ScaN_planningGuide_Chapter1_final

Download Report

Transcript ScaN_planningGuide_Chapter1_final

CCNA 5.0
Planning Guide
Chapter 1: Introduction to
Scaling Networks
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Chapter 1: Objectives
 Describe the use of a hierarchical network for a small business.
 Describe recommendations for designing a network that is scalable.
 Describe the type of switches available for small-to-medium-sized
business networks.
 Describe the type of routers available for small-to-medium-sized
business networks.
 Configure and verify basic settings on a Cisco IOS device.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Chapter 1: Overview
 Businesses rely on the network infrastructure to provide missioncritical services.
 Network designers must design and build an enterprise network that
is scalable and highly available.
 This chapter introduces strategies that can be used to
systematically design a highly functional network, such as the
hierarchical network design model, the Cisco Enterprise
Architecture, and appropriate device selections.
 The goals of network design are to limit the number of devices
impacted by the failure of a single network device, provide a plan
and path for growth, and create a reliable network.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Chapter 1: Assessment
 Students should complete Chapter 1 exam after completing
Chapter 1.
 Worksheets and labs and quizzes can be used to informally
assess student progress.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Chapter 1: Activities
What activities are associated with this chapter?
 1.0.1.2 Class Activity – Network by Design
 1.1.1.6 Activity – Identify Cisco Enterprise Architecture Modules
 1.1.2.6 Activity – Identify Scalability Terminology
 1.2.1.6 Activity – Selecting Switch Hardware
 1.2.1.7 Packet Tracer – Comparing 2960 and 3560 Switches
 1.2.1.8 Lab – Selecting Switching Hardware
 1.2.2.4 Activity – Identifying the Router Category
 1.3.1.1 Class Activity – Layered Network Design Simulation
 1.3.1.3 Packet Tracer – Skills Integration Challenge
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
Chapter 1: Packet Tracer Activity Password
 Below is the password for all the Packet Tracer activities in this
chapter:
PT_ccna5
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Chapter 1: New Terms and Commands
What terms and commands are introduced in this chapter?
1.1.1.3
1.1.1.4
1.1.1.5
1.1.2.2
1.1.2.3
1.1.2.5
Presentation_ID
Three-layer Hierarchical Design Model
Access Layer
Distribution Layer
Core Layer
Cisco Enterprise Architecture
Enterprise Campus
Enterprise Edge
Service Provider Edge
Failure Domain
Switch Block
Spanning Tree Protocol (STP)
LAN Redundancy
Link Aggregation
Etherchannel
Multiarea OSPF
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Chapter 1: New Terms and Commands (cont.)
What terms and commands are introduced in this chapter?
1.2.1.1 Campus LAN Switches
Cloud-managed Switches
Cisco Meraki Cloud-managed Access Switches
Data Center Switches
Service Provider Switches
Virtual Networking
Fixed Configuration
Modular Configuration
Stackable
Non-stackable
1.2.1.2 Port Density
Small Form-factor Pluggable (SFP) Devices
1.2.1.3 Forwarding Rates
1.2.1.5 Multilayer Switches
Application-specific Integrated Circuits (Asics)
Switched Virtual Interface (SVI)
1.2.3.2 Out-of-band Management
In-band Management
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Chapter 1: New Terms and Commands (cont.)
What terms are introduced in this chapter?
1.2.3.4 show ip protocols
show ip route
show ip ospf neighbor
show interfaces
show ip interfaces
show ip interface brief
show protocols
show cdp neighbors
1.2.3.5 copy running-config startup-config
erase startup-config
delete flash:vlan.dat
show running-config
1.2.3.6 show port-security
show port-security address
show mac-address-table
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Chapter 1: Best Practices
Prior to teaching Chapter 1, the instructor should:
 Complete Chapter 1 exam.
 Have students evaluate their school’s network design. How does it
compare to the hierarchical or modular design model?
 Invite the head of IT to discuss the school’s network design with the
class.
 Provide hands-on activities to review and practice basic switch and
router configuration.
 Use the Syntax Checker to practice switch and router configuration.
 Visit http://www.cisco.com for more information on Cisco devices.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Chapter 1: Additional Help
 For additional help with teaching strategies, including lesson plans,
analogies for difficult concepts, and discussion topics, visit the
CCNA Community at http://community.netacad.net/web/ccna/files.
 If you have lesson plans or resources that you would like to share,
upload them to the CCNA Community to help other instructors.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Chapter 1: Topics Not in ICND2 200-101
 This section lists topics covered by this chapter that are NOT listed
in the ICND2 200-101 blueprint. Those topics are posted at
http://www.cisco.com/web/learning/exams/list/icnd2b.html.
 Instructors could skip these sections; however, they should provide
additional information and fundamental concepts to assist the
student with the topic.
 NO TOPICS FROM CHAPTER 1 ARE OBJECTIVES OF THE
ICND2.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14