9
Here’s a list of some of the things that commonly cause LAN traffic congestion: uu Too many hosts in a collision or broadcast domain uu Broadcast storms uu Too much multicast traffic uu Low bandwidth uu Adding hubs for connectivity to the network uu A bunch of ARP broadcasts There are two advantages to using routers in your network: uu They don’t forward broadcasts by default. uu They can filter the network based on layer 3, Network layer, information such as an IP address. Here are four ways a router functions in your network: uu Packet switching-- uu Packet filtering- uu Internetwork communication- U u Path selection- Advantages of Reference Models The OSI model is hierarchical, and there are many advantages that can be applied to any layered model, but as I said, the OSI model’s primary purpose is to allow different vendors’ networks to interoperate. Here’s a list of some of the more important benefits for using the OSI layered model: uu It divides the network communication process into smaller and simpler components, facilitating component development, design, and troubleshooting. uu It allows multiple-vendor development through the standardization of network components. uu It encourages industry standardization by clearly defining what functions occur at each layer of the model. uu It allows various types of network hardware and software to communicate. uu It prevents changes in one layer from affecting other layers to expedite development

Lammel Notes

Embed Size (px)

DESCRIPTION

fvn

Citation preview

Page 1: Lammel Notes

Here’s a list of some of the things that commonly cause LAN traffic congestion:uu Too many hosts in a collision or broadcast domainuu Broadcast stormsuu Too much multicast trafficuu Low bandwidthuu Adding hubs for connectivity to the networkuu A bunch of ARP broadcasts

There are two advantages to using routers in your network:uu They don’t forward broadcasts by default.uu They can filter the network based on layer 3, Network layer, information such as anIP address.

Here are four ways a router functions in your network:uu Packet switching--uu

Packet filtering-uu

Internetwork communication-U

u Path selection-

Advantages of Reference ModelsThe OSI model is hierarchical, and there are many advantages that can be applied to anylayered model, but as I said, the OSI model’s primary purpose is to allow different vendors’networks to interoperate.Here’s a list of some of the more important benefits for using the OSI layered model:uu It divides the network communication process into smaller and simpler components,facilitating component development, design, and troubleshooting.uu It allows multiple-vendor development through the standardization of networkcomponents.uu It encourages industry standardization by clearly defining what functions occur at eachlayer of the model.uu It allows various types of network hardware and software to communicate.uu It prevents changes in one layer from affecting other layers to expedite development

The first “connection agreement” segment is a request for synchronization (SYN).uu The next segments acknowledge (ACK) the request and establish connectionparameters—the rules—between hosts. These segments request that the receiver’ssequencing is synchronized here as well so that a bidirectional connection canbe formed.

Page 2: Lammel Notes

uu The final segment is also an acknowledgment, which notifies the destination host thatthe connection agreement has been accepted and that the actual connection has beenestablished. Data transfer can now begin.

Here are some router characteristics that you should never forget:uu Routers, by default, will not forward any broadcast or multicast packets.uu Routers use the logical address in a Network layer header to determine the next-hoprouter to forward the packet to.uu Routers can use access lists, created by an administrator, to control security based onthe types of packets allowed to enter or exit an interface.uu Routers can provide layer 2 bridging functions if needed and can simultaneously routethrough the same interface.uu Layer 3 devices—in this case, routers—provide connections between virtualLANs (VLANs).uu Routers can provide quality of service (QoS) for specific types of network traffic.

The Cisco three-Layer Hierarchical Model

The Core Layer-the core layeris responsible for transporting large amounts of traffic both reliably and quickly. The onlypurpose of the network’s core layer is to switch traffic as fast as possible. The traffic transported across the core is common to a majority of users.

uu Never do anything to slow down traffic. This includes using access lists, routingbetween virtual local area networks and implementing packet filtering.uu Don’t support workgroup access here.uu Avoid expanding the core (e.g., adding routers when the internetwork grows). If performancebecomes an issue in the core, give preference to upgrades over expansion.Here’s a list of things that we want to achieve as we design the core:uu Design the core for high reliability. Consider data-link technologies that facilitateboth speed and redundancy, like Gigabit Ethernet with redundant links or even10 Gigabit Ethernet.uu Design with speed in mind. The core should have very little latency.uu Select routing protocols with lower convergence times. Fast and redundant data-linkconnectivity is no help if your routing tables are shot!

The Distribution Layer

Page 3: Lammel Notes

The distribution layer is where we want to implement policies for the network becausewe are allowed a lot of flexibility in defining network operation here. There are severalthings that should generally be handled at the distribution layer:uu Routinguu Implementing tools (such as access lists), packet filtering, and queuinguu Implementing security and network policies, including address translation and firewallsuu Redistributing between routing protocols, including static routinguu Routing between VLANs and other workgroup support functionsuu Defining broadcast and multicast domainsKey things to avoid at the distribution layer are those that are limited to functions thatexclusively belong to one of the other layers!

The Access LayerThe access layer controls user and workgroup access to internetwork resources. The accesslayer is sometimes referred to as the desktop layer. The network resources most users needwill be available locally because the distribution layer handles any traffic for remote services.The following are some of the functions to be included at the access layer:uu Continued (from distribution layer) use of access control and policiesuu Creation of separate collision domains (segmentation)uu Workgroup connectivity into the distribution layerTechnologies like Gigabit or Fast Ethernet switching are frequently seen in the access layer.I can’t stress this enough—just because there are three separate levels does not implythree separate devices! There could be fewer or there could be more. After all, this is alayered approach.

Page 4: Lammel Notes
Page 5: Lammel Notes
Page 6: Lammel Notes
Page 7: Lammel Notes
Page 8: Lammel Notes