Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wired and Wireless network management

Similar presentations


Presentation on theme: "Wired and Wireless network management"— Presentation transcript:

1 Wired and Wireless network management
Part1: network components and transmission medium

2 Outline Network components Transmission medium
The three-layer hierarchical design model

3 Network components Hubs Bridges/Switches/Multilayer Switches Routers
Unmanaged Layer 2 Switches Managed Layer 2 Switches Managed Layer 3 Switches (Multilayer Switches) Routers Firewalls (VPN Concentrators) Access Points Content Filters Load balancer. Packet Shapers/Policers

4 Hubs This is a very simple device that connects together multiple local area network (LAN) devices. The only function of the hub is repeating the electrical signals received on one port, relaying those signals to all other connected ports. Hubs work at Open Systems Interconnection (OSI) Layer 1.

5 Bridges/Switches/Multilayer Switches
A bridge is used to connect multiple LAN segments together, forming multiple collision domains. By separating two or more LAN segments into multiple collision domains, the bridge reduces the number of collisions that could potentially occur on a LAN segment (fewer LAN speakers on the same segment), which improves network performance.

6 Bridges/Switches/Multilayer Switches
In its simplest form, a switch is a multiport bridge with some additional functionality. The switch almost completely ended the risk of collisions on hub-centered networks. There are a few categories of switches, distinguished by function: Unmanaged (Layer 2) switch Managed (Layer 2) switch Managed Layer 3 switch (multilayer switch)

7 Unmanaged Layer 2 Switches
A modern unmanaged switch provides the functionality of a multiport bridge; each of the switch ports is on its own collision domain. Like bridges, the switch has built-in support for the Spanning Tree Protocol (STP), which provides loop prevention. A switch also keeps an internal database of the known MAC addresses connected to each port.

8 Managed Layer 2 Switches
A modern managed switch provides all the functionality of an unmanaged switch; in addition, it can control and configure the behavior of the device. This typically introduces the ability to support virtual LANs (VLANs),

9 Managed Layer 3 Switches (Multilayer Switches)
This type of device provides a mix of functionality between that of a managed Layer 2 switch and a router.

10 Routers A router performs network layer functions
It is used to connect Internet Protocol (IP) networks Routers also provide the ability to separate IP broadcast domains. This feature is important, as some protocols use broadcast heavily to communicate with hosts. Modern routers support a number of features that are not limited to OSI Layer 3, including support for network address translation (NAT), firewalling services, access control lists (ACLs), packet inspection, and many others.

11 Firewalls (VPN Concentrators)
The principal function of a firewall is to protect some portion of a network. A number of different techniques are used; which ones are supported depends greatly on the specific firewall vendor and model. Techniques include access control lists, stateful packet inspection (SPI), and others.

12 Access Points An access point (AP) is used in wireless Ethernet networks in place of an Ethernet switch. Typical APs also provide bridging functionality between wired Ethernet and wireless Ethernet hosts. There are three categories of access points: consumer APs, enterprise autonomous APs, and enterprise lightweight APs.

13 Content Filters Content filters are used on some networks to control the type of data that is allowed to pass through the network

14 Load balancer One term commonly seen in older documentation is the concept of a load balancer, as a separate piece of equipment that solely performed this function. They're not limited to performing load-balancing functionality. Their functionality has extended to perform a number of different activities, including the following: Local and global load balancing Network and device health monitoring TCP multiplexing Support for common network routing protocols Application acceleration Denial-of-service protection Web application firewall Support for virtualization and multi-tenancy

15 Packet Shapers/Policers
A packet shaper or policer controls the flow of information into or out of a specific device The shaping or policing functionality is typically built into routers (and some switches) to deal with times when network demand outpaces the ability of a device or its port. In situations of no congestion, the shaping and/or policing functionality is not used. When there is congestion, these features will control how the excessive traffic is handled.

16 Transmission medium The choice of media type affects:
The type of network interface cards installed. The speed of the network. The ability of the network to meet future needs.

17 Transmission medium Table 4-1 compares the features of the common network media, including UTP, STP, coaxial cable, fiber-optic, and wireless connections.

18

19

20 Before implementing a network, you need to determine the requirements for the network. You can remember a few common recommendations on how various Ethernet technologies can be used in a campus network environment.

21 Importance of choosing appropriate Ethernet
In many modern installations, infrastructure costs for cabling and adapters can be high. Using the appropriate Ethernet connectivity provides the necessary speed for the parts of the network that require it while controlling costs.

22

23

24 The three-layer hierarchical design model
A hierarchical network design model breaks the complex problem of network design into smaller, more manageable problems. Each level, or tier in the hierarchy addresses a different set of problems

25 The three-layer hierarchical design model

26 The three-layer hierarchical design model
In the three-layer network design model, network devices and links are grouped according to three layers: • Core • Distribution • Access

27 The three-layer hierarchical design model
Devices at each layer have similar and well-defined functions. This allows administrators to easily add, replace, and remove individual pieces of the network. This kind of flexibility and adaptability makes a hierarchical network design highly scalable.

28 The three-layer hierarchical design model
At the same time, layered models can be difficult to comprehend because the exact composition of each layer varies from network to network. Each layer of the three-tiered design model may include the following: • A router • A switch • A link • A combination of these

29 The Core Layer The core layer provides an optimized and reliable transport structure by forwarding traffic at very high speeds. Devices at the core layer should not be burdened with any processes that stand in the way of switching packets at top speed. This includes the following: • Access-list checking • Data encryption • Address translation

30 The Distribution Layer
The distribution layer is located between the access and core layers and helps differentiate the core from the rest of the network The purpose of this layer is to provide boundary definition using access lists and other filters to limit what gets into the core. Therefore, this layer defines policy for the network. A policy is an approach to handling certain kinds of traffic, including the following: • Routing updates • Route summaries • VLAN traffic • Address aggregation

31 The Distribution Layer
If a network has two or more routing protocols, information between the different routing domains is shared, or redistributed, at the distribution layer.

32 The Access Layer The access layer supplies traffic to the network and performs network entry control. End users access network resources by way of the access layer. Acting as the front door to a network, the access layer employs access lists designed to prevent unauthorized users from gaining entry.

33 The three-layer hierarchical design model

34 Wired and Wireless network management
Part2: wireless

35 outline Wireless applications Wireless LAN
Wireless LAN transmission medium WLAN modes WLAN design consideration WLAN management functions

36 Wireless applications
Some common applications of wireless data communication include the following: • Accessing the Internet using a cellular phone • Home or business Internet connection over satellite • Beaming data between two handheld computing devices • Wireless keyboard and mouse for the PC

37 WLAN Another common application of wireless data communication is the wireless LAN (WLAN), which is built in accordance with Institute of Electrical and Electronic Engineers (IEEE) standards..

38 WLAN transmission medium
WLANs typically use: Radio waves (for example, 902 MHz), Microwaves (for example, 2.4 GHz), Infrared (IR) waves (for example, 820 nm) for communication.

39

40 WLAN modes Infrastructure mode Ad hoc mode

41 Infrastructure mode In which wireless clients are connected to an access point via a wireless link

42 Infrastructure mode It is possible to link several access point together using a connection called a distribution system The distribution system can also be a wired network, a cable between two access points or even a wireless network

43 Infrastructure mode The closer an access point is, the higher its data transfer capacity is So, a station within range of multiple access points may choose the access point offering the balance of capacity and current traffic load

44 Ad hoc mode In ad hoc mode, wireless client machines connect to one another in order to form a peer-to-peer network A network in which every machine acts as both a client and an access point at the same time.

45 WLAN design consideration
The following factors should be considered when designing wireless access layer: Client device power Radio frequency (RF) vulnerabilities Volume of network traffic Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure wireless networks 1st Edition

46 Continuous Availability and Outage Planning
The factors that affect availability and for which the design considerations should be made to make the wireless deployment resilient include the following: Power loss RF interference Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure wireless networks 1st Edition

47 WLAN capacity It can be increased by:
increasing the number of cells making the cell size smaller, which means fewer users per cell sharing the media Utilizing more channels which requires managing the RF spectrum Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure wireless networks 1st Edition

48 key system management functions that should already be included in your WLAN bundle.
WLAN planning tools Automated deployment and operations Monitoring and control Optimization and extensibility Reporting and logs RF spectrum management Security Mobility management Troubleshooting and remediation Accessible interface Managing voice services Location and tracking Visitor and guest access Multi-site management


Download ppt "Wired and Wireless network management"

Similar presentations


Ads by Google