SlideShare a Scribd company logo
Chapter 4
Designing Remote Connectivity
In many companies, not every employee works on the main
site premises. Employees who work offsite can include the
following:
■ Remote workers
■ Mobile workers
■ Branch employees
Remote workers usually work one or more days a week from
home or from another location.
1
compiled by Tizita Obssa
Cont…
• Mobile workers may be constantly traveling to
different locations or be permanently deployed
at a customer site.
• Some workers are employed at small branch
offices.
• In any case, these employees need to have
connectivity to the enterprise network.
• As the Internet has grown, businesses have
turned to it as a means of extending their own
networks.
2
compiled by Tizita Obssa
Design Considerations at the
Enterprise Edge
 The enterprise edge is the area of the network where the enterprise
network connects to external networks.
 Routers at the enterprise edge provide connectivity between the internal
campus infrastructure and the Internet.
 They also provide connectivity to remote WAN users and services.
 The design requirements at the enterprise edge differ from those within
the campus network.
Figure 1-30 shows the Cisco Enterprise Architecture with an emphasis on the
enterprise edge.
3
compiled by Tizita Obssa
Cont…
4
compiled by Tizita Obssa
Cont…
• Cost of Bandwidth Most campus networks are
built on Ethernet technology.
• However, WAN connectivity at the enterprise
edge is usually leased from a third-party
telecommunications service provider.
• Because these leased services can be expensive,
the bandwidth available to WAN connections is
often significantly less than the bandwidth
available in the LAN.
5
compiled by Tizita Obssa
Cont…
• QoS
The difference in band width between the LAN and
the WAN can create bottlenecks.
• These bottlenecks cause data to be queued by the
edge routers.
• Anticipating and managing the queuing of data
requires a QoS strategy.
• As a result, the design and implementation of
WAN links can be complicated.
6
compiled by Tizita Obssa
Cont…
Security
Because the users and services accessed through the
edge routers are not always known, security
requirements at the enterprise edge are critical.
Intrusion detection and stateful firewall inspection
must be implemented to protect the internal campus
network from potential threats.
7
compiled by Tizita Obssa
Cont…
• Remote Access
In many cases, the campus LAN services must
extend through the enterprise edge to remote
offices and workers.
This type of access has different requirements
than the level of public access provided to
users coming into the LAN from the Internet.
8
compiled by Tizita Obssa
Integrating Remote Sites into the
Network Design
• Integrating Remote Sites into the Network Design
Designing a network to support branch locations and
remote workers requires the network designer to
be familiar with the capabilities of the various WAN
technologies.
• Traditional WAN technologies include the following:
■ Leased lines
■ Circuit-switched networks
■ Packet-switched networks, such as Frame Relay
networks
■ Cell-switched networks such as Asynchronous
Transfer Mode (ATM) networks
9
compiled by Tizita Obssa
Cont…
• In many locations, newer WAN technologies are
available, such as the following:
■ Digital subscriber line (DSL)
■ Metro Ethernet
■ Cable modem
■ Long-range wireless
■ Multiprotocol Label Switching (MPLS)
10
compiled by Tizita Obssa
Cont…
Most WAN technologies are leased on a monthly basis from a
telecommunications service provider.
Depending on the distances, this type of connectivity can be
quite expensive.
WAN contracts often include service level agreements (SLA).
These agreements guarantee the service level offered by the
service provider.
SLAs support critical business applications, such as IP
telephony and high-speed transaction processing to remote
locations. Figure 1-31 shows several WAN technologies.
11
compiled by Tizita Obssa
Cont…
12
compiled by Tizita Obssa
Cont…
• MPLS Cisco IOS MPLS enables enterprises and service providers to build
next-generation intelligent networks.
• MPLS encapsulates packets with an additional header containing “label”
information.
• The labels are used to switch the packets through the MPLS network.
MPLS can be integrated seamlessly over any existing infrastructure, such
as IP, Frame Relay, ATM, or Ethernet. MPLS is independent of
access technologies.
MPLS technology is critical to scalable VPNs and end-to-end QoS.
• MPLS enables efficient use of existing networks to meet future growth
and rapid fault correction of link and node failure.
• The technology also helps deliver highly scalable, end-to-end IP services
with simpler configuration, management, and provisioning for both
Internet providers and subscribers
13
compiled by Tizita Obssa
Cont…
• VPNs
One common connectivity option, especially for
remote workers, is a VPN through the Internet.
• A VPN is a private network that uses a public
network to connect remote sites or users together.
• Instead of using a dedicated, real-world
connection, such as leased lines, a VPN uses virtual
connections routed through the Internet from the
company private network to the remote router or
PC.
14
compiled by Tizita Obssa
Redundancy and Backup Links
• Redundancy is required on WAN links and is vitally important to
ensure reliable connectivity to remote sites and users.
Some business applications require that all packets be delivered in a
timely fashion.
For these applications, dropped connectivity is not an option.
Providing redundancy on the WAN and throughout the
internetwork ensures high availability for end-to-end applications.
For a WAN, backup links provide the required redundancy.
Backup links often use different technologies than the primary
connection.
This method ensures that if a failure occurs in one system, it does
not necessarily affect the backup system.
15
compiled by Tizita Obssa
Cont…
• For example, a business that uses point-to-point WAN
connections to remote sites can use VPNs
through the Internet as an alternative strategy for
redundancy.
• DSL, ISDN, and dialup modems are other connectivity
options used to provide backup links in the event of a
WAN failure.
• Although the backup links are frequently slower than
the primary connections, they can be configured to
forward only high-priority data and transactions.
• Figure 1-32 shows how a redundant DSL connection acts
as a backup for a point-to-point WAN connection.
16
compiled by Tizita Obssa
Cont…
In addition to providing a backup strategy,
redundant
WAN connections can provide additional
bandwidth through load sharing.
The backup link can be configured to provide
additional bandwidth all the time or during peak
traffic time only
17
compiled by Tizita Obssa
Cont…
18
compiled by Tizita Obssa

