Professional Documents
Culture Documents
Intruduction
Intruduction
Intruduction
Intruduction
Objectives
Describle an enterprise
Indentify traffic flows through an enterprise and describe the importance of an intranet and extranet. Describe the different types and handling of traffic in the enterprise. Define the role and importance of a telecommuter. Describe the function and importance of VPNs
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
The network that is used to support the business enterprise is called an enterprise network. Support for critical applications Support for converged network traffic Need for centralized control Support for diverse business requirements
Businesses increasingly rely on their network infrastructure to provide mission critical services. Enterprise class equipment is designed for reliability, with features such as redundant power supplies and failover capabilities.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
To optimize bandwidth on an enterprise network, the network must be organized so that traffic stays localized and is not propagated onto unnecessary portions of the network. Using the three-layer hierarchical design model helps organize the network. This model divides the network functionality into three distinct layers: Access Layer, Distribution Layer, and Core Layer.
Enterprise Campus: Consists of the campus infrastructure with server farms and network management Enterprise Edge: Consists of the Internet, VPN, and WAN modules connecting the enterprise with the service provider's network Service Provider Edge: Provides Internet, Public Switched Telephone Network (PSTN), and WAN services Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Features of a LAN: The organization has the responsibility of installing and managing the infrastructure. Ethernet is the most common technology used. The focus of the network is in the Access and Distribution Layers. The LAN connects users, provides support for localized applications and server farms. Connected devices are usually in the same local area, such as a building or a campus.
Features of a WAN: Connected sites are usually geographically dispersed. Connectivity to the WAN requires a device such as a modem or CSU/DSU to put the data in a form acceptable to the network of the service provider. Services are provided by an ISP. WAN services include T1/T3, E1/E3, DSL, Cable, Frame Relay, and ATM. The ISP has the responsibility of installing and managing the infrastructure. The edge devices modify the Ethernet encapsulation to a serial WAN encapsulation.
LAN traffic: File sharing Printing Internal backup and mirroring Intra-campus voice WAN traffic: System updates Company email Transaction processing External traffic is traffic that originates from or is destined to the Internet. VPN and Internet traffic is considered external traffic flow.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Database transaction processing Mainframe or data center access File and print sharing Authentication Web services Email and other communications VPN services Voice calls and voicemail Video and video conferencing
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Data Traffic Some data applications are more concerned about time-sensitivity than reliability, and most data applications can tolerate delays. For this reason, data traffic usually employs Transmission Control Protocol (TCP). TCP uses acknowledgments to determine when lost packets must be retransmitted and therefore guarantees delivery. While the use of acknowledgements makes TCP a more reliable delivery protocol, it also incurs a delay.
Voice and Video Traffic Voice traffic and video traffic are different from data traffic. Voice and video applications require an uninterrupted stream of data to ensure high quality conversations and images. Therefore, voice and video applications employ User Datagram Protocol (UDP) instead of TCP. Since UDP does not have mechanisms for retransmitting lost packets, it minimizes delays.
In addition to understanding the delays of TCP versus UDP, it is also necessary to understand the delay, or latency, caused by the networking devices that must process the traffic on its path to the destination. OSI Layer 3 devices create more delay than Layer 2 devices due to the number of headers they have to process. Jitter, caused by network congestion, is the variation in time of the packets arriving at their destination. Quality of Service (QoS) is a process used to guarantee a specified data flow. QoS mechanisms sort traffic into queues, based on priority. Ex: Detail on 1.2.3 Currirulum
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Teleworking
Teleworking, also referred to as telecommuting and ecommuting, allows employees to use telecommunications technology to work from their homes or other remote locations. The remote worker using the technology is called a teleworker or telecommuter. Teleworking provides many advantages and opportunities for both employer and employee. Some companies have even reduced the expense of air travel and hotel accommodations to bring their employees together by using teleconferencing and collaboration tools. Is the method for a group of people to communicate in real time online.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Teleworking
Employees save time and money, and reduce stress, by eliminating the daily travel to and from the office. Working from home allows employees to spend more time with their families.
Teleworking
Teleworking
By combining large video displays and high quality audio in specially-designed rooms, it appears as if all participants, regardless of their physical location, are sitting across the boardroom table from each other.
Teleworking
Summary
A large bussiness environment with many users and locations or many system is referred to as an enterprise. Cisco Enterprise Architectures: An Internet Network Traffic Teleworking, teleworkers VPNs