The Art of Network Architecture
|
|
- Todd Fleming
- 6 years ago
- Views:
Transcription
1
2 The Art of Network Architecture Russ White Scott Morris Denise Donohue
3 The Art of Network Architecture Intersecting It Driving It Designing It Selling It 3
4 The Intersection of Business and Technology Why Let Business Drive Technology Decisions? Projects get funded Business succeeds You get a raise??? How Does Technology Drive Business Decisions? Technology Impact is Part of Design Discussion Future Growth Constraints Future Functional Constraints 4
5 Determining Business Requirements Learn the Business Environment The Big Picture Information to gather How to gather it The Competitive Environment Information to gather How to gather it How Does the Network Serve the Business Technologies and Applications in Use Network Evaluation How Does the Network Serve its Customers Internal users External users Guest users 5
6 Learn the Business Environment The Big Picture State of the Business Growing/shrinking/static Future plans Leadership Customers Challenges And how can technology help? Financial Health And how can technology help? Company Website Annual Report Press About the Company Talking to People SWOT Analysis 6
7 Business Environment Example Cisco Overview Cisco Financial Report Cisco Annual Report Stockholder Letter Cisco Annual Report Full Report Strengths Weaknesses Opportunities Threats 7
8 Learn the Business Environment The Competitive Environment State of the Market Lively/growing vs. stagnating Niche or broad? Competitive Pressures How many competitors? How are they doing? Competitors Use of Technology Annual Report Competitor s Website Press About Your Competitors Talking to People 8
9 Competitive Environment Example 9
10 How Does the Network Serve the Business? Does it hold you back Or take you where you want to go? 10
11 How Does the Network Serve the Business? Technologies in Use Applications in Use Network Evaluation LAN WAN Security Flexibility Where does the network Support and improve business processes Hinder them? 11
12 How Does the Network Serve Its Customers? Find out who are the network s customers, and how they use its resources Internal users External users Guest users 12
13 Where Are There Gaps? And How Can Technology Help? Update technologies to Improve processes Reduce cost Increase efficiency Add capabilities, such as VOIP/Video/Presence Mobility (BYOD/CYOD) Redesign part (or all) of the network Equipment refresh is a good time for this Technology or capability additions often require it 13
14 Drive It
15 Business Drivers Capabilities Continuity Cost Change 15
16 Capabilities as a Business Driver Changing Expectations Changing Capability Needs Network Changes Customer and employee expectations Competitive expectations 16
17 Designing New Capabilities How are changes in expectations and competition affecting the business? How is ability to keep pace affecting business finances? What mix of technologies will help them keep pace? 17
18 Designing New Capabilities Changes required to business processes Changes required to the network Changes required to enterprise applications User training required 18
19 Continuity as a Business Driver Most businesses lose $$ if the network is unavailable Highly variable, dependant on the location within the network For instance, within a bank s network: ATM machines can be down for days without impact Branches can be down for ten or fifteen minutes, but after that, losses mount quickly On the trading floor, over $1 million lost in trading fees alone per minute (or second) of downtime Many large networks are now 24/7 19
20 Continuity The trick question is: When is a network down? This often isn t easy to measure or understand Is a single application failing enough to call the entire network down? Is a single section of the network failing enough to call the network down? Business requirements set the standards Critical applications Critical sites Critical portions of the network 20
21 Designing for Continuity Design for failure Redundancy: links, servers, spares, etc. Hot or cold stand by Remote working Plan for failure Detection Troubleshooting Repair Test your plan 21
22 Designing for Continuity Worst Case Analysis?? 23
23 Cost as a Business Driver Most companies strive to reduce costs Unfortunately, cost often compromises the other design goals That can introduce risk Two goals Managing costs Predicting costs Two dimensions Operational Expense (OPEX) Capital Expense (CAPEX) 25
24 Managing Costs Modularity Management Security OPEX Reduces configuration complexity on individual devices Reduces build-out time Limits scope of equipment validation Reduces MTTR (keeping the network in service) CAPEX Limits scope of equipment requirements OPEX Automates configuration management Worst case analysis provides scoping and prioritization OPEX Increases overall network service level Protects information and services 26
25 Predicting Costs Modularity Management Security OPEX Costs can be managed at the module, rather than equipment or network level CAPEX Modules can be treated as a group for equipment upgrades, etc. Provides analysis for predicting network needs over a longer period of time Externally facing OODA loop provides an environment of best practices and trends on which to found modifications in the network Constant evaluation of the network in terms of business goals provides a look ahead capability for predicting new problems to be solved and challenges to be met Worst case analysis provides a realistic estimate of what s needed to meet real world challenges Externally facing OODA loop picks up and anticipates new threats to the network which need to be planned for and met 27
26 Change as a Business Driver Business Growth Organic business growth Scope creep Mergers and acquisitions Business Shrinkage Organic business decline Spin-offs Changing Expectations Customers Employees Modularity Set fixed limits on module sizes within a well defined plan Limit the size of each failure domain Keep configurations repeatable for faster rollouts and modifications Management Accurate baseline and change measurement and analysis Project network needs into the future in a reliable way 28
27 Managing Change An Example Organic growth isn t always visible Start out with 500 remote locations in a hub-and-spoke network Add a new location every other day for a year 675 remotes after one year This will probably work with no additional effort... It appears the network is handling the growth just fine 29
28 Managing Change An Example After a single link failure, however, the network doesn t ever converge The network administrators chase the problem to the hub router A bigger hub router is purchased, and readied for installation Wait! This is really a design problem If the organic growth had been measured and planned for, the network wouldn t have failed 30
29 Managing Change An Example How would modular design help here? If the size of the hub-and-spoke module were intentionally limited Based on testing, best practices, and documentation Once the topology reached a predetermined size, an intentional decision could be made about what to do Build a second topology? Increase the size of the hub router? 31
30 Managing Change Mergers and Acquisitions Mergers and Acquisitions Often involves two or more routing protocols Often involves intense pressure to merge services quickly Often involves two completely different design philosophies, neither of which have been deployed correctly 32
31 Design It
32 Design Toolbox Modularity Resilience Management Security 34
33 Modularity Repeatable Configurations In this network, there are two hub and spoke topologies One uses a point-to-multipoint layer 2 technology the other point-to-point circuits One uses EIGRP, the other OSPF This network is more difficult than it needs to be to manage Each topology should be design and configured using the same tools where possible EIGRP OSPF 35
34 Modularity Assigning Functionality Types of functionality Policy Filtering/aggregating reachability information Forwarding traffic over long(er) geographic distances Modularity divides these pieces up into manageable chunks Much like we divide a piece of software into multiple modules, and connect them through an API Aggregation Packet Filtering 36
35 Increasing Parallelism Modularity Fault Isolation Where do we want to isolate faults? The control plane must calculate for each path between Routers A and B If we split the network into two fault domains... Devices within each fault domain only compute paths within their fault domain This drags the network closer to the MTTR/MTBF balance point Divide complexity from complexity A B MTTR MTBF 37
36 Modularity How Do We Modularize? Hide Information Aggregate or filter control plane state Create a hierarchical design between the various network modules Create multiple overlapping control planes BGP/IGP Virtualization (covered in more detail later) BGP Overlay Aggregation Overlay Topology 38
37 Modularity The Tradeoff If modularity is good, why not build really small modules? Hiding information introduces suboptimal traffic flow Suboptimal routing Stretch A Aggregate to 2001:DB8:9168::/48 Before Aggregation 2001:DB8:9168:1::/ :DB8:9168:2::/64 39
38 Increasing Parallelism Resilience Redundancy In principle, redundancy is easy Any system with more parallel paths through the system will fail less often The problem is a network isn t really a single system It s a group of interacting systems Adding paths is a tradeoff Increases MTBF in one layer Increases MTTR in another layer The key is to balance MTBF and MTTR MTTR MTBF 40
39 Resilience Redundancy In the real world, the point where MTTR and MTBF meet is between two and three parallel structures One is almost always too little if you want resiliency Four is almost always too many And five is right out This applies at all levels of redundancy Circuit/link Device Module Online Data Center Redundant Modules Redundant Links Core Backup Data Center Redundant Equipment 41
40 Resilience Fast Convergence Three steps Detect Notify Link State Flooding Tuned flooding timers Reduce flooding domain Distance Vector Reduce update scope (query range) Calculate Switch Make each step as fast as possible But not at the cost of network stability Detect Notify Calculate & Switch 42
41 Resilience Fast Reroute Detect Notify Link State Flooding Tuned flooding timers Reduce flooding domain Fast reroute eliminates these steps Distance Vector Reduce update scope (query range) Calculate Switch Detect Notify Calculate Switch 43
42 The OODA Loop Management and Security Background Management A slower loop Reacts to organic threats Changes in the business, technology, etc. Business drivers Security A faster loop Reacts to inorganic threats Attacks designed to deny service, obtain access, discover information, etc. 44
43 Management Network Documentation Baseline Performance Baseline Utilization Change Analysis Business Ecosystem Business Processes Technology Ecosystem Design Modification Replace Technology Inject Technology Add Services Policy Modification Best Fit Analysis Root Cause Analysis Business Trends Best Practices Case Studies Shape to Models Technology Trends Business Trends Best Practices Case Studies Change Management Worst Case Analysis 45
44 Management Observe What You Should Document Topology Layer 2 and 3 Policy Where its applied The intent behind the policy Modular Boundaries Where they are The intent behind the boundary Per link utilization Time of day, seasonal, etc. Normal failure rates 46
45 Management Orient What You Should Know Best practices Network architecture models Business models 47
46 Management Decide What You Should Plan There is no such thing as a free lunch Remember the tradeoffs Document the tradeoffs you ve made Follow best practices or not? 48
47 Management Act What You Should Do Make a plan for change Know how to back out Or what your alternatives are in the case of failure Worst case analysis 49
48 Security Network Documentation Baseline Performance Baseline Utilization Anomaly Detection Best Fit Analysis Root Cause Analysis Security Trends Best Practices Case Studies Design Modification Replace Technology Inject Technology Add Services Modify Policy Shape to Models Technology Trends Best Practices Change Management Risks of Failure 50
49 Security Crunchy on the Outside A solid DMZ was once the best you could do in security design for your network Crunchy on the outside, chewy in the middle 51
50 Security Crunchy Through and Through Every device has security Automatic (fast) feedback loops Crunchy through and through IDS 52
51 Security Comparison of OODA Loops Crunchy on the Outside Observe One of my machines has been zombied Orient What is the address of the master host? On what port did they get through? Decide Where do I implement new filters to stop this from happening in the future? What is the best way to block this specific attack? Act Wait for a change window Implement the new filters Test Crunchy Through and Through Observe Automated anomaly detection Data analytics on network traffic Orient What type of attack? From where? Decide Do I toss this traffic, scrub it, honeypot it, or?? Do I need to change my edge policies? Act Allow the automated process to handle Modify edge policies as needed 53
52 Selling It
53 Selling Your Design Why should they spend this money / Implement this change? How do you convey the need? 56
54 Tools for Selling Your Design Justify Your Design: Create a Business Case How does it benefit the company? Risks and costs Include the risk and cost of doing nothing Tools ROI analysis Worst-case analysis Explain Your Design High level, but be prepared for low level details 57
55 Tools for Selling Your Design Typical Components of a Business Case Executive Summary Problem Assessment Solution Information Overview Options Recommendation Financial Analysis Costs Benefits Assumptions and Risks Timeline Next Steps 58
56 Tools for Selling Your Design ROI Illustrations 59
57 Summary The Art of Network Architecture lies in the intersection between business needs and good technology Network architects must be more than technical they must have a foot in the business world also Use your network design toolbox: Modularity Resilience Management Security Good design is not enough, you must be able to Understand and design to the underlying business drivers Present the business as well as technical advantages of your design 60
58 You can't create a good design by adding Band-Aids to a poor design. Terry Slattery CCIE #1026
59 Complete Your Online Session Evaluation Give us your feedback and you could win fabulous prizes. Winners announced daily. Receive 20 Cisco Daily Challenge points for each session evaluation you complete. Complete your session evaluation online now through either the mobile app or internet kiosk stations. Maximize your Cisco Live experience with your free Cisco Live 365 account. Download session PDFs, view sessions on-demand and participate in live activities throughout the year. Click the Enter Cisco Live 365 button in your Cisco Live portal to log in. 62
60
Minimizing Packet Loss
Minimizing Packet Loss Eric Osborne Russ White genda Intro What Is Convergence? Brief History Talk Talk Faster Precompute Precompute and Tunnel Current State of the rt 3 Minimizing Packet Loss with IGPs
More informationCampus Networking Workshop CIS 399. Core Network Design
Campus Networking Workshop CIS 399 Core Network Design Routing Architectures Where do we route? At the point where we want to limit our layer-2 broadcast domain At your IP subnet boundary We can create
More informationEnabling Performance & Stress Test throughout the Application Lifecycle
Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge
More informationCopyright 1998, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.scr 1. IPS _05_2001_c1
2001, Cisco Systems, Inc. All rights reserved. 1 Presentation_ID.scr 1 Introduction to High Availability Networking Session 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda Introduction Building
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationTop-Down Network Design
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Original slides by Cisco Press & Priscilla Oppenheimer Top-Down Network Design Network design should be a complete and iterative
More informationLogical Network Design (Part II)
Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part
More informationBenefits of SDN Modeling and Analytics tool for complex Service Provider Network
Benefits of SDN Modeling and Analytics tool for complex Service Provider Network George Backer, Senior Director, Charter Communications Manish Jani, Senior Architect, Cisco Systems BRKNMS-1010 BRKNMS-1010
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationNetwork & Infrastructure Management (NIM) with Riverbed SteelCentral
Solution Brief Network & Infrastructure Management (NIM) with Riverbed SteelCentral Companies leverage far too many tools to manage the performance of their networks and infrastructure. The result of a
More informationCisco Prime for Enterprise Innovative Network Management
Cisco Prime for Enterprise Innovative Network Management Session ID 1 Agenda Network Management Challenges Cisco Prime for Enterprise Overview Service-Centric Foundation Common Operational Attributes Benefits
More informationHigh Availability WAN
High Availability WAN How Cisco IT Achieved a High Availability WAN A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Achieve high availability for CAPNet, Cisco s global backbone WAN
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationENSURING SCADA NETWORK CONTINUITY WITH ROUTING AND TRAFFIC ANALYTICS
ENSURING SCADA NETWORK CONTINUITY WITH ROUTING AND TRAFFIC ANALYTICS WHITE PAPER Table of Contents The Mandate of Utility Grid Uptime 3 Matching Information Network Reliability to Utility Grid Reliability
More informationDATA CENTRE SOLUTIONS
DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances
More informationTradeoffs in Network Complexity
Tradeoffs in Network Complexity Tradeoffs in Network Complexity Defining Complexity Measuring Complexity Complexity Tradeoff Fast Reroute as an Example Whither Complexity? Defining Complexity Network Complexity
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building
More informationTop-Down Network Design
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Top-Down Network Design Network design should be a complete process that
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationThe State of SD-WAN Adoption in 2017
TM TM The State of SD-WAN Adoption in 2017 [ ebook ] The State of SD-WAN Adoption in 2017 1 2017 SevOne TM The State of SD-WAN Adoption in 2017 SD-WAN is an undeniably hot topic among IT professionals.
More informationF. Configure a distribute-list on router RTA that allows it to advertise all routes to the spoke routers.
Refer to the exhibit. Router RTA is the hub router for routers RTB and RTC. The Frame Relay network is configured with EIGRP, and the entire network is in autonomous system 1. However, router RTB and RTC
More informationMULTINATIONAL BANKING CORPORATION INVESTS IN ROUTE ANALYTICS TO AVOID OUTAGES
MULTINATIONAL BANKING CORPORATION INVESTS IN ROUTE ANALYTICS TO AVOID OUTAGES CASE STUDY Table of Contents Organization Background and Network Summary 3 Outage Precursor and Impact 3 Outage Analysis 4
More informationCASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY THE CUSTOMER THE CHALLENGE
CASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY TenFour is a Premier Service Provider for Red Forge Continuous Infrastructure Service (CIS ). This case study
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationTHE CUSTOMER SITUATION. The Customer Background
CASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY THE CUSTOMER SITUATION Alliant Technologies is a Premier Service Provider for Red Forge Continuous Infrastructure
More informationTHE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017
THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R
More informationInternational OpenFlow/SDN Test Beds 3/31/15
Duke s SDN Journey International OpenFlow/SDN Test Beds 3/31/15 Charley.Kneifel@duke.edu Part 1 Planning Definitions Infrastructure Considerations Use Cases Service Delivery / Management Considerations
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationPrototyping the campus network
Prototyping the campus network Designing and Supporting Computer Networks Chapter 7 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More information12 Advanced IP Addressing
12 Advanced IP Addressing CERTIFICATION OBJECTIVES 12.01 Variable-Length Subnet Masking 12.02 Route Summarization Q&A Two-Minute Drill Self Test 2 Chapter 12: Advanced IP Addressing In Chapter 11, you
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationCCNP Switch Questions/Answers Cisco Enterprise Campus Architecture
In its network design, a company lists this equipment: - Two Catalyst 4503 Layer 3 switches - One 5500 security appliance firewall - Two Catalyst 6509 switches - Two Lightweight Access Points - Two Catalyst
More informationFederal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:
Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager Introduction What s different about Federal Government Firewalls? The United States Federal
More informationBRKRST Cisco and/or its affiliates. All rights reserved. Cisco Public
Deploying OSPF in a Large-Scale Networks 2 Agenda Market Segments Service Provider Deployments Enterprise Deployments Design Best Practices Fast Convergence 3 Market Segments Market Segments Service Providers
More informationPSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco
PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?
More informationTroubleshooting Converged Enterprise Networks
Troubleshooting Converged Enterprise Networks VoiceCon San Francisco 2008 Steven Guthrie Director, Product Marketing CA, Inc. Agenda > What I m hearing >What is QoS? > Network and Voice Service Management
More informationEVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER
WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and
More informationSTEELCENTRAL NETPLANNER
STEELCENTRAL NETPLANNER PREDICTIVE MULTI-LAYER NETWORK PLANNING BUSINESS CHALLENGE Growth and Upgrades» Which links will I need to upgrade in 3 months?» How will my new corporate applications affect utilization
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationVoice over Internet Protocol
Voice over Internet Protocol Voice over Internet Protocol Contents Introduction Benefits of Integrating Voice and Data Networks Converting Voice to Data Efficient and Reliable Network Infrastructures
More informationOne Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software
Solution Brochure High-Performance Networking for the Enterprise with JUNOS Software Using the Network to Achieve Higher Availability, Lower OPEX and Improved Productivity for Your Business Core Branch
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationImplementing Cisco IP Switched Networks (SWITCH) v2.0
Data Sheet Learning Services Cisco Training on Demand Implementing Cisco IP Switched Networks (SWITCH) v2.0 Overview Implementing Cisco IP Switched Networks (SWITCH) Version 2.0 is a Cisco Training on
More informationTechniques and Protocols for Improving Network Availability
Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID
More informationISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW
ISP Network Design PoP Topologies and Design ISP and IXP Design Backbone Design Addressing INET 2000 NTW Routing Protocols Security Out of Band Management IXP/IXP Workshops 1999, Cisco Systems, Inc. 1
More informationConfiguring StackWise Virtual
Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationHYBRID WAN. Proof of Value Journey. WAN Summit Michael Becerra Singapore, 12 September Global Business Services Excellence. Simply delivered.
HYBRID WAN Proof of Value Journey WAN Summit Michael Becerra Singapore, 12 September 2017 Global Business Services Excellence. Simply delivered. IT Shared Services DHL by the Numbers We are the Logistics
More informationETHERNET SERVICES FOR MULTI-SITE CONNECTIVITY
SECURITY, PERFORMANCE, IP TRANSPARENCY INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using
More informationLoad Balancer Survival Tips: Black Friday & Cyber Monday
Load Balancer Survival Tips: Black Friday & Cyber Monday EBOOK c07.18 The annual holiday shopping season starting with Black Friday is the litmus test for application availability and performance for online
More informationQUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des
Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to
More informationNetwork Management Functions - Fault. Network Management
Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures
More informationTop-Down Network Design
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Technical Goals Scalability Availability Performance Security Manageability
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationEthernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
More informationThe SD-WAN security guide
The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are
More informationDistributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju
Distributed Data Infrastructures, Fall 2017, Chapter 2 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note: Term Warehouse-scale
More informationEnsuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp.
Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp. In today s digital economy, the importance of taking a bottom-line view of your organization s electrical power
More informationHands-On ROUTE Implementing Cisco IP Routing CCNP Course 1
Hands-On CCNP Course 1 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks of global network professionals. Course 1 ROUTE
More informationTake Back Lost Revenue by Activating Virtuozzo Storage Today
Take Back Lost Revenue by Activating Virtuozzo Storage Today JUNE, 2017 2017 Virtuozzo. All rights reserved. 1 Introduction New software-defined storage (SDS) solutions are enabling hosting companies to
More informationIntelligent Routing Platform
WHITE PAPER Bring Intelligence to your Network Copyright 2018 Noction Inc. Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4
More informationToday s CCNA Certifications Aren t What They Used to Be, They Are More!
Today s CCNA Certifications Aren t What They Used to Be, They Are More! Andy Gremett, Product Marketing Agenda Market Challenges Networking Skills Why Certification and Training? CCNA Routing and Switching
More informationFinancial Services Design for High Availability
Financial Services Design for High Availability Version History Version Number Date Notes 1 March 28, 2003 This document was created. This document describes the best practice for building a multicast
More informationTechnical Document. What You Need to Know About Ethernet Audio
Technical Document What You Need to Know About Ethernet Audio Overview Designing and implementing an IP-Audio Network can be a daunting task. The purpose of this paper is to help make some of these decisions
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Metodologia de Projecto 4 - Project Methodology 4 1 Hierarchical
More informationBUILDING SCALABLE AND RESILIENT OTT SERVICES AT SKY
BUILDING SCALABLE AND RESILIENT OTT SERVICES AT SKY T. C. Maule Sky Plc, London, UK ABSTRACT Sky have tackled some of the most challenging scalability problems in the OTT space head-on. But its no secret
More informationCisco Performance Routing
Cisco Performance Routing As enterprise organizations grow their businesses, the demand for real-time application performance and a better application experience for users increases. For example, voice
More informationChapter 4: Manipulating Routing
: Manipulating Routing Updates CCNP ROUTE: Implementing IP Routing ROUTE v6 1 Objectives Describe network performance issues and ways to control routing updates and traffic (3). Describe the purpose of
More informationDeploying IS-IS Networks
5288_ch04 Page 173 Tuesday, September 10, 2002 4:01 PM 4 Deploying IS-IS Networks Now that you understand the IS-IS routing protocol and are familiar with the concepts of multi-area routing and routing
More informationCisco EXAM Cisco ADVDESIGN. Buy Full Product.
Cisco EXAM - 352-001 Cisco ADVDESIGN Buy Full Product http://www.examskey.com/352-001.html Examskey Cisco 352-001 exam demo product is here for you to test the quality of the product. This Cisco 352-001
More informationVscale: Real-World Deployments of Next-Gen Data Center Architecture
Vscale: Real-World Deployments of Next-Gen Data Center Architecture Key takeaways Dell EMC Vscale is a standard, modular, pre-engineered architecture that transforms data centers into an automated, scalable
More informationCSCD 433/533 Advanced Networks Spring 2016
CSCD 433/533 Advanced Networks Spring 2016 Lecture 13 Router Algorithms and Design Chapter 5 1 Topics Router Algorithms Routing in General Hierarchical routing Interior Gateway Protocols OSPF mention of
More informationWhite Paper. Platform9 ROI for Hybrid Clouds
White Paper Platform9 ROI for Hybrid Clouds Quantifying the cost savings and benefits of moving from the Amazon Web Services (AWS) public cloud to the Platform9 hybrid cloud. Abstract Deciding whether
More informationUnified Communications Express AM
Cisco 646-223 Unified Communications Express AM Version: 6.0 QUESTION NO: 1 The IT manager from a prospective client organization explains that their network is overloaded. The network has been in use
More informationUnicast Routing. Information About Layer 3 Unicast Routing CHAPTER
CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul
More informationNetwork Survivability
Network Survivability Bernard Cousin Outline Introduction to Network Survivability Types of Network Failures Reliability Requirements and Schemes Principles of Network Recovery Performance of Recovery
More informationManaging Your IP Telephony Environment
Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining
More informationTop-Down Network Design
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Original slides by Cisco Press & Priscilla Oppenheimer Scalability Availability Performance Accuracy Security Manageability Usability
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationCisco Tech Talk Enterprise Switching. Muninder Singh Sambi, Sr. Director, Product Management, Enterprise Switching March 5, 2018
Cisco Tech Talk Enterprise Switching Muninder Singh Sambi, Sr. Director, Product Management, Enterprise Switching March 5, 2018 Forward-Looking Statements This presentation contains projections and other
More informationCisco Nexus Data Broker
Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout
More informationAny individual involved in implementation and verification of routing protocols in the enterprise networks
IMPLEMENTING CISCO IP ROUTING Information Length: 5 Days Courseware : Course code: Delivery Type Included CIS_ROUTE Classroom Description Implementing Cisco IP Routing (ROUTE) v1.0 is a five-day course
More informationNINE MYTHS ABOUT. DDo S PROTECTION
NINE S ABOUT DDo S PROTECTION NINE S ABOUT DDOS PROTECTION The trajectory of DDoS attacks is clear: yearly increases in total DDoS attacks, an ever-growing number of attack vectors, and billions of potentially
More informationChapter 1. Cisco SONA and the Cisco Enterprise Architecture
Chapter 1. Cisco SONA and the Cisco Enterprise Architecture After completing this chapter, you will be able to: Explain the Cisco Service-Oriented Network Architecture (SONA) framework Describe how the
More informationDeploying Cloud Network Services Prime Network Services Controller (formerly VNMC)
Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationONUG SDN Federation/Operability
ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software
More informationGet Your Datacenter SDN Ready. Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region
Get Your Datacenter SDN Ready Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region AGENDA Data Center Trends, Priorities, Concerns What Problems Are we Trying to Solve? Cisco
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationCoriant Transcend Symphony Solution
SOLUTIONS BRIEF Coriant Transcend Symphony Solution Open, Programmable, and Automated for On-Demand, Application-Centric Service Agility TRANSFORMING NETWORK ARCHITECTURE Network operators face new challenges
More informationMaximizing visibility for your
Maximizing visibility for your OptiView Series III Integrated Network Analyzer Network management and security departments have different network access requirements from the end user and server groups.
More informationLosing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data
Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com
More informationCisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility
White Paper Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility The Cisco 4000 Series Integrated Services Routers (ISRs) are designed for distributed organizations with
More informationMaking the case for SD-WAN
Making the case for SD-WAN A practical guide to getting buy-in for your new network New challenges require a new network It isn t just that enterprise IT is changing rapidly it s that it s changing in
More informationSWITCH Implementing Cisco IP Switched Networks
Hands-On SWITCH Implementing Cisco IP Switched Networks CCNP Course 2 Course Description Revised CCNP Curriculum and Exams Cisco has redesigned the CCNP courses and exams to reflect the evolving job tasks
More informationCCNP BSCI Quick Reference Sheets Exam
The Evolving Network Model EIGRP OSPF IS-IS CCNP BSCI Quick Reference Sheets Exam 642-901 Optimizing Routing BGP IP Multicast IPv6 Introduction Brent Stewart Denise Donohue ciscopress.com IDC [ 3 ] ICONS
More informationRouting Overview for Firepower Threat Defense
Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving
More information