More Related Content

Similar to network design chapter 4(1).pptx

Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
eShikshak
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
RehanShrivastav
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle Transformation
Matsuo Sawahashi
 
1cloudstar cloud connect azure
1cloudstar cloud connect azure1cloudstar cloud connect azure
1cloudstar cloud connect azure
1CloudStar
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
Chaing Ravuth
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
TnNguyn57021
 
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdfsecure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
rhunter5312
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
Idan Hershkovich
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
Jonathan Alvarado Covarrubias
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
MyNOG
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
Jheyson Ayala
 
Dedicated Leased Line Internet Connection
Dedicated Leased Line Internet ConnectionDedicated Leased Line Internet Connection
Dedicated Leased Line Internet Connection
LINKUPNETWORKS
 
Networking & Servers
Networking & ServersNetworking & Servers
Networking & Servers
Becky Holden
 
Enabling the Future of Work with SD-WAN
Enabling the Future of Work with SD-WANEnabling the Future of Work with SD-WAN
Enabling the Future of Work with SD-WAN
Xylos
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
sushil kumar
 
Wide area networks
Wide area networksWide area networks
Wide area networks
CYBERINTELLIGENTS
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
Rajesh Porwal
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Waqas Ahmed Nawaz
 

Similar to network design chapter 4(1).pptx (20)

Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle Transformation
 
1cloudstar cloud connect azure
1cloudstar cloud connect azure1cloudstar cloud connect azure
1cloudstar cloud connect azure
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdfsecure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
secure-your-branch via Virtualized Firewall on SD-WAN Edge.pdf
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Dedicated Leased Line Internet Connection
Dedicated Leased Line Internet ConnectionDedicated Leased Line Internet Connection
Dedicated Leased Line Internet Connection
 
Networking & Servers
Networking & ServersNetworking & Servers
Networking & Servers
 
Enabling the Future of Work with SD-WAN
Enabling the Future of Work with SD-WANEnabling the Future of Work with SD-WAN
Enabling the Future of Work with SD-WAN
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
Wide area networks
Wide area networksWide area networks
Wide area networks
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 

More from amanueltafese2

Chapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptx
Chapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptxChapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptx
Chapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptx
amanueltafese2
 
Part III-Managerial Accounting.pptx
Part III-Managerial Accounting.pptxPart III-Managerial Accounting.pptx
Part III-Managerial Accounting.pptx
amanueltafese2
 
Part I - Financial Accounting.ppt
Part I - Financial Accounting.pptPart I - Financial Accounting.ppt
Part I - Financial Accounting.ppt
amanueltafese2
 
Chapter 6 - Market Research.pptx
Chapter 6 - Market Research.pptxChapter 6 - Market Research.pptx
Chapter 6 - Market Research.pptx
amanueltafese2
 
Chapter 3- Strategic Marketing Planning Edited.pptx
Chapter 3- Strategic Marketing Planning Edited.pptxChapter 3- Strategic Marketing Planning Edited.pptx
Chapter 3- Strategic Marketing Planning Edited.pptx
amanueltafese2
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
amanueltafese2
 
Dr. umer.pptx
Dr. umer.pptxDr. umer.pptx
Dr. umer.pptx
amanueltafese2
 
chem 576...1 ppt.ppt
chem 576...1 ppt.pptchem 576...1 ppt.ppt
chem 576...1 ppt.ppt
amanueltafese2
 
Lecture Note Chapter 3 & 4.pptx
Lecture Note Chapter 3 & 4.pptxLecture Note Chapter 3 & 4.pptx
Lecture Note Chapter 3 & 4.pptx
amanueltafese2
 
NETWORK DESIGNchapter5 part1.pptx
NETWORK DESIGNchapter5 part1.pptxNETWORK DESIGNchapter5 part1.pptx
NETWORK DESIGNchapter5 part1.pptx
amanueltafese2
 
NETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptxNETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptx
amanueltafese2
 
stereochemistry-1.pdf
stereochemistry-1.pdfstereochemistry-1.pdf
stereochemistry-1.pdf
amanueltafese2
 
aman ppfa - Copy.pptx
aman ppfa - Copy.pptxaman ppfa - Copy.pptx
aman ppfa - Copy.pptx
amanueltafese2
 
Abebe project proposal.pptx
Abebe project proposal.pptxAbebe project proposal.pptx
Abebe project proposal.pptx
amanueltafese2
 
Presentation1 GLC.pptx
Presentation1 GLC.pptxPresentation1 GLC.pptx
Presentation1 GLC.pptx
amanueltafese2
 
Organozinc_compound.ppt
Organozinc_compound.pptOrganozinc_compound.ppt
Organozinc_compound.ppt
amanueltafese2
 
Organozinc_compound.ppt
Organozinc_compound.pptOrganozinc_compound.ppt
Organozinc_compound.ppt
amanueltafese2
 
SEMINARPAPER.ppt
SEMINARPAPER.pptSEMINARPAPER.ppt
SEMINARPAPER.ppt
amanueltafese2
 
GIS Lecture_edited.ppt
GIS Lecture_edited.pptGIS Lecture_edited.ppt
GIS Lecture_edited.ppt
amanueltafese2
 
asss,narm.pptx
asss,narm.pptxasss,narm.pptx
asss,narm.pptx
amanueltafese2
 

More from amanueltafese2 (20)

Chapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptx
Chapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptxChapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptx
Chapter_4_Marketing_Mix_Price,_Product,_Promotion_and_Place.pptx
 
Part III-Managerial Accounting.pptx
Part III-Managerial Accounting.pptxPart III-Managerial Accounting.pptx
Part III-Managerial Accounting.pptx
 
Part I - Financial Accounting.ppt
Part I - Financial Accounting.pptPart I - Financial Accounting.ppt
Part I - Financial Accounting.ppt
 
Chapter 6 - Market Research.pptx
Chapter 6 - Market Research.pptxChapter 6 - Market Research.pptx
Chapter 6 - Market Research.pptx
 
Chapter 3- Strategic Marketing Planning Edited.pptx
Chapter 3- Strategic Marketing Planning Edited.pptxChapter 3- Strategic Marketing Planning Edited.pptx
Chapter 3- Strategic Marketing Planning Edited.pptx
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
Dr. umer.pptx
Dr. umer.pptxDr. umer.pptx
Dr. umer.pptx
 
chem 576...1 ppt.ppt
chem 576...1 ppt.pptchem 576...1 ppt.ppt
chem 576...1 ppt.ppt
 
Lecture Note Chapter 3 & 4.pptx
Lecture Note Chapter 3 & 4.pptxLecture Note Chapter 3 & 4.pptx
Lecture Note Chapter 3 & 4.pptx
 
NETWORK DESIGNchapter5 part1.pptx
NETWORK DESIGNchapter5 part1.pptxNETWORK DESIGNchapter5 part1.pptx
NETWORK DESIGNchapter5 part1.pptx
 
NETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptxNETWORK DESIGN CHAPTER 1(1).pptx
NETWORK DESIGN CHAPTER 1(1).pptx
 
stereochemistry-1.pdf
stereochemistry-1.pdfstereochemistry-1.pdf
stereochemistry-1.pdf
 
aman ppfa - Copy.pptx
aman ppfa - Copy.pptxaman ppfa - Copy.pptx
aman ppfa - Copy.pptx
 
Abebe project proposal.pptx
Abebe project proposal.pptxAbebe project proposal.pptx
Abebe project proposal.pptx
 
Presentation1 GLC.pptx
Presentation1 GLC.pptxPresentation1 GLC.pptx
Presentation1 GLC.pptx
 
Organozinc_compound.ppt
Organozinc_compound.pptOrganozinc_compound.ppt
Organozinc_compound.ppt
 
Organozinc_compound.ppt
Organozinc_compound.pptOrganozinc_compound.ppt
Organozinc_compound.ppt
 
SEMINARPAPER.ppt
SEMINARPAPER.pptSEMINARPAPER.ppt
SEMINARPAPER.ppt
 
GIS Lecture_edited.ppt
GIS Lecture_edited.pptGIS Lecture_edited.ppt
GIS Lecture_edited.ppt
 
asss,narm.pptx
asss,narm.pptxasss,narm.pptx
asss,narm.pptx
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 

