You are on page 1of 31

CYCLE 2

nd
2 Semester | A.Y. 2020-2021

MODULE 7
Network Evolution
June 7 – 11, 2021

ELE3
Connecting Networks

Dennis L. Tacadena
Instructor

Institute of Computing Studies


BSIT 4A
Module Week 7: Network Evolution

Learning objectives:
At the end of this lesson, student should be able to:
 Describe the Cisco IoT System.
 Describe the pillars of the Cisco IoT System.
 Explain the importance of cloud computing.
 Explain the importance of virtualization.
 Describe the virtualization of network devices and services.
 Describe software-defined networking.
 Describe controllers used in network programming.

Topic Outline
 Internet of Things
 IoT Elements
 What Is the IoT?
 The Converged Network and Things
 Challenges to Connecting Things
 The Six Pillars of the Cisco IoT System
 IoT Pillars
 The Network Connectivity Pillar
 The Fog Computing Pillar
 The Security Pillar
 Data Analytics Pillar
 Management and Automation Pillar
 Application Enablement Platform Pillar
 Cloud and Virtualization
 Cloud Computing
 Cloud Overview
 Cloud Services
 Cloud Models
 Cloud Computing versus Data Center
 Virtualization
 Cloud Computing and Virtualization
 Dedicated Servers
 Server Virtualization
 Advantages of Virtualization
 Abstraction Layers
 Type 2 Hypervisors
 Virtual Network Infrastructure
 Type 1 Hypervisors
 Installing a VM on a Hypervisor
 Network Virtualization
 Network Programming
 Software-Defined Networking
 Control Plane and Data Plane
 Virtualizing the Network
 SDN Architecture
 Controllers
 SDN Controller and Operations
 Cisco Application Centric Infrastructure
 Core Components of ACI
 Spine-Leaf Topology
 SDN Types
 APIC-EM Features
 APIC-EM ACL Analysis
Reference
Connecting Networks v6 Companion Guide, Cisco Press, Copyright © 2018 Cisco Systems, Inc,
ISBN-13: 978-1-58713-432-6 / ISBN-10: 1-58713-432-2
Connecting Networks (ELE3) Module Week 7
WORKSHEET ACTIVITY/IES:

Student’s Name: CUYUGAN, OMAR SHARIF E. Score:


Year and Section: BSIT 4A Date:

Define the terms and commands


1. Internet of Things (IoT) - The Internet of things describes the network of physical objects

—a.k.a. "things"—that are embedded with sensors, software, and other technologies for

the purpose of connecting and exchanging data with other devices and systems over the

Internet.

2. Cloud computing – the practice of using a network of remote servers hosted on the

internet to store, manage, and process data, rather than a local server or a personal

computer.

3. Virtualization - uses software to create an abstraction layer over computer hardware that

allows the hardware elements of a single computer—processors, memory, storage and

more—to be divided into multiple virtual computers, commonly called virtual machines

(VMs).

4. Software-defined networking (SDN) - Software-defined networking technology is an

approach to network management that enables dynamic, programmatically efficient

network configuration in order to improve network performance and monitoring, making

it more like cloud computing than traditional network management.

5. Machine-to-Machine (M2M) - Machine-to-machine (M2M) communications is used for

automated data transmission and measurement between mechanical or electronic devices.

6. Sensors - a device which detects or measures a physical property and records, indicates,

or otherwise responds to it.

7. Cisco IoT System - provides a comprehensive set of IoT technologies and products that

simplify and accelerate the deployment of infrastructure for the Internet of Things. This

unique systems approach delivers a framework that makes it possible to deploy,

accelerate and innovate with IoT


8. network connectivity pillar - This pillar includes purpose-built routing, switching, and

wireless products available in ruggedized and non-ruggedized form factors.

9. Cloud computing model - the practice of using a network of remote servers hosted on the

internet to store, manage, and process data, rather than a local server or a personal

computer.

10. Fog computing model - is a decentralized computing infrastructure in which data,

compute, storage and applications are located somewhere between the data source and

the cloud.

11. fog computing pillar - Security , Scalability, Open, Autonomy, Reliability, Agility,

Hierarchy, Programmabilty/

12. Fog applications – Linked vehicles, Smart Grids and Smart Cities, Real-time analytics.

13. security pillar – Confidