Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back, Cisco Certified Design associate CCD. A Margin for lice in 4.2 I'm your instructor wing.
00:10
In the previous video, we talked about the enterprise D C. Architecture ER promises video. What will begin to introduce Dennis Internet work. A program ability
00:20
pre assessment question which to descriptions of the Sistol application centric infrastructure or to choose to
00:28
a utilizes a spying and leave apology. Be capable of supporting virtual devices only see allows for network of programming based on application requirements. He utilizes an f loafer management of the A C I a. Firebreak
00:44
utilize these are moan for management over the sea I February.
00:49
The answer is a utilizing the spying and leave apologies. Cisco. Next is the nine k Sweetface, you know, are capable for Cisco, a CIA infrastructure, right using a Spanish leave apology
01:04
and a sea allows for network programming based on application requirements. That's the key point for a pick, right? Because application centric, that means, like application to me, the based on application requirements. The rest of the options are not related. This
01:23
okay, here's the top baker we gonna discuss.
01:27
It isn't a network program ability,
01:30
never the program ability in the deadest center is a constantly evolving, but it is definitely a scale that is a highly desired of her network engineers who want to stay relevant in industry because unreliable in a stable and that we're going infrastructure is essential for business, continued E
01:48
network engineers. I have a lot of it pressures put upon them to keep the never happen and running at all times.
01:55
When deploying new applications in a dissenter, network engineer is usually considered a end and path between the users and the applications. The end and path may go through multiple network devices, which leads to a box by box configuration that is required to bring up the new applications.
02:13
This box by box approach He doesn't know how to scale well and is more prone to human configuration errors.
02:20
As we progress with the network program ability, we need to examine approaches that all changes to be to the network about automation technologies,
02:30
techniques that enable alignment with business of velocity, agility and continue T in order to regularly scale on ever getting service is the mindset of the network. Engineers need to adapt on M breezing automation
02:45
in a similar way, that virtual ization that has improved in the deployment timeframes of a computer infrastructures
02:52
automating doesn't need to be done all and it was. Network engineers can start by automating processes that are easy to do but to require a lot of time to complete. As more and more that working processes are automated, the fear of a teen years is reduced.
03:08
The path to network program ability can be broken down into the three faces face one configure. Implementation details are translated directly into syntax for configuration changes made a box by box existing that with my allergies
03:25
is still required with underlying protocols in such as I P. T C P, P, D, P and O S. P. F.
03:31
Face to provision in view of the network has a whole rather than box by box. First Autumn. It's easy to do that work processes before moving on to more advanced automation. Face three program. The network is a programming the based on application requirements for a network resource is
03:51
this face, and it was the never to regularly prevision new service is and applications where the speed, flexibility and H a principles in mind
04:00
as the end software defined ever gas tm architectural references points in the network that have opener vases that enable software development
04:11
centralized. Asked the end software can control the flow of network traffic through a collection of a number of devices. Additionally, other service is that include a computer storage or network security functions can exist as well, such as a software inspection and modification implications, as the end is also commonly referred to as the
04:30
separation of a control plans and at the other planes
04:33
as the end is not open floor network a functional virtualization and after the
04:39
as the architecture consists of three layers application earlier business implications with a director, a p I access to the control earlier control Earlier control playing surfaces were the direct AP eyes for connections to a complete application and infrastructure layers infrastructure layer.
04:57
They're playing at work devices that connected and points to the control earlier for programming instructions.
05:06
Controllers as THEAN controllers provide a centralized control of an Apple devices in that airplane, including decisions regarding packet of forwarding, routing, applying que wise and all security policy. As Thean controllers communicated to the never devices using softball on inter veces and some can integrate it into orchestration systems
05:26
by a North bound interfaces.
05:29
Many asked. The young controllers exists, including some from a commercial vendors to suggest Siskel and of'em wear and others that are open source based. Here's a list of Osama as theon controllers that are currently available. System a pick
05:44
policy based controller and part of us is Gracie. I policies the controllers that find a set of policies using a
05:50
the clarity of the model that tells the never device the intent over the policy by but not how to implement it. Devices Air trusted to implement that the policy based on the intent provided, which implies that distributed control Plane. The Emory NSX controller.
06:09
Overly rich order that exposes the network The abstractions.
06:13
Open daylight Open source. Controller from the lane explanation. Pure open flow controller that can control switching and routing decisions for open flow enabled and there were devices.
06:25
AP Eyes application programming interfaces AP Eyes are used it for a communication between Nasty and controllers and Edward devices North Bondi guys communicated with That's the end applications at a softball on a pea eye's communicated net word elements.
06:40
For example, Open flow is an industry standard, a P I that works with the white
06:46
LeBeau based the switches and that cough as a particle used for the configuration of the devices with the XML formatted. A message is that also uses a chaos.
06:59
A c i application centric infrastructure. A. C. I. Is the flagship Cisco Dennis. Enter architecture that takes a different approach to solving data center challenges. A. C. I enables the never to be programmed using an application centric approach
07:15
based only requirements over the application, and it can support both bare metal and a virtualized the computer infrastructures.
07:20
In addition, a C I also provides feedback on the underlying physical network, which can be used for tuning or troubleshooting over the application. A. C I is a stateless network infrastructure based on the white list model, using a spiny physical network of fabric, and it's controlled about it. They picked Chris Shorter Cut Coster.
07:41
This is the lazy eye solution consists of the following incompetence.
07:45
A pick the application centric infrastructure. Torture is used for centralized the management of the fabric. Eight. Take a cluster are sets of ah, three or more comforters for high availability. Next is nine k. Serious wages.
08:01
Physical network hardware based on spy and leave architecture to Francisco A. C I.
08:05
Ah, they are chassis is a beast in the nexus and 9 95 100 fix the base the next 9300 and never devices to choose from with specific models for spying or leave functionality. Cisco Lacey I devise the application requirements using what is called on the application profile.
08:26
The petition provided there's a logical mapping of how the application will be used on Edward.
08:31
For example, if you have a free T replication constant sitting on the Web application of D beat, the application will have policies defined for security, quality with surveys and all. Little balancing of the traffic moves between the tears off the application.
08:48
Learning check. Crescent number. Why insist Khaleesi I. Which option is the unified point of automation management Monitoring on a programmable
08:56
a postman Be a pick C rest the path. All the answer is epic. There's the brain right
09:07
question number. Do what that's describes of the characteristics of a system Data center, Architecture foundation, a bare metal servers. Be never computer storage. See security. AKI s a little bonding the email and file sharing its network computer storage.
09:26
In today's brief lecture with this dust never program ability as the end application centric infrastructure. Any questions? Feel free to contact me. Otherwise I'll see you in Exeter, Vito. Bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor