SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 7: Network
Evolution
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 7 - Sections & Objectives
 7.1 Internet of Things
• Explain the value of the Internet of Things.
 7.2 Cloud and Virtualization
• Explain why cloud computing and virtualization are necessary for
evolving networks.
 7.3 Network Programming
• Explain why network programmability is necessary for evolving
networks.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
7.1 Internet of Things
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Internet of Things
IoT Elements
 Cisco estimates that
50 billion things will
be connected to the
Internet by 2020.
 99% of things are
currently
unconnected.
 Dissimilar networks
are converging to
share the same
infrastructure.
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Internet of Things
IoT Elements
 The challenge for IoT is to securely integrate millions of
new things from multiple vendors into existing networks.
 The Cisco IoT System provides an infrastructure designed
to manage large scale systems of very different endpoints
and platforms, and the huge amount of data that they
create.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Internet of Things
IoT Pillars
 Network Connectivity identifies devices that can be used to provide IoT connectivity to many
diverse industries and applications.
 Fog Computing enables edge devices to run applications locally and make immediate decisions.
 Security offers scalable cybersecurity solutions, enabling an organization to quickly and effectively
discover, contain, and remediate an attack to minimize damage.
 Data Analytics consists of distributed network infrastructure components and IoT-specific,
application programming interfaces (APIs).
 Management and Automation products can be customized for specific industries to provide
enhanced security and control and support.
 Application and Enablement provides the infrastructure for application hosting and application
mobility between cloud and Fog computing.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
7.2 Cloud and Virtualization
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cloud and Virtualization
Cloud Computing
 Cloud computing involves large numbers of computers
connected through a network that can be physically located
anywhere.
 The three main cloud computing services are:
• Software as a Service (SaaS): Applications delivered over the web to
the end users.
• Platform as a Service (PaaS): Tools and services used to deliver the
applications.
• Infrastructure as a Service (IaaS): Hardware and software to power
servers, storage, networks and operating systems.
 Cloud service providers now also offer Information
Technology as a Service (ITaaS) which allows customers to
extend the capability of IT without requiring investment in new
infrastructure, training new personnel, or licensing new
software.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cloud and Virtualization
Cloud Computing
 The four primary cloud models are:
• Public clouds made available to the general population and uses the Internet to
provide services.
• Private clouds are intended for a specific organization or entity, such as the
government and is often managed by an outside organization with strict access
security.
• Hybrid clouds: A hybrid cloud is made up of two or more cloud models. Access to
various services is based on user access rights.
• Community clouds: A community cloud is created for exclusive use by a specific
community, such as healthcare organizations, that have special authentication and
confidentiality requirements.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cloud and Virtualization
Virtualization
 Virtualization separates the OS from the hardware allowing multiple
operating systems to exist on a single hardware platform.
 The hypervisor adds an abstraction layer on top of the real physical
hardware used to create virtual machines which have access to all the
hardware of the physical machine such as CPUs, memory, disk controllers,
and NICs.
 Virtualization advantages include:
• Less equipment is required
• Less energy is consumed
• Less space is required
• Easier prototyping
• Faster server provisioning
• Increased server uptime
• Improved disaster recovery
• Legacy support
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cloud and Virtualization
Virtualization
 Virtualization separates the OS from the hardware allowing
multiple operating systems to exist on a single hardware
platform.
 The hypervisor adds an abstraction layer on top of the real
physical hardware used to create virtual machines which
have access to all the hardware of the physical machine
such as CPUs, memory, disk controllers, and NICs.
 Virtualization advantages include:
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cloud and Virtualization
Virtual Network Infrastructure
 There are two approaches to installing a Hypervisor:
• Type 1 “Bare Metal” approach in which the hypervisor is installed
directly on the hardware.
• Type 2 “Hosted” approach in which the hypervisor is installed on top of
an existing operating system.
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cloud and Virtualization
Virtual Network Infrastructure
 Type 1 Hypervisors use a management console that can be
used to automatically move, consolidate, and power on and
off servers as required.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14
7.3 Network Programming
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Programming
Software-Defined Networking
 A network device contains the
following planes:
• Control plane - Uses CPU
process to calculate Layer 2 and
Layer 3 route forwarding
information.
• Data plane - Forwards traffic flows
using a data plane processor, such
as a digital signal processor
(DSP), without the CPU getting
involved.
 SDN virtualizes the network,
removing the control plane
function from each device and
performing it on a centralized
controller.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Programming
Software-Defined Networking
 The SDN framework uses northbound APIs to
communicate with upstream applications and southbound
APIs to define the behavior of downstream routers and
switches.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Programming
Controllers
 The SDN controller defines the data
flows that occur in the SDN Data
Plane.
 Using the OpenFlow protocol, the
controller populates a series of
tables implemented in hardware or
firmware
 The following tables manage the
flows of packets through the switch:
• Flow table - This table matches
incoming packets to a particular flow and
specifies the functions that are to be
performed on the packets. There may be
multiple flow tables that operate in a
pipeline fashion.
• Group table - A flow table may direct a
flow to a Group Table, which may trigger
a variety of actions that affect one or
more flows.
• Meter table - The table triggers a variety
of performance-related actions on a flow.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Programming
Controllers
 Cisco developed the Application Centric Infrastructure (ACI) to automate the
network, accelerate application deployments, and align IT infrastructures to better
meet business requirements.
 These are the three core components of the ACI architecture:
• Application Network Profile (ANP) - a collection of end-point groups (EPG), their connections, and
the policies that define those connections
• Application Policy Infrastructure Controller (APIC) - a centralized software controller that
manages downstream switches.
• Cisco Nexus 9000 Series switches - provide an application-aware switching fabric and work with
an APIC to manage the virtual and physical network infrastructure.
The Cisco APIC - Enterprise
Module (APIC-EM) extends
ACI aimed at enterprise and
campus deployments.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Programming
Controllers
 There are three basic types of SDN:
• Device-based SDN - Devices are
programmable by applications running
on the device itself or on a server in the
network. Cisco OnePK is an example of
a device-based SDN.
• Controller-based SDN - Centralized
controller that has knowledge of all
devices in the network. The applications
can interface with the controller
responsible for managing devices and
manipulating traffic flows throughout the
network. The Cisco Open SDN
Controller is a commercial distribution of
OpenDaylight.
• Policy-based SDN - Includes an
additional Policy layer that operates at a
higher level of abstraction. No
programming skills are required. Cisco
APIC-EM is an example of this type of
SDN.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Programming
Controllers
 Cisco APIC-EM provides the following features:
• Discovery - used to populate the controller's device and host inventory
database.
• Device Inventory - collects detailed information from devices within the
network
• Host Inventory - collects detailed information from hosts with the
network
• Topology - supports a graphical view of the network (topology view)
• Policy - ability to view and control policies across the entire network
including QoS.
• Policy Analysis - ability to trace application specific paths between
end devices to quickly identify ACLs in use and problem areas
including:
o ACL Analysis - examines ACLs on devices, searching for
redundant, conflicting, or shadowed entries.
o ACL Path Trace - examines specific ACLs on the path between
two end nodes, displaying any potential issues.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
7.4 Chapter Summary
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter Summary
Summary
 The six pillars of IoT are:
• Network Connectivity
• Fog Computing
• Security
• Data Analytics
• Management and Automation
• Application Enablement Platform
 Cloud computing services include:
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)
• IT as a Service (ITaaS)
 Cloud models include:
• Public clouds
• Private clouds
• Hybrid clouds
• Community clouds
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter Summary
Summary
 Type 1 hypervisors are installed directly on the hardware. Type 2
hypervisors are installed on top of any existing OS.
 SDN is a network architecture that has been developed to
virtualize the network. The SDN controller defines the data flows
that occur in the SDN data plane.
 The three types of SDN are:
• Device-based SDN
• Controller-based SDN
• Policy-based SDN
 Policy-based SDN, such as Cisco’s APIC-EM, is the most robust,
providing for a simple mechanism to control and manage policies
across the entire network.
 One of the most important features of the APIC-EM controller is the
ability to manage policies across the entire network.
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
Waqas Ahmed Nawaz
 

What's hot (20)

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 2
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
 

Similar to CCNA (R & S) Module 02 - Connecting Networks - Chapter 7

CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
Cisco Canada
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
01 route routing services
01 route routing services01 route routing services
01 route routing servicesMarcus Reams
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
Andy Juan Sarango Veliz
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
Amazon Web Services
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Canada
 
Cisco DNA
Cisco DNACisco DNA
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
Satya Sanjibani Routray
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
ssuser52b751
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric era
DESMOND YUEN
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 Keynote
Ken Owens
 
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
StampedeCon
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
PhiliphaHaldline
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
Cloud computing
Cloud computingCloud computing
Cloud computing
SSMTUTORIALSTUTORIAL
 

Similar to CCNA (R & S) Module 02 - Connecting Networks - Chapter 7 (20)

CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
 
5 cisco open_stack
5 cisco open_stack5 cisco open_stack
5 cisco open_stack
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric era
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 Keynote
 
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

More from Waqas Ahmed Nawaz

CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
Waqas Ahmed Nawaz
 

More from Waqas Ahmed Nawaz (10)

CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
CCNA (R & S) Module 04 - Scaling Networks - Chapter 8
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

CCNA (R & S) Module 02 - Connecting Networks - Chapter 7

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Network Evolution Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 7 - Sections & Objectives  7.1 Internet of Things • Explain the value of the Internet of Things.  7.2 Cloud and Virtualization • Explain why cloud computing and virtualization are necessary for evolving networks.  7.3 Network Programming • Explain why network programmability is necessary for evolving networks.
  • 3. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3 7.1 Internet of Things
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Internet of Things IoT Elements  Cisco estimates that 50 billion things will be connected to the Internet by 2020.  99% of things are currently unconnected.  Dissimilar networks are converging to share the same infrastructure.
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Internet of Things IoT Elements  The challenge for IoT is to securely integrate millions of new things from multiple vendors into existing networks.  The Cisco IoT System provides an infrastructure designed to manage large scale systems of very different endpoints and platforms, and the huge amount of data that they create.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Internet of Things IoT Pillars  Network Connectivity identifies devices that can be used to provide IoT connectivity to many diverse industries and applications.  Fog Computing enables edge devices to run applications locally and make immediate decisions.  Security offers scalable cybersecurity solutions, enabling an organization to quickly and effectively discover, contain, and remediate an attack to minimize damage.  Data Analytics consists of distributed network infrastructure components and IoT-specific, application programming interfaces (APIs).  Management and Automation products can be customized for specific industries to provide enhanced security and control and support.  Application and Enablement provides the infrastructure for application hosting and application mobility between cloud and Fog computing.
  • 7. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7 7.2 Cloud and Virtualization
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cloud and Virtualization Cloud Computing  Cloud computing involves large numbers of computers connected through a network that can be physically located anywhere.  The three main cloud computing services are: • Software as a Service (SaaS): Applications delivered over the web to the end users. • Platform as a Service (PaaS): Tools and services used to deliver the applications. • Infrastructure as a Service (IaaS): Hardware and software to power servers, storage, networks and operating systems.  Cloud service providers now also offer Information Technology as a Service (ITaaS) which allows customers to extend the capability of IT without requiring investment in new infrastructure, training new personnel, or licensing new software.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cloud and Virtualization Cloud Computing  The four primary cloud models are: • Public clouds made available to the general population and uses the Internet to provide services. • Private clouds are intended for a specific organization or entity, such as the government and is often managed by an outside organization with strict access security. • Hybrid clouds: A hybrid cloud is made up of two or more cloud models. Access to various services is based on user access rights. • Community clouds: A community cloud is created for exclusive use by a specific community, such as healthcare organizations, that have special authentication and confidentiality requirements.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cloud and Virtualization Virtualization  Virtualization separates the OS from the hardware allowing multiple operating systems to exist on a single hardware platform.  The hypervisor adds an abstraction layer on top of the real physical hardware used to create virtual machines which have access to all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs.  Virtualization advantages include: • Less equipment is required • Less energy is consumed • Less space is required • Easier prototyping • Faster server provisioning • Increased server uptime • Improved disaster recovery • Legacy support
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cloud and Virtualization Virtualization  Virtualization separates the OS from the hardware allowing multiple operating systems to exist on a single hardware platform.  The hypervisor adds an abstraction layer on top of the real physical hardware used to create virtual machines which have access to all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs.  Virtualization advantages include:
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cloud and Virtualization Virtual Network Infrastructure  There are two approaches to installing a Hypervisor: • Type 1 “Bare Metal” approach in which the hypervisor is installed directly on the hardware. • Type 2 “Hosted” approach in which the hypervisor is installed on top of an existing operating system.
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cloud and Virtualization Virtual Network Infrastructure  Type 1 Hypervisors use a management console that can be used to automatically move, consolidate, and power on and off servers as required.
  • 14. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14 7.3 Network Programming
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Programming Software-Defined Networking  A network device contains the following planes: • Control plane - Uses CPU process to calculate Layer 2 and Layer 3 route forwarding information. • Data plane - Forwards traffic flows using a data plane processor, such as a digital signal processor (DSP), without the CPU getting involved.  SDN virtualizes the network, removing the control plane function from each device and performing it on a centralized controller.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Programming Software-Defined Networking  The SDN framework uses northbound APIs to communicate with upstream applications and southbound APIs to define the behavior of downstream routers and switches.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Programming Controllers  The SDN controller defines the data flows that occur in the SDN Data Plane.  Using the OpenFlow protocol, the controller populates a series of tables implemented in hardware or firmware  The following tables manage the flows of packets through the switch: • Flow table - This table matches incoming packets to a particular flow and specifies the functions that are to be performed on the packets. There may be multiple flow tables that operate in a pipeline fashion. • Group table - A flow table may direct a flow to a Group Table, which may trigger a variety of actions that affect one or more flows. • Meter table - The table triggers a variety of performance-related actions on a flow.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Programming Controllers  Cisco developed the Application Centric Infrastructure (ACI) to automate the network, accelerate application deployments, and align IT infrastructures to better meet business requirements.  These are the three core components of the ACI architecture: • Application Network Profile (ANP) - a collection of end-point groups (EPG), their connections, and the policies that define those connections • Application Policy Infrastructure Controller (APIC) - a centralized software controller that manages downstream switches. • Cisco Nexus 9000 Series switches - provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure. The Cisco APIC - Enterprise Module (APIC-EM) extends ACI aimed at enterprise and campus deployments.
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Programming Controllers  There are three basic types of SDN: • Device-based SDN - Devices are programmable by applications running on the device itself or on a server in the network. Cisco OnePK is an example of a device-based SDN. • Controller-based SDN - Centralized controller that has knowledge of all devices in the network. The applications can interface with the controller responsible for managing devices and manipulating traffic flows throughout the network. The Cisco Open SDN Controller is a commercial distribution of OpenDaylight. • Policy-based SDN - Includes an additional Policy layer that operates at a higher level of abstraction. No programming skills are required. Cisco APIC-EM is an example of this type of SDN.
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Programming Controllers  Cisco APIC-EM provides the following features: • Discovery - used to populate the controller's device and host inventory database. • Device Inventory - collects detailed information from devices within the network • Host Inventory - collects detailed information from hosts with the network • Topology - supports a graphical view of the network (topology view) • Policy - ability to view and control policies across the entire network including QoS. • Policy Analysis - ability to trace application specific paths between end devices to quickly identify ACLs in use and problem areas including: o ACL Analysis - examines ACLs on devices, searching for redundant, conflicting, or shadowed entries. o ACL Path Trace - examines specific ACLs on the path between two end nodes, displaying any potential issues.
  • 21. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21 7.4 Chapter Summary
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter Summary Summary  The six pillars of IoT are: • Network Connectivity • Fog Computing • Security • Data Analytics • Management and Automation • Application Enablement Platform  Cloud computing services include: • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS) • IT as a Service (ITaaS)  Cloud models include: • Public clouds • Private clouds • Hybrid clouds • Community clouds
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter Summary Summary  Type 1 hypervisors are installed directly on the hardware. Type 2 hypervisors are installed on top of any existing OS.  SDN is a network architecture that has been developed to virtualize the network. The SDN controller defines the data flows that occur in the SDN data plane.  The three types of SDN are: • Device-based SDN • Controller-based SDN • Policy-based SDN  Policy-based SDN, such as Cisco’s APIC-EM, is the most robust, providing for a simple mechanism to control and manage policies across the entire network.  One of the most important features of the APIC-EM controller is the ability to manage policies across the entire network.
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential