1.1 Explain the different design principles used in an enterprise network
1.1.a Enterprise Network Design:
There are different design principles used in enterprise network design, including:
Tier 2 Design: This is a hierarchical design that includes access and distribution layers. The access layer connects end devices, such as PCs and printers, while the distribution layer aggregates traffic from the access layer and connects to the core layer. This design provides a scalable and modular network that is easy to manage.
Tier 3 Design: This is a hierarchical design that includes access, distribution, and core layers. The access layer connects end devices, the distribution layer aggregates traffic from the access layer, and the core layer provides high-speed switching and routing for the distribution layer. This design is used in large enterprise networks and provides a high level of scalability, reliability, and performance.
Fabric Design: This is a modern design that uses software-defined networking (SDN) to create a single, unified network fabric. The fabric design provides a flexible, scalable, and automated network that can adapt to changing business needs.
Capacity Planning: This involves estimating the future growth of the network and planning for the necessary capacity to support it. Capacity planning includes analyzing traffic patterns, predicting future traffic growth, and designing the network to accommodate the anticipated traffic.
1.1.b High Availability Techniques:
High availability techniques are used to ensure that network services are always available, even in the event of hardware or software failures. Some of the high availability techniques used in enterprise networks include:
Redundancy: This involves using multiple components, such as switches or routers, to provide backup in case of failure. Redundancy can be achieved through device-level redundancy, link-level redundancy, or path-level redundancy.
First Hop Redundancy Protocols (FHRP): This is a protocol used to provide redundancy for IP default gateways. FHRP allows multiple routers to share the same IP address and provide redundancy in case of failure.
Stateful Switchover (SSO): This is a feature used to provide redundancy for network devices, such as switches or routers. SSO allows the active device to synchronize its state with the standby device, so that if the active device fails, the standby device can take over without interruption.
1.2 Analyze design principles of a WLAN deployment
1.2.a Wireless Deployment Models:
There are different wireless deployment models that can be used in WLAN design, including:
Centralized: This model uses a centralized controller to manage and control the wireless access points (APs). All the configuration and management tasks are performed by the controller, which communicates with the APs over the wired network.
Distributed: This model distributes the control and management functions among the APs. Each AP acts as a controller for the nearby APs, and all the APs work together to provide a seamless wireless network.
Controller-less: This model eliminates the need for a central controller. Each AP operates independently and makes its own decisions about channel selection, power levels, and other network settings.
Controller-based: This model uses a central controller to manage and control the APs. The controller communicates with the APs over the wired network and provides centralized management and control of the wireless network.
Cloud: This model uses a cloud-based controller to manage and control the wireless network. The controller is hosted in the cloud and can be accessed from anywhere using a web browser.
Remote Branch: This model is designed for remote branch offices or small businesses. It uses a small, all-in-one device that combines the functions of a router, switch, and wireless access point.
1.2.b Location Services in a WLAN Design:
Location services are used to track the physical location of wireless clients and devices in a WLAN. This can be useful for a variety of applications, such as asset tracking, security, and location-based services. There are different location services that can be used in a WLAN design, including:
Radio Frequency Identification (RFID): This technology uses radio waves to identify and track objects that have an RFID tag attached to them. RFID can be used to track assets or inventory in a warehouse or to locate people in a large building.
Wireless LAN Context-Aware Services (WLCS): This technology uses wireless access points to detect the location of wireless devices based on their signal strength and other factors. WLCS can be used to track the location of people or devices in a building or to provide location-based services.
Global Positioning System (GPS): This technology uses satellite signals to determine the location of a device. GPS can be used to track the location of vehicles or assets that are moving outdoors.
Bluetooth Low Energy (BLE): This technology uses low-power Bluetooth signals to detect the location of nearby devices. BLE can be used to track the location of people or assets in a building or to provide location-based services.