Chapter 2
Chapter 2
• It can include routers, switches, bridges, hubs, and wireless access points
(AP).
• The core aggregates the traffic from all the distribution layer, so it
must be capable of forwarding large amounts of data quickly.
Benefits of a Hierarchical Network
• Scalability
• Redundancy
• Performance
• Security
• Manageability
Scalability
networks.
• Access layer switches are connected to two different distribution layer switches to
• If one of the distribution layer switches fails, the access layer switch can switch to the
• Additionally, distribution layer switches are connected to two or more core layer
• End node devices, such as PCs, printers, and IP phones, do not have the ability to
connect to multiple access layer switches for redundancy.
Performance
• Communication performance is enhanced by increasing the performance of
the networking devices.
• Data is sent through aggregated switch port links from the access layer to the
distribution layer.
• The distribution layer then uses its high performance switching capabilities to
forward the traffic up to the core.
• Because the core and distribution layers perform their operations at very
high speeds, there is less controversy for network bandwidth.
Security
• Security is improved and easier to manage, in heretical design.
• Access layer switches can be configured with various port security options that
provide control over which devices are allowed to connect to the network.
• You also have the flexibility to use more advanced security policies at the
distribution layer.
• You may apply access control policies that define which communication
protocols are deployed on your network and where they are permitted to go.
For example, if you want to limit the use of HTTP to a specific user connected at
the access layer, you could apply a policy that blocks HTTP traffic at the
distribution layer
Manageability
• Manageability is relatively simple on a hierarchical network.
NOTE In the most general model, the Building Access layer uses Layer 2
switching, and the Building Distribution layer uses multilayer switching.
o Building Access Layer
• The Building Access layer,
Located within a campus building,
Aggregates end users from different workgroups
Provides uplinks to the Building Distribution layer.
Provides important services, such as
Broadcast
Protocol filtering,
Network access,
IP multicast, and
QoS.
The access switches are dual-attached to the distribution layer
switches.
Also provide Power over Ethernet (PoE)
o Building Distribution Layer
• It aggregates the wiring closets within a building and provides
connectivity to the Core layer.
• Provides aggregation of the access layer networks using
multilayer switching.
• Performs routing, QoS, and access control.
• Redundancy and load balancing with the Building Access and
Campus Core layer are recommended.
• If one connection to the Campus Core layer fails, all routes
immediately switch over to the remaining path.
o Campus Core Layer
• This layer interconnects the Building Distribution layer with the
Server Farm and Enterprise Edge modules.
• The Campus Core layer provides redundant and fast-converging
connectivity.
• It routes and switches traffic as quickly as possible from one
module to another.
Server Farm Module
• Server farm module provides users with internal server resources.
• KEY POINT
• The WAN and MAN and Site-to-Site VPN module does not include the
WAN connections or links; it provides only the interfaces to the WAN.
Service Provider Modules
• The enterprise itself does not implement these modules; however, they
are necessary to enable communication with other networks, using a variety
of WAN technologies, and with Internet service providers (ISP).
• The modules within the Service Provider functional area are as follows:
Internet Service Provider module
PSTN module
Frame Relay/ATM module
Cont…
• Internet Service Provider Module
Its capability to connect multiple remote sites across a single physical connection
reduces the number of point-to-point physical connections required to link sites
Cont.…
Mobility services: Allow users to access network resources regardless of their physical
location.
Storage services: Provide distributed and virtual storage across the infrastructure
Voice and collaboration services: Deliver the foundation by which voice can be carried
across the network, such as security and high availability
Compute services: Connect and virtualize compute resources based on the application
Identity services: Map resources and policies to the user and device