Thursday, October 1, 2015

Predictable Network Model

Predictable Network Model

Ideally, you should design a network with a predictable behavior in mind to offer low maintenance and high availability. For example, a campus network needs to recover from failures and topology changes quickly and in a predetermined manner. You should scale the network to easily support future expansions and upgrades. With a wide variety of multiprotocol and multicast traffic, the network should be capable of efficiently connecting users with the resources they need, regardless of location.

In other words, design the network around traffic flows rather than a particular type of traffic. Ideally, the network should be arranged so that all end users are located at a
consistent distance from the resources they need to use. If one user at one corner of the network passes through two switches to reach an email server, any other user at any other location in the network should also require two switch hops for email service.

Cisco has refined a hierarchical approach to network design that enables network designers to organize the network into distinct layers of devices. The resulting network is efficient, intelligent, scalable, and easily managed.

Figure 1-4 can be redrawn to emphasize the hierarchy that is emerging. In Figure 1-5 , two layers become apparent: the access layer, where switches are placed closest to the end users; and the distribution layer, where access layer switches are aggregated. 


Figure 1-5 Two-Layer Network Hierarchy Emerges

As the network continues to grow with more buildings, more floors, and larger groups of users, the number of access switches increases. As a result, the number of distribution switches increases. Now things have scaled to the point where the distribution switches need to be aggregated. This is done by adding a third layer to the hierarchy, the core layer , as shown in Figure 1-6 . 


Figure 1-6 Core Layer Emerges

Traffic flows in a campus network can be classified as three types, based on where the network service or resource is located in relation to the end user. Figure 1-7 illustrates the flow types between a PC and some file servers, along with three different paths the traffic might take through the three layers of a network. Table 1-2 also lists the types and the extent of the campus network that is crossed going from any user to the service. 


Figure 1-7 Traffic Flow Paths Through a Network Hierarchy

Table 1-2 Types of Network Services 


Notice how easily the traffic paths can be described. Regardless of where the user is located, the traffic path always begins at the access layer and progresses into the distribution and perhaps into the core layers. Even a path between two users at opposite ends of the network becomes a consistent and predictable access > distribution > core > distribution > access layer.

Each layer has attributes that provide both physical and logical network functions at the appropriate point in the campus network. Understanding each layer and its functions or limitations is important to properly apply the layer in the design process.

Access Layer

The access layer exists where the end users are connected to the network. Access switches usually provide Layer 2 (VLAN) connectivity between users. Devices in this layer,
sometimes called building access switches, should have the following capabilities:
  • Low cost per switch port
  • High port density
  • Scalable uplinks to higher layers
  • High availability
  • Ability to converge network services (that is, data, voice, video)
  • Security features and quality of service (QoS)

Distribution Layer
The distribution layer provides interconnection between the campus network’s access and core layers. Devices in this layer, sometimes called building distribution switches ,
should have the following capabilities:

  • Aggregation of multiple access layer switches
  • High Layer 3 routing throughput for packet handling
  • Security and policy-based connectivity functions
  • QoS features
  • Scalable and redundant high-speed links to the core and access layers

In the distribution layer, uplinks from all access layer devices are aggregated, or come together. The distribution layer switches must be capable of processing the total volume of traffic from all the connected devices. These switches should have a high port density of high-speed links to support the collection of access layer switches.

VLANs and broadcast domains converge at the distribution layer, requiring routing, filtering, and security. The switches at this layer also must be capable of routing packets with high throughput.  Notice that the distribution layer usually is a Layer 3 boundary, where routing meets the VLANs of the access layer.

Core Layer
A campus network’s core layer provides connectivity between all distribution layer devices. The core, sometimes referred to as the backbone, must be capable of switching traffic as efficiently as possible. Core switches should have the following attributes:
  • Very high Layer 3 routing throughput
  • No costly or unnecessary packet manipulations (access lists, packet filtering)
  • Redundancy and resilience for high availability
  • Advanced QoS functions
Devices in a campus network’s core layer or backbone should be optimized for high-performance switching. Because the core layer must handle large amounts of campus-wide data, the core layer should be designed with simplicity and efficiency in mind.

Although campus network design is presented as a three-layer approach (access, distribution, and core layers), the hierarchy can be collapsed or simplified in certain cases. For example, small or medium-size campus networks might not have the size or volume requirements that would require the functions of all three layers. In that case, you could combine the distribution and core layers for simplicity and cost savings. When the distribution and core layers are combined into a single layer of switches, a collapsed core network results.

3 comments:

  1. Realexamdumps.com has elaborated all exam topics with adequate description in Cisco 300-115 real exam dumps. I am thankful to the whole team of experts who are working behind the scene. They have arranged information in very expertly manner. It didn’t take much time to cover the whole syllabus. All the questions in Cisco 300-115 dumps were fully valid and authentic. I was surprised to see the same questions in the final test which helped me to easily solve all the questions. My suggestions for all the candidates of this IT certification are to use Cisco 300-115 real exam dumps.

    ReplyDelete
  2. I could not have achieved so good grades without 300-115 dumps. It became possible only with the help of this short study material that I passed my exam by the first attempt. I feel pleasure sharing such an amazing experience with all so that you can also take help from 300-115 dumps.

    ReplyDelete
  3. I think it would be helpful for others if I share my success story with 300-115 Study Material 300-115 Study Material. Format of this guide was so reader-friendly. When I downloaded this compact study guide I became optimistic and hopeful for my success in the final exam. Dumps4Download brought my dreamt certification to me that I wanted and this became possible with 300-115 study dumps.

    ReplyDelete