component of the distrubution layer. Without a routing process packets cannot
leave the LAN.
IT213 – Data Communications and Networking 3 (Cisco 3)
19
Week 1: Introduction to Scaling Networks
Router Hardware
Routers also come in many form factors, as shown in Figure 1-19. Network administrators in an
enterprise environment should be able to support a variety of routers, from a small desktop router to a
rack-mounted or blade model.
Routers can also be categorized as fixed configuration or modular. With the fixed configuration, the
desired router interfaces are built in. Modular routers come with multiple slots that allow a network
administrator to change the interfaces on the router. As an example, a Cisco 1841 router comes with
two Fast Ethernet RJ-45 interfaces built in and two slots that can accommodate many different
network interface modules. Routers come with a variety of different interfaces, such as Fast Ethernet,
Gigabit Ethernet, Serial, and Fiber-Optic.
Managing Devices
Cisco Routers and switches comes with Cisco IOS Software. Network administrators are responsible
for managing these devices. This includes initial configuration, verification, and troubleshooting tasks
as well as maintaining up-to-date images and backing up the configuration files.
When selecting or upgrading a Cisco IOS device, it is important to choose the proper IOS image with
the correct feature set and version. IOS refers to the package of routing, switching, security, and
other internetworking technologies integrated into a single multitasking operating system. When a
new device is shipped, it comes preinstalled with the software image and the corresponding
permanent licenses for the customer-specified packages and features.
For routers, beginning with Cisco IOS Software Release 15.0, Cisco modified the process to enable
new technologies within the IOS feature sets, as shown in Figure 1-21.
● Cisco has a single operating system, IOS, for most of their products.
● IOS comes in many versions, and for a single version it has many different images with different
feature sets.
● This feature sets are customizable by the user when a product is purchased.
● A new device is shipped with an image pre-installed that corresponds to the customer-specified
packages, and with a permanent license for it.
In-band management is used to monitor and make configuration changes to a network device over a
network connection. Configuration using in-band management requires
Example 1-2 shows the results of the configuration commands that were entered in Example 1-1. To
clear the router configuration, use the erase startup-config or erase start command and then
the reload command.
show ip protocols: As shown in Example 1-3, this command displays information about the
routing protocols configured. If OSPF is configured, this includes the OSPF process ID, the
router ID, networks the router is advertising, the neighbors the router is receiving updates from,
and the default administrative distance, which is 110 for OSPF.
show ip route: As shown below in Example 1-4, this command displays routing table
information, including routing codes, known networks, administrative distance and metrics,
how routes were learned, next hop, static routes, and default routes.
show ip ospf neighbor: This command displays as shown in Example 1-5 about OSPF
neighbors that have been learned, including the Router ID of the neighbor, the priority, the
state (Full = adjacency has been formed), the IP address, and the local interface that learned
of the neighbor.
show interfaces This command displays interfaces with line (protocol) status, bandwidth,
delay, reliability, encapsulation, duplex, and I/O statistics as shown in Example 1-6. If specified
without a specific interface designation, all interfaces will be displayed. If a specific interface is
specified after the command, information about that interface only will be displayed.
show ip interfaces: As shown in Example 1-7, this command displays interface information,
including protocol status, IP address, whether a helper address is configured, and whether an
ACL is enabled on the interface. If specified without a specific interface designation, all
interfaces will be displayed. If a specific interface is specified after the command as shown in
Example 1-7, information about that interface only will be displayed.
show ip interface brief: This command displays all interfaces with IP addressing information
and interface and line protocol status. As shown in Example 1-8.
show protocols: This command displays information about the routed protocol that is
enabled and the protocol status of interfaces. As shown in Example 1-9.
Other connectivity-related commands include the show cdp neighbors command shown in Example
1-10.
This command displays information on directly connected devices, including Device ID, local interface
that the device is connected to, capability (R = router, S = switch), platform, and Port ID of the remote
device. The details option includes IP addressing information and the IOS version.
Switch# enable
Switch# configure terminal
Switch(config)# hostname S1
S1(config)# enable secret class
S1(config)# line con 0
S1(config-line)# password cisco123
S1(config-line)# login
S1(config-line)# line vty 0 4
S1(config-line)# password cisco123
S1(config-line)# login
S1(config-line)# service password-encryption
S1(config)# banner motd $ Authorized Access Only! $
S1(config)# interface vlan 1
S1(config-if)# ip address 192.168.100.5 255.255.255.0
IT213 – Data Communications and Networking 3 (Cisco 3)
31
Week 1: Introduction to Scaling Networks
S1(config-if)# no shutdown
S1(config-if)# ip default-gateway 192.168.100.1
S1(config)# interface fa0/2
S1(config-if)# switchport mode access
S1(config-if)# switchport port-security
S1(config-if)# end
S1# copy running-config startup-config
Example 1-12 shows the results of the configuration commands that were entered in Example 1-11.
login
line vty 0 4
password 7 1511021F0725
login
line vty 5 15
login
!
end
Verify and save the switch configuration using the copy running-config startup-config command.
To clear the switch configuration, use the erase startup-config command and then
the reload command. It might also be necessary to erase any VLAN information using the delete
flash:vlan.dat command. When switch configurations are in place, view the configurations using
the show running-config command.
Switches make use of common IOS commands for configuration, to check for connectivity, and to
display current switch status. Below are some examples.
show port-security interface: Displays any ports with security activated. To examine a
specific interface, include the interface ID, as shown in Example 1-13. Information included in
the output: the maximum addresses allowed, current count, security violation count, and action
to be taken.
show port-security address: This command displays all secure MAC addresses configured
on all switch interfaces as shown in Example 1-14.
show interfaces: As shown in Example 1-15, this command displays one or all interfaces with
line (protocol) status, bandwidth, delay, reliability, encapsulation, duplex, and I/O statistics.
show mac-address-table: This command displays all MAC addresses that the switch has
learned, how those addresses were learned (dynamic/static), the port number, and the VLAN
assigned to the port. As shown in Example 1-16.
Like the router, the switch also supports the show cdp neighbors command.
The same in-band and out-of-band management techniques that apply to routers also apply to switch
configuration.
http://ptgmedia.pearsoncmg.com/images/9781587133442/samplepages/158713344X.pdf 04/23/2017
https://hlcs.it/files/HCNA_ReS/3/Modulo%203%20Chapter%201%20-
%20Introduction%20To%20Scaling%20Networks.pdf 04/24/2017