CCDA 640-864 DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.

Slides:



Advertisements
Similar presentations
Learning about Neighboring and Remote Devices PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 4 Learning About Other Devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Implementing a Highly Available Network
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Embracing the chaos mark lorenc
1 CCNA 2 v3.1 Module 4. 2 CCNA 2 Module 4 Learning about Devices.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 4 Learning About Other Devices.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Simple Comparison By Akhyari Nasir. Intro  Network monitoring and measurement have become more and more important in a modern complicated network. 
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-6-1 Network Environment Management Discovering Neighbors on the Network.
Experiences in Analyzing Network Traffic Shou-Chuan Lai National Tsing Hua University Computer and Communication Center Nov. 20, 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
Net Optics Confidential and Proprietary 1 iLink Agg.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Characterizing the Existing Internetwork PART 1
CCNA – Cisco Certified Network Associates Routing and Static Routes By Roshan Chaudhary Lecturer Islington College.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 4 Learning About Other Devices.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
1 Cisco Discovery Protocol A proprietary utility that gives you a summary of directly connected switches, routers, and other Cisco devices CDP discovers.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
NETWORK MANAGEMENT AND ANALYSIS YEAR 3 LEVEL6 ACADEMIC YEAR NET324D.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved. 3.5: Implementing QoS with Cisco AutoQoS.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Project Requirements (NetFlow Generator) 정승화 분산 처리 및 네트워크 관리 연구실 포항 공과 대학교
Open-Eye Georgios Androulidakis National Technical University of Athens.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Security Management Process 1. six-stage security operations model 2 In large networks, the potential for attacks exists at multiple points. It is suggested.
Net Flow Network Protocol Presented By : Arslan Qamar.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public Course v6 Chapter # 1 Chapter 2: Troubleshooting Processes for Complex Enterprise.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Copyright Introduction to Computer Networking Learning About Other Devices.
Performance Management (Best Practices) REF: Document ID
POSTECH DP&NM Lab Detailed Design Document NetFlow Generator 정승화 DPNM Lab. in Postech.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design Chapter One.
Cisco Catalyst 2960 LAN Lite Switches Feature Comparison.
Cisco Networking Academy at WVTHS..... The Cisco Discovery Protocol..... CCNA Discovery 2 Chapter No. 5 Section
Cisco Study Guide
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Cisco CNS NetFlow Collection Engine Version 5.0
Instructor Materials Chapter 5: Network Security and Monitoring
Managing Your Network Environment
Network Environment Management
Network Management week 11
Network management and Analysis Year 3 Level6 Academic year
Network and Services Management
100% Exam Passing Guarantee & Money Back Assurance
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
IST 202 Chapter 4.
Network Monitoring System
Chapter 5: Network Security and Monitoring
Network Environment Management
Free Exam Study Material - Get Updated Braindumps Dumps4download.co.in
Chapter 8: Monitoring the Network
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK

DESCRIBE DEVELOPING BUSINESS TRENDS 1.Any device, to any content, anyway. 2.Collaboration. 3.Video. 4.Network Security. 5.A network technology architecture.

IDENTIFY NETWORK REQUIREMENTS TO SUPPORT THE ORGANIZATION Prepare Plan Operate Implement Design Optimize

BENEFITS 1.Lowers the total cost of ownership 2.Increases network availability 3.Improves business agility 4.Speeds access to applications

DESCRIBE THE TOOLS/PROCESS TO CHARACTERIZE AN EXISTING NETWORK 1.Use existing documentation 2.Perform a network audit 3.Analyze traffic

Open discussion: What tools do you use to characterize an existing network? Does anyone know of any open software/freeware tools? DESCRIBE THE TOOLS/PROCESS TO CHARACTERIZE AN EXISTING NETWORK

DESCRIBE THE TOP DOWN APPROACH TO NETWORK DESIGN Design ApproachBenefitsDisadvantages Top-DownIncorporates the requirements for the business. Time consuming Bottom upDesign based on experience for a quick solution May result in inappropriate design. Business requirements are ignored

Open discussion: What protocols do you use to manage your network? What’s great about it?(Is it informative, easy to set up). DESCRIBE NETWORK MANAGEMENT PROTOCOLS AND FEATURES

SNMP (Simple Network Management Protocol)

RMON (Remote traffic Monitoring) DESCRIBE NETWORK MANAGEMENT PROTOCOLS AND FEATURES

Netflow Source IP, destination IP, Source and destination ports, the Type of Service (ToS), packet and byte counts, start and end time stamps, input and output interfaces, Routing information, Data analyzers DESCRIBE NETWORK MANAGEMENT PROTOCOLS AND FEATURES

Netflow and NBAR DESCRIBE NETWORK MANAGEMENT PROTOCOLS AND FEATURES

CDP (Cisco Discovery Protocol) the local interface the device ID device IP address hold time device capabilities version of software model of the device port id of the neighboring device DESCRIBE NETWORK MANAGEMENT PROTOCOLS AND FEATURES

Syslog DESCRIBE NETWORK MANAGEMENT PROTOCOLS AND FEATURES

QUESTIONS