cts
_configuration_guide_chapter09186a00804435f1.htm
l
Content 1.2 Scalable Networks
1.2.5 Making the Network Efficient An efficient
network should not waste bandwidth, especially over costly WAN
links. To be efficient, routers should prevent unnecessary
traffic from traversing the WAN and minimize the size and
frequency of routing updates. Cisco IOS includes several
features designed to optimize a WAN connection: -
Access lists
- Route maps
- Compression over
WANs
- Route summarization
- Incremental
updates
Content 1.2 Scalable
Networks 1.2.6 Making the Network
Adaptable An adaptable network should be able to handle the
addition and coexistence of multiple routed and routing
protocols, including: - IPv4
- IPv6
-
Legacy protocols, such as IPX and AppleTalk
Content 1.2 Scalable Networks 1.2.7
Making the Network Accessible But Secure Accessible
networks let users connect easily over a variety of
technologies. Campus LAN users typically connect to routers at
the access layer through Ethernet. Remote users and sites may
have access to several types of WAN services. Cost and
geography play a significant role in determining what type of
WAN services an organization can deploy. Therefore, Cisco
routers support all major WAN connection types. As shown in
Figure , these services include all of the following:
- Circuit-switched networks that use dialup lines
-
Dedicated networks that use leased lines
-
Packet-switched networks
Dialup and dedicated
access: Cisco routers can be directly connected to basic
telephone service or digital services such as T1/E1. Dialup
links can be used for backup or remote sites that need
occasional WAN access, while dedicated leased lines provide a
high-speed, high-capacity WAN core between key sites.
Packet-switched: Cisco routers support Frame Relay,
X.25, Switched Multi-megabit Data Service (SMDS), and ATM. With
this variety of support, which WAN service, or combination of
WAN services, to deploy can be determined based on cost,
location, and need. Often, the easier it is for legitimate
remote users to access the network, the easier it is for
unauthorized users to break in. An access strategy must be
carefully planned so that resources, such as remote access
routers and servers, are secure. Network Access Control (NAC)
and Identity Based Network Services (IBNS) should be
implemented to ensure secure access. Web Links
Network Admission Control (NAC) Framework
http://www.cisco.com/en/US/netsol/ns617/
networking_solutions_sub_solution_home.html
Identity Based Networking Services Solution
http://www.cisco.com/en/US/netsol/ns340/
ns394/ns171/ns75/networking_solutions
_sub_solution_home.html
Content 1.3
Converged Networks 1.3.1 Traffic Conditions
in a Converged Network Converged networks with integrated
voice, video, and data contain various traffic patterns:
- Voice and video traffic, such as IP telephony, and video
broadcast and conferencing
- Voice applications traffic
generated by voice-related applications (such as contact
centers)
- Mission-critical traffic generated, for
example, by stock exchange applications
- Transactional
traffic generated by e-commerce applications
- Routing
update traffic from routing protocols like RIP, OSPF, EIGRP,
IS-IS, and Border Gateway Protocol (BGP)
- Network
management traffic
The diversity of the traffic mix
poses stringent requirements on the network in terms of
performance and security. The requirements significantly
differ, depending on the traffic type. For example, voice and
video require constant bandwidth and low delay and jitter,
while the transactional traffic requires high reliability and
security with relatively low bandwidth. Video traffic is
frequently carried as IP multicast traffic. Also, voice
applications, such as IP telephony, require high reliability
and availability because the user expectations for “dial tone”
in the IP network are exactly the same as in traditional phone
network. To meet the traffic requirements in the network, voice
and video traffic must be treated differently from other
traffic, such as web-based traffic. QoS mechanisms are
mandatory in converged networks. Security is a key issue not
only in fixed networks but also in wireless mobility, where
access to the network is possible virtually anywhere. Several
security strategies, such as device hardening with strict
access control and authentication, intrusion protection,
intrusion detection, traffic protection with encryption, and
others, can minimize or even totally remove network security
threats.
Content 1.3 Converged
Networks 1.3.2 Routing and Routing
Protocols The focus of this course is on selecting,
planning, implementing, tuning, and troubleshooting IP advanced
routing protocols. All the models and tools described
previously are important in the initial part of this
process—selecting and planning. The best practice is to use one
IP routing protocol throughout the enterprise, if possible. In
many cases, this practice is not possible, which will be
discussed in detail in another module. For example, BGP is a
factor in the corporate Internet and e-commerce modules if
multihoming to ISPs is implemented. For remote access and VPN
users, static routes are almost always used. Therefore, dealing
with multiple routing protocols is likely. The ECNM can assist
in determining where each routing protocol is implemented,
where the boundaries are, and how traffic flows are managed. It
is obvious that advanced IP routing protocols must be
implemented in all core networks to support high-availability
requirements. Less advanced routing protocols, such as RIP and
static routes, may exist at the access and distribution levels
within modules. Figure represents a simple comparison of three
IP routing protocols. The remainder of this course consists of
technical detail on each of these, as well as BGP, IP
multicast, and IP version 6 (IPv6).
Content 1.4
ITA Topology 1.4.1 Overview of the
International Travel Agency The labs in this course
reference the fictitious International Travel Agency (ITA),
which maintains a global data network. The ITA business
scenario provides a tangible, real-world application of the
concepts introduced in the labs. Use the diagram of the ITA WAN
topology in Figure to become familiar with the global location
of the company and its network.
Content 1.4 ITA
Topology 1.4.2 The ITA Logical Topology
Figure provides a logical view of the ITA network
topology.
Content 1.5 Overview of
Course Labs 1.5.1 Lab 1-0 TCL Script Reference
and Demonstration Lab Activity
Lab
Exercise: Lab 1-0 TCL Script Reference and Demonstration
- Learn to use TCL scripts to verify full
connectivity
- Identify causes of failures
Content Summary This module defined
scalability and provided examples of network design that enable
successful network expansion. It highlighted the network as the
platform and explained Cisco’s vision of the future with the
Intelligent Information Network (IIN) and the Service-Oriented