Intro Network Technologies
Intro Network Technologies
Intro Network Technologies
3. All of those host devices are cabled into what we call the network infrastructure
4. You’ll probably also have users and devices that utilize WiFi to connect to
infrastructure
In the past, networking consisted of accessing shared resources on the local network
(shared printers, network drives, shared folders, etc) and also accessing the Internet
(primarily for research or entertainment) Today, many tasks that used to utilize shared
resources (such as Email, File Storage and Calendaring) now make use of Internet
resources instead (Gmail, DropBox, Google Calendar).
LAN / Ethernet NICs and cables on this page. Others on next page.
Coaxial Cable
Connector type is called an SMA (SubMiniature version A) which come in Male and
Female versions. There are other types of connectors as well.
Wi-Fi NICs are frequently built-in and can’t be seen.
-
Guts of a Tablet (Nexus 7) are shown.
Cisco Nexus 9508 start around $50k
Cisco 2801 ISR
The idea here is that before a single end-user or application touches your network,
you have pre-planned how the network should respond to these things when they DO
get connected. Your “intent” (what resources users should have access to, QoS
policies for different applications, etc) is given to the Controller which then, in turn,
translates that intent into usable configurations that are pushed down to network
devices.
Whiteboard each of these.
Whiteboard each of these.
Whiteboard each of these.
Whiteboard each of these.
Some architectures will require that you must utilize the services of a 3rd party such as
an ISP or WAN Service Provider. The costs of implementing these services, planning
for their failure, and accounting for any latency they might introduce must all be
factored into your planning.
The 2-Tier network has also been called the “Collapsed Core” architecture.
Typically connections between all switches will be Layer-3 in order to prevent bridging
loops and the delays induced by using Spanning-Tree (or other similar loop-
prevention technologies).
Cloud-based characteristics:
----Responsibility for cloud-based resource uptime shifted to cloud-provider
----From the perspective of the customer, choices are very limited with regards to
cloud network segmentation and security.
----Confidentiality of data sent to/from the cloud a major concern
Time and cost: Less cables have to be run through walls, around cabinets, into
ceilings, etc.
Flexibility: Now, if you can run an Ethernet cable to a location you can also run power
to that same location.
Safety: POE delivery is intelligent, and designed to protect network equipment from
overload, underpowering, or incorrect installation.
Reliability: POE power comes from a central and universally compatible source,
rather than a collection of distributed wall adapters. Without PoE you have to be
concerned with obtaining a power cable that has the correct pinouts and plugs for
your particular country. And what if you want to move that device to a different
country? By using PoE you don’t have to worry about that. Also, PoE power-
supplying-equipment can be backed-up by an uninterruptible power supply, or
controlled to easily disable or reset devices.
Scalability: You don’t have to worry about being limited to only a handful of power
outlets in a room. With a PoE switch in that room you now have dozens of
connections that can provide power.
Shown here are some examples of PoE injectors. You would use these when you
have a PD that is ONLY capable of being powered by PoE but your network switch
doesn’t support PoE. In this case, you’re not really reaping any benefits from PoE
because you still need to plug a PoE injector into an AC outlet.
Here you can see that there are various PoE standards. Depending on whichever
standard(s) your PSE supports will dictate the maximum power that device can
deliver.
Keep in mind that each type of switch that can provide power has something called a
“Power Budget” which is the TOTAL amount of power that can be delivered via PoE.
Many switches do not have the capability to deliver maximum PoE levels across each
and every switchport.
The graphic shown here demonstrates how UPoE delivers 60W over Category5e
twisted pair ethernet cable.
There is an IEEE equivalent to Cisco’s UPoE which is called IEEE 802.3bt (also
called 4PPoE). This is also capable of delivering up to 90W of power by using all four
pairs of UTP cabling to deliver power.
Further steps for power negotiation
----After PD is receiving the minimum power it needs, it can send a LLDP or CDP
message to PSE
----LLD-MED option is used to indicate the actual amount of power the PD requires
----CDP can also be used for this same purpose
In this output the “Power Drawn” represents the maximum required power for this
phone, which is 10250 milliwatts (10.25 W)
However this phone has also advertised that is capable of operating with reduced
screen brightness at 6.3 W
The output of this command shows the total power budget (total power available to
be delivered) by each switch in this switch stack (grouping of switches) and how
much has been consumed so far.