Home > Articles > Cisco > CCDP

Cisco’s Network Architectures for the Enterprise: Functional Areas and Modules

When designing a network, it is important to have an idea of how the different areas of the network all should be connected together. In order to streamline this part of the design process and ensure that well structured designs are produced, Cisco developed the Network Architectures for the Enterprise. This article reviews these different functional areas and modules that were developed.
Like this article? We recommend

When designing a network, it is important to have an idea of how the different areas of the network should be connected together. In order to streamline this part of the design process and ensure that well-structured designs are produced, Cisco developed the Network Architectures for the Enterprise. Part of the development includes a number of functional areas and modules that are used to split up the network, as shown in Figure 1.

Cisco Network Architectures for the Enterprise—Functional Areas and Modules

The first level of division that was developed is high level and includes the following functional areas:

  • Enterprise Campus Function Area
  • Enterprise Edge Functional Area
  • Service Provider Functional Area
  • Remote Functional Area

Enterprise Campus Functional Area

The enterprise campus functional area is intended to be the center of the network design, located at a single location where several different core elements are located and are accessed from all other parts of the network. There are several different technologies and components located at this part of the network, including routing, switching, firewalls, intrusion detection and prevention systems, voice, video, access control, among others.

The second level of division within the enterprise campus functional area includes a couple of different modules:

  • Enterprise Campus Infrastructure— The enterprise campus module is separated out into a number of different layers that include the different parts of the network:
  • Campus Core—The campus core connects together other modules within the enterprise campus as well as the Enterprise Edge functional area. The core focuses on the fast transport of network traffic; as this is the main function of the core, it must have high levels of redundancy and must be able to adapt to network changes quickly.
  • Building Distribution—The building distribution aggregates the traffic from the access layer and provides routing and packet manipulation. This is also the location within the network where policies for QoS, security and traffic loading are implemented.
  • Building Access—The building access is responsible for the connectivity of end devices on the network.
  • Enterprise Data Center—The enterprise data center module is responsible for the support of management services, including monitoring, logging, troubleshooting, and other management features.

Enterprise Edge Functional Area

The enterprise edge functional area is responsible for the aggregation of several different off-campus elements as well as the routing of this traffic into the campus core module within the Enterprise Campus Functional area.

The second level of division within the enterprise edge functional area includes different modules that are used to connect different types of connection; these modules include:

  • E-Commerce—The E-commerce module is responsible for the processing of all electronic transactions. All of the network elements that are involved with forwarding and processing these transactions are included within this module, such as web, application and database servers, firewalls, and network intrusion detection and prevention systems.
  • Internet Connectivity—The Internet connectivity module is responsible for all other public connectivity that is not covered within the e-commerce module. The different network elements in this module include web (not e-commerce), DNS, and FTP servers, firewalls, network intrusion detection and prevention systems and edge routers.
  • Remote Access and VPN—The Remote Access and VPN module is responsible for initiating and terminating remote access connections including VPN traffic coming from offsite users connecting through the Internet connectivity module. The different network elements in the module include Cisco ASA security appliances (VPN termination), firewalls, network intrusion detection and prevention systems and dial-in concentrators (when still used).
  • WAN and MAN and Site-to-Site VPN—The WAN and MAN and Site-to-Site VPN module is responsible for the routing of traffic from remote sites back into the central campus location. This includes the use of technologies such as leased lines, frame relay, ATM, SONET and MPLS, as well as site-to-site VPN technologies.

Service Provider Functional Area

The service provider functional area is responsible for connectivity into Service Provider networks. This includes a number of different connectivity options, from Internet access through Public Switched Telephone Network (PSTN) access.

The second level of division within the service provider functional area includes different modes that are used to connect these different service options:

  • ISP—The ISP module is responsible for connecting the networking to the Internet; this includes access for Enterprise remote locations.
  • Public Switched Telephone Network (PSTN) —The PSTN module is responsible for connecting network elements using analog, ISDN, and wireless technologies (cellular). Often this connectivity is used for Out-of-Band (OOB) management and backup purposes.
  • Frame Relay and ATM Module—The Frame Relay and ATM module is used to connect remote locations via a number of different permanent technologies, including Frame Relay and ATM. This module also includes connectivity using a number of different technologies that are more modern, including Digital Subscriber Lines (DSL), Cable, Wireless (bridging), and Multiprotocol Label Switching (MPLS).

Remote Functional Area

The remote functional area is responsible for connectivity of a number of different remote functional elements, including enterprise branches (connecting through a service provider), enterprise data centers, and enterprise teleworkers.

The second level of division within the remote functional area includes different models that represent the different remote connectivity options:

  • Enterprise Branch—The enterprise branch module includes remote branches that allow employees to work at non-campus locations. These locations are typically responsible for providing security, telephony, and mobility options to these employees, as well as general connectivity into the campus and the different components located inside the enterprise campus.
  • Enterprise Data Center—The enterprise data center module includes a data center that includes all of the same functionality options as the campus data center, but existing at a remote location. This provides an added layer of security when done correctly, as this remote location can provide backup options should something happen to the campus data center location.
  • Enterprise Teleworker—The enterprise teleworker module is responsible for the connectivity of providing connectivity for workers who operate out of different geographically dispersed locations, including home offices, hotels or customer/client sites. Cisco Virtual Office is used to support these workers; Virtual Office provides an ability to provide productivity, security and business resiliency. This solution requires a remote and central equipment presence that is used to provide connectivity back into the central campus location.

Summary

To design a good network and to have it implemented requires many different parts of a process to work and be completed successfully. Cisco’s Network Architecture for the Enterprise provides the different tools that can be used to make the completion of these successful the first time when followed and interpreted correctly. This article provides an overview of the different functional areas and modules that are defined within this architecture and has hopefully provided a base of understanding that can be used when designing a network.

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |