1 / 25

Networking in the Enterprise

Introducing Routing and Switching in the Enterprise – Chapter 1. Networking in the Enterprise. Objectives. Describe the logical architecture and components of an enterprise network Explain the types of applications and traffic flows present on an enterprise network

kimama
Download Presentation

Networking in the Enterprise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introducing Routing and Switching in the Enterprise– Chapter 1 Networking in the Enterprise

  2. Objectives • Describe the logical architecture and components of an enterprise network • Explain the types of applications and traffic flows present on an enterprise network • Examine how enterprises integrate remote workers into their networks • Define the role and importance of a telecommuter • Describe the function and importance of VPNs

  3. Describe an Enterprise Network • A large business environment with many users and locations • Supported by an enterprise network • Provides mission-critical services and applications • Requires centralized control: NOC

  4. Describe an Enterprise Network • Businesses increasingly rely on their network infrastructure to provide mission-critical services • 99.999% uptime • High-end equipment • Fail-over capabilities • Redundancy • Optimizing bandwidth utilization • Ensuring security and network performance.

  5. Describe an Enterprise Network • Hierarchical design • Access, Distribution, Core layers • Enterprise networks contain both LAN and WAN technologies

  6. Describe an Enterprise Network • Access layer provides connectivity for the users • Distribution layer is used to forward traffic from one local network to another • Core layer represents a high-speed backbone layer between end networks

  7. All data that enters or exits the Enterprise Composite Network Model (ECNM) passes through an edge device. • Point that all packets can be examined and a decision • Intrusion detection systems (IDS) and intrusion prevention systems (IPS) configured at the enterprise edge to prevent against malicious activity

  8. Intranet Provide access to local and remote employees (private network, with confidential information) Controlled by firewalls Provide many of the services associated with the Internet, including: Email, Web, FTP, Telnet/SSH Extranet An intranet that allows external connections to suppliers and contractors Privileged access for business partners (private network) Controlled access Describe an Enterprise Network

  9. Explain Types of Applications and Traffic Flows within an Enterprise Network IMPORTANT TO OPTIMIZE BANDWIDTH! • Local • File sharing • Printing • Internal backup and mirroring • Intra-campus voice • WAN • System updates • Company email • Transaction processing • External • originates from or is destined to the Internet

  10. Explain Types of Applications and Traffic Flows within an Enterprise Network • Characteristics of different types of network traffic • Network traffic prioritization • Classification • Pre-queuing • Queuing and scheduling • Post-queuing

  11. Explain Types of Applications and Traffic Flows within an Enterprise Network • Factors affecting enterprise traffic • Latency - delay • Jitter - caused by network congestion, variation in time of the packets arriving at their destination • Quality of Service (QoS) • Guarantee data flow • Sort traffic into queues, based on priority • Voice traffic has priority over ordinary data

  12. Examine How Enterprises Integrate Remote Workers into their Networks • Teleworking • Telecommuting • Teleconferencing

  13. Examine How Enterprises Integrate Remote Workers into their Networks • Describe remote worker applications • VoIP • Sharing applications • FTP and Telnet

  14. Examine How Enterprises Integrate Remote Workers into their Networks • Function and importance of VPNs • encrypt all traffic moving between the remote site and the enterprise network using Virtual Private Networks (VPNs) • Encryption of traffic • Tunnels • Use underground tunnel to travel, two points are surrounded and protected from view • Client/server application

  15. Examine How Enterprises Integrate Remote Workers into their Networks

  16. Examine How Enterprises Integrate Remote Workers into their Networks

  17. Examine How Enterprises Integrate Remote Workers into their Networks

  18. Examine How Enterprises Integrate Remote Workers into their Networks

  19. Summary • Enterprise networks support mission critical services and traffic • Enterprise design includes a campus, enterprise edge, and service provider edge • Intranets and extranets are private networks designed for specific access privileges • VPNs create encrypted tunnels for use by teleworkers

More Related