network design chapter 4(1).pptx

  • 1. Chapter 4 Designing Remote Connectivity In many companies, not every employee works on the main site premises. Employees who work offsite can include the following: ■ Remote workers ■ Mobile workers ■ Branch employees Remote workers usually work one or more days a week from home or from another location. 1 compiled by Tizita Obssa
  • 2. Cont… • Mobile workers may be constantly traveling to different locations or be permanently deployed at a customer site. • Some workers are employed at small branch offices. • In any case, these employees need to have connectivity to the enterprise network. • As the Internet has grown, businesses have turned to it as a means of extending their own networks. 2 compiled by Tizita Obssa
  • 3. Design Considerations at the Enterprise Edge  The enterprise edge is the area of the network where the enterprise network connects to external networks.  Routers at the enterprise edge provide connectivity between the internal campus infrastructure and the Internet.  They also provide connectivity to remote WAN users and services.  The design requirements at the enterprise edge differ from those within the campus network. Figure 1-30 shows the Cisco Enterprise Architecture with an emphasis on the enterprise edge. 3 compiled by Tizita Obssa
  • 5. Cont… • Cost of Bandwidth Most campus networks are built on Ethernet technology. • However, WAN connectivity at the enterprise edge is usually leased from a third-party telecommunications service provider. • Because these leased services can be expensive, the bandwidth available to WAN connections is often significantly less than the bandwidth available in the LAN. 5 compiled by Tizita Obssa
  • 6. Cont… • QoS The difference in band width between the LAN and the WAN can create bottlenecks. • These bottlenecks cause data to be queued by the edge routers. • Anticipating and managing the queuing of data requires a QoS strategy. • As a result, the design and implementation of WAN links can be complicated. 6 compiled by Tizita Obssa
  • 7. Cont… Security Because the users and services accessed through the edge routers are not always known, security requirements at the enterprise edge are critical. Intrusion detection and stateful firewall inspection must be implemented to protect the internal campus network from potential threats. 7 compiled by Tizita Obssa
  • 8. Cont… • Remote Access In many cases, the campus LAN services must extend through the enterprise edge to remote offices and workers. This type of access has different requirements than the level of public access provided to users coming into the LAN from the Internet. 8 compiled by Tizita Obssa
  • 9. Integrating Remote Sites into the Network Design • Integrating Remote Sites into the Network Design Designing a network to support branch locations and remote workers requires the network designer to be familiar with the capabilities of the various WAN technologies. • Traditional WAN technologies include the following: ■ Leased lines ■ Circuit-switched networks ■ Packet-switched networks, such as Frame Relay networks ■ Cell-switched networks such as Asynchronous Transfer Mode (ATM) networks 9 compiled by Tizita Obssa
  • 10. Cont… • In many locations, newer WAN technologies are available, such as the following: ■ Digital subscriber line (DSL) ■ Metro Ethernet ■ Cable modem ■ Long-range wireless ■ Multiprotocol Label Switching (MPLS) 10 compiled by Tizita Obssa
  • 11. Cont… Most WAN technologies are leased on a monthly basis from a telecommunications service provider. Depending on the distances, this type of connectivity can be quite expensive. WAN contracts often include service level agreements (SLA). These agreements guarantee the service level offered by the service provider. SLAs support critical business applications, such as IP telephony and high-speed transaction processing to remote locations. Figure 1-31 shows several WAN technologies. 11 compiled by Tizita Obssa
  • 13. Cont… • MPLS Cisco IOS MPLS enables enterprises and service providers to build next-generation intelligent networks. • MPLS encapsulates packets with an additional header containing “label” information. • The labels are used to switch the packets through the MPLS network. MPLS can be integrated seamlessly over any existing infrastructure, such as IP, Frame Relay, ATM, or Ethernet. MPLS is independent of access technologies. MPLS technology is critical to scalable VPNs and end-to-end QoS. • MPLS enables efficient use of existing networks to meet future growth and rapid fault correction of link and node failure. • The technology also helps deliver highly scalable, end-to-end IP services with simpler configuration, management, and provisioning for both Internet providers and subscribers 13 compiled by Tizita Obssa
  • 14. Cont… • VPNs One common connectivity option, especially for remote workers, is a VPN through the Internet. • A VPN is a private network that uses a public network to connect remote sites or users together. • Instead of using a dedicated, real-world connection, such as leased lines, a VPN uses virtual connections routed through the Internet from the company private network to the remote router or PC. 14 compiled by Tizita Obssa
  • 15. Redundancy and Backup Links • Redundancy is required on WAN links and is vitally important to ensure reliable connectivity to remote sites and users. Some business applications require that all packets be delivered in a timely fashion. For these applications, dropped connectivity is not an option. Providing redundancy on the WAN and throughout the internetwork ensures high availability for end-to-end applications. For a WAN, backup links provide the required redundancy. Backup links often use different technologies than the primary connection. This method ensures that if a failure occurs in one system, it does not necessarily affect the backup system. 15 compiled by Tizita Obssa
  • 16. Cont… • For example, a business that uses point-to-point WAN connections to remote sites can use VPNs through the Internet as an alternative strategy for redundancy. • DSL, ISDN, and dialup modems are other connectivity options used to provide backup links in the event of a WAN failure. • Although the backup links are frequently slower than the primary connections, they can be configured to forward only high-priority data and transactions. • Figure 1-32 shows how a redundant DSL connection acts as a backup for a point-to-point WAN connection. 16 compiled by Tizita Obssa
  • 17. Cont… In addition to providing a backup strategy, redundant WAN connections can provide additional bandwidth through load sharing. The backup link can be configured to provide additional bandwidth all the time or during peak traffic time only 17 compiled by Tizita Obssa