All Heading Design
All Heading Design
All Heading Design
Cisco Enterprise Composite Network Model: Enterprise Campus, Enterprise Edge, Service Provider Edge
Enterprise Campus: i. Campus Infrastructure module ii. Management module iii. Server module iv. Edge
Distribution module
STP Operation, STP Terminology, STP in LAN, STP States, STP Options, Rapid STP, VLAN- A Glance, VLAN
Membership, VLAN Trunk, VLAN and STP, PVST, MISTP
• Virtual Trunking Protocol • Multilayer Switching • Cisco Express Forwarding • Switching Security •
Switching Design consideration
VLAN Trunking Protocol-VTP, Switches in VTP : Server Mode Client Mode transparent Mode.
VTP pruning, Inter VLAN Routing: I. By using multiple physical interfaces, II. By using single physical
interfaces
MLS Components: MLS Route Processor (MLS-RP), MLS Switching Engine (MLS-SE), Multilayer Switching
Protocol (MLSP)
Switching Security: The two type of Switch securities are i. Catalyst native security , ii. Catalyst hardware
security
Catalyst native security: Catalyst native security-Built in Security, Catalyst switches – PVLAN, Catalyst
Hardware security, Switching Design Considerations, Cisco current campus design recommendations.
• Multilayer Switching
VLAN Trunking Protocol-VTP, Switches in VTP: Server Mode Client Mode transparent Mode.
VTP pruning, Inter VLAN Routing: i. By using multiple physical interfaces, II. By using single physical
interfaces
MLS Components: MLS Route Processor (MLS-RP), MLS Switching Engine (MLS-SE), Multilayer Switching
Protocol (MLSP)
Cisco Express Forwarding (CEF) Components: The Forwarding Information Base, Adjacency table, FIB,
Adjacency Table
Catalyst switches – PVLAN, Catalyst Hardware security, Switching Design Considerations, Cisco current
campus design recommendations.
IP Addressing Introduction
• IP Multicast
IPv4 Address Design: – Determining the required number of IP Addresses – Private and Public IP Address
• Private IP and Public IP- Meaning. • NAT – Subnet Mask for Routing • How routers use subnet mask •
Determining the subnet mask to use – Hierarchical IP address design
NAT Configuration, NAT Table, NAT-One to one Translation, NAT- Address Overloading, Subnet Mask for
Routing, Determining the Subnet Mask to Use- In class practice, In class practice – Answer
Not Summarizing the Routes, Summarizing the Routes, Route Summarization on a Nonoctet Boundary,
Calculating Summary Route- Nonoctet Boundary, IP Multicast, IGMP and CGMP and PIM
Lecture 6
IPv4 ROUTING DESIGN- IP Routing Protocols
• Routing Protocols
• Convergence Time
• Virtual Routing
Interior and Exterior Routing Protocols, Distance Vector Routing Protocol, Link-State and Hybrid Routing
Protocols, Distance Vector, Link-State, and Hybrid Routing Protocols, Routing loops, Flat and Hierarchical
Routing Protocols, Classful and Classless Routing Protocols, Classful Routing Protocol - Design
Implications
Convergence Time, Convergence in Routing Protocols., Route Summarization with Routing Protocols.
Routing Information Protocol, Versions 1 and 2, Interior Gateway Routing Protocol and Enhanced IGRP,
Open Shortest Path First, Integrated Intermediate System-to-Intermediate System, link-state classless, S-
IS Network, Border Gateway Protocol Version 4, Routing Protocol Comparison,
Routing Protocol Selection- Choosing Your Routing Protocol: Core Layer, Distribution layer, The access
layer
Virtual Routing
Lecture 7
Wireless Standards, Wireless Components: i. Wireless Access Points, ii. Wireless Client Devices
Wireless Threat Mitigation: Basic Wireless Security: i. SSIDs, ii. Wired Equivalent Privacy (WEP), iii. Media
Access Control (MAC) address verification
Lecture 8
Network Management • Introduction • Network Management protocols and Tools • SLC and SLA
Network Delay
QoS Tools
The following sections explore these QoS tools: • Classification and Marking • Policing and Shaping •
Congestion Avoidance • Congestion Management • Link-Specific Tools • AutoQoS
Tools
• Cisco NetFlow
• Syslog
• CiscoWor
Lecture 9
VoIP Components
IP Telephony Components
Voice Coding and Compression Techniques,
Digitization: 1. VoIP, 2. Using IP phones to digitize and packetize the voice., VoIP and IP Telephony
QoS, VoIP Components, IP Telephony Components, IP infrastructure, IP Phones, Video Telephony, Call
Processing, Applications, Voice Gateway, Voice Coding and Compression Techniques, Voice Activity
Detection, Compressed Real-Time Transport Protocol.
Lecture 10
Overview
• Bandwidth Requirements
• IP Telephony Design
• Voice Security
– Security Concerns
– Mitigation
Grade of service (GoS), Erlangs, Centum call seconds (CCSs), Busy-hour traffic (BHT), Trunk Capacity
Voice packet size = Layer 2 header size + IP/UDP/RTP header size +Voice payload size
Voice packets per second (pps) = Codec bit rate / Voice payload size
Mitigating to Protect IP Telephony: Threat defense, Secure communication, Trust and identity
Lecture 11
Designing a network
Overview
– Design Model
– Switching
– Security
– Wireless
– Network Management
– Future Considerations
SOLUTION
Solution to the case study introduced now includes the following sections:
• Design Model
• Switching
• Security
• Wireless
• Network Management
• Future Considerations
Lecture 12
Enabling Technologies
Overview
• Cloud Computing
• IPv6
Documentation
Layer 3 diagram
Wi-Fi diagram
Cloud Computing
• Improved performance:
• Device independence
• Can be slow
Why IPv6?
• Deficiency of IPv4
– Multicast
– Quality of Service
– Security
– Mobility (MIPv6)
• New options
Traffic Class
accounting, security
quality of service
Payload Length