Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back.
00:01
Cisco Certified Design associate. C C D A. Module two Lights in 2.4. I'm your instructor.
00:11
In the previous video, we talked about a Cisco Enterprise architectural model. From these veto, it will begin to introduce a Hi Evie Inability Network service. He's pretty assessment The question which first hop redundancy Prodigal endemically distributes a client traffic between multiple rodders.
00:31
A h s r p b the r r P c g l b p
00:38
The idea or P?
00:40
The answer will be Gino BP. We'll get we'll discuss this further in the following.
00:45
Well slight.
00:47
When designing a network apology for a customer who has critical systems, service's or network paths, you should have determined that likelihood that is competent will fail. Dad. Desire identities. You wouldn't mess. It's ready, right? Is high availability. Network service is coming into play.
01:06
High availability, never of service, is considering Inc team of one over the following tabs of a redundancy into your design. Right workstation to Roger Redundancy in the building access layer, right server redundancy in a server farm module
01:22
route. Redundancy. We then under between network of confidence in commedia redundancy and the access earlier. We'll start with the workstation to rotter. Tennessee in the building access layer on a workstation has traffic to send a station that is not local. The workstation has many possible ways
01:42
to discover the address off rotter. Only it's a network segment,
01:47
including the following.
01:49
Um
01:49
From these slights, we'll start with the AARP
01:53
or
01:55
some Nike workstations descendant are per frame that find a remote station around. Running proxy off
02:02
can respond with detailing the layer address. Cisco routers run proxy are but by default places configuration.
02:12
Most type you work stations must be configured with ikey addresses. Defar Rotter! We Jesus sometimes called it a default Gateway Inn I I p. Merriment Most a common method for workstation to find a server is via explicit a configuration of the fall router.
02:30
Some AP stacks enable you to configure multiple do for rodders,
02:36
but many other i p implementations of supporting me. One default rotter
02:42
Rdp It's RFC to all 56 Spicy Faison. The extension to the Internet control Massively protocol ICMP. They had a loss and I P Workstation and a broader to run our DP delighted Rapstation all during the rodders address
03:00
rip on I work for station can run ripped to learn about it. Rodders. Although this is not a common practice anymore and it's not a recommended, you should have used a rip in passing remote rather than active amount. Actively motive means that of the station, since the reap frames every 30 seconds.
03:20
Usually in this implementations,
03:22
the work station is that you do a UNIX system or running the rotted or gated the UNIX of process
03:29
hs RP The Siskel H S. R. P provides a way for I p workstations that support only one default rotter to keep communicating with on the Internet work. Even if there are Defar, Rotter becomes unavailable. They just RP works about creating a virtual rotter that has its own Nike and Mac addresses.
03:46
The work stations use basic martial I p address
03:50
as their Defar rotter. They chase RP runners on the land, communicate among themselves to decided there two writers or as active and stand by the activity Rotter sends the periodic hollow messages. The other agents are key rodders. Listen for the hollow messages
04:08
even have active Rotter Fabio's and the other A. J. Starkey Rodders stopped receiving hollow man Tages
04:14
the standby rotter takes over and becomes the active Arana because the new active router assumes both of the phantoms. I pee in a Mac addresses and A and knows the send no change. They continue to send packets into the phantom rodders
04:30
back address, and the new active rotter delivers those package
04:35
A J start. He also works of her proxy ARP, one of Active or H A s A P rotter receives in a ARP request for a note that is not on the local end. The router replies with the friend homes rodders Mac address instead of a stolen it a rather that originally sent to the
04:54
Our reply later loses is a connection.
04:58
The r a p E r R P is a broader redundancy protocol. Defined it in RFC 3768 R F C. 5768 to define a V R R P. B three for both i P V for and I P v six networks
05:13
V. R R P is based on Cisco's Beach, a Sharpie, but is another compatible B R P. Spicy fires in the last election and particle that genetically a size of responsibility for virtual rotter to one of the V. R P Rogers on the land that the R R P rotter controlling the
05:30
I P addresses associated with a virtual rotter
05:32
is called a master at 84 words. Package sent to these ikey addresses. The election process provides a dynamic of fell over in the forwarding responsibility. Should have the master become unavailable.
05:47
These are lost any over the virtual rotter i p addresses a little end to be used as the default first hopper order by and hosts the virtual rotter. Backup assumes that they forwarding responsibility for the Virgin broader shooted a master fail right
06:04
g o p p j l b p. Protect the data. Traveling from a failed router or surrogate is such as H S r p well, allowing packet little the sharing between a group of a re tended rodders. Math words. If a long balancing with H S, R. P and a B R r p work with small networks,
06:21
but a G l B P allows for first hop Hello biasing larger networks.
06:27
The difference in G l B P from H. S. R P is that it provides a four lobotomy thing between multiple read. Ending the Rodders op 248 Ways in the GOP P Group A Little Bodies is about using a single virtue I P address at amount of a Virtual Mac addresses.
06:45
Each host is configured away the same of Virtual I P Address,
06:48
and all writers in the Virtual Roger group participated in that forwarding package. But the vault all runners with a group of forward traffic Arlo Borras or medically J O B P members are communicated between each other through a hallow messages sent every three seconds to the multiple
07:08
to the Mahdi cast address to do for the 0.1 No. Two.
07:13
User data grab protocol. You d be part 3222
07:17
g l b p benefits included. The following loaded Sheriff Joe Beebe can become figuring the way that a traveling from land clients can be shared about multiple rodders. Multiple virtual rodders. Joe BP supports Opportunity. $1 a minute too far apart for rodders. J O B P Group's on each of physical interface of a rotter
07:38
preemption
07:40
Joe B, P and M. Ozu to preempt Active of virtual Get away with a higher priority backup authentication simple tax. The password authentication is that supported
07:51
server redundancy some of America and to need a fully redundant the mirror to file and application servers. For example, in a brokerage firm where traders must access data to buy in a south, stocks to arm or redundant servers can replicated a data. Also,
08:11
you can deploy, says the unified communications manager. See USC and servers
08:15
in clusters for redundancy. This servers should be on different networks on the use of pretending a power supplies to provide a high availability in a server farm. Mama module Right, you have the following options. Single attachment. This is not a recommended because it requires out of the bath. Mac Mac in ISMs.
08:35
Just r p e j o B p. Did Endemically find an alternate router
08:39
do attachment? This solution increases availability by using Rettendon that worker interviews cards Nick Fast, Ethernet faster. Either Channel FTC and it could be big for Channel T e. C part Bono's This unit. Bono's two or four fast or a gigabit Ethernet links to increase of bandwidth
09:01
round redundancy.
09:03
There's a two purposes, right or buzzing. Increasing availability will start with the little bottle. See most i p routing protocols can't balance loads across parallel links that are equal costs. Using the maximum my path is commanded. The change of the number of the links
09:20
did Roger well balanced over for a peek.
09:24
The diva is a four and in maximum mazes. Six This portal bodies in keeping a band with the consistent within a later of the hierarchical motto so that all paths have the same cost. Siskel you. Hence the interrogator way riding particle. Yet R P
09:39
isn't exception because it can't look about as traffic across multiple routes
09:43
that have different metrics by using a feature called Over Reigns
09:48
Ah, hot taste. The Routing Protocol does little about Ussing over unequal band with the path
09:56
as long as the hop calm is equal. After this Lord Inca becomes saturated pack, it draws out of the saturated link prevents full utilization of the higher capacity links. This scenario is called a pinhole congestion.
10:11
You can avoid a pinhole congestion by designing and provisioning. You call
10:16
being with the links within one layer off the hierarchy or by using a rotting protocol that takes being with into account. I peel Obama's Indian assistant rotter depends on which switching bow to the router uses process. Waging little baas on the packet of backpacking bases.
10:35
Fast autonomous silicon
10:37
optimum distributed at that flows. Raging roboticist on the destination by destination bases Because of the processor caches, information used the capsule of the package based on the destination for these types of ah,
10:52
sweet tomatoes.
10:56
Next one gonna be increasing availability right. In addition to facilitating ah Longbottom sing, read ended around browse increase Network of Inability. You should keep being with the consistent within a given design. Confident of low buzzing.
11:11
Another reason to keep the anyway. The consistent within the layer off hierarchy is that
11:16
routing protocols com urge much faster on that political equal cost paths to the destination network by using the redundant mash the network of designs. But you can minimize the fact of link feeders you can design. Read ended. There were links to provide a full mash or
11:35
a well connected a partial bash
11:37
in a full MASH network. Every router it has a link thio Every other order as shown below right. Awful lashing out. American provides complete a redundancy and provides a good performance because this is a just a single hop delay between any two sites.
11:56
The number of the links in a food mash is N multiply
12:00
and men. It's one divide by two. What we're in is the number of the writers. Each router is connected to every other rotter,
12:09
then partial mash Ah, full match never can be expensive to implement in ones because of the required a number off links. In addition, groups of rodders that broadcasts routing the updates where service the advertisements have, ah, practical limits the skating
12:28
as the number of the rotting piers increases
12:31
the amount of a being away, then the CPU resource is devoted to processing. Broadcast the increases. A suggested the guide arias to keep a broadcast traffic at less than 20% of the van with a beach link least amount of limits. The number of a pure rodders that it can exchange
12:50
routing tables or service out of her past meets
12:52
when designing for link band with reserve, 80% off it for dead. A voice and a video traffic said that the rest can be used for rotting and other link traffic.
13:03
When planning redundancy, follow guidelines of her simple hydrological desire
13:09
diagram a below the streets. Classic Oh hi, Roge ical and read in In In our Enterprise Designed that uses a partial match rather than a full nourished apology for land is lies. Links between the access and the distribution layers can be fast eater Nate, which links to the core at a gigabit either and speeds
13:31
link media redundancy Right in mission critical applications are often necessary to provide a redundancy media. There's layer to earlier free. It's thoroughly layer to write and switch to the network's switches can have a victory that links to each other.
13:48
This redundancy is a good because it minimizes downtime,
13:52
but it can result in broadcast continuous, continuously circling the network, which is called a Prada cost storm. Because Cisco switches implemented I Triple E a surge of that wandy spanning trooper algorithm, you can avoid this looping lian spanning two particle as T p.
14:11
Right. The spanning tree over thumb guarantees that only one path is active in between two natural stations. The algorithm permits redone and paths that are automatically activated when the active path experience says problems. Ice T P has design
14:28
limitations of only allowing one over. The redundant path is to be active,
14:33
V S s. Can we use the way of the Countess to 65 handler switches to overcome. There's a limitation.
14:39
Use either town of the bottle links for Lobato. Same links of bono and powers of a 2248 groups. A advocates of the ban weighs over the links. Hence, the 10 g e ports becomes 20. G e pours off the van with when they are low. Note for
14:56
more granular little about a scene. Use a combination of a source in the destination. Purport little by rising
15:03
they've available on the switch. In current networks, either channel uses our A C p, which is a standard based negotiation protocol that is defining our trip. Oh, easier to Guthrie 80 and older Solution included. Assist appropriator EPDP Particle
15:20
L. A CPU helps protect against the layer. Two moves
15:24
that are caused by these configuration. One downside that introduces overhead and delay was setting up of the bono
15:33
really are free because of wildlings are often critical pieces of the Internet work. One environments, often deployed, returned in the media.
15:43
You can provisioned back other links so that they become active when a primary link a ghost there or becomes congested, often backup links, or use up different the technology. For example, it is common to use the Internet V. P s to the backup of primary interest links in today's networks
16:02
by using floating is the Attica routes
16:03
You can spice if either the backup around must have a higher in the mystery of the distance, use the bicycle riders for selected routing information so that it is not a normally used. The last of the primary route goes down. No one provisioning back up or links.
16:19
Learn as much as possible about a physical circuit of routing right
16:23
different carriers and sometimes use the same facilities, meaning that you are back of a path and that be susceptible to the same fitters as your primary path. Do some investigative work to ensure that your backup a really is acting as a backup.
16:41
Cisco supports multiple multilink appointed pliant particle M P P P, which isn't an Internet engineering task force. I e. T f c enter for Ice T and B Channel or a synchronous Ciro interface aggregation it Barnes multiple running's into a single logical
16:59
cello, and PPP is defining our obscene. 1990
17:03
mm PPP does not specify Holland rodders should accomplish the decision making process to bring out the extra channels is that they seeks to to the insurer that package arriving in sequence out of the receiver rotter. Then the data is encapsulated within
17:21
P, P, P and a. The data Graham is giving a
17:22
sequence number out of the receiving rotter. PPP uses this sequence. Number two recreated a. The original data stream. Multiple channels appear as one logical links to op earlier particles for our friend. Lady never works.
17:38
F r F 16.1 Modeling Different relay is used to perform the senator
17:44
function
17:47
isn't running. Chapter Question number one in which to place is a redundancy recommended in a enterprise campus. Never desire was to a puting distribution. Be campus core. See building access The U Commerz e Interact activity Technically in the enterprise edge.
18:06
The former modular used right D m z e commerce remote access VPN, Internet.
18:11
One man All this enterprise adieu adieu was definitely connected. A cameras in court, so we should go with
18:19
building distribution of cameras, score right
18:26
learning check crossing number to another and a prize earlier to switch a number which protocol must be running a nibbling curry Dennis E A k a g p b c d p c L a c p d STP SAS Kiki
18:45
spanning tree Per article
18:49
In today's briefing a lecturer, we disguise the hi everybody Network service is discussed Workstation rotter Redundancy server Redundancy and a rock Redundancy Lingering tendency
19:03
Any questions? Feel free to contact me Otherwise they're gonna see you in the next of Ugo. Thank you for watching by friend out.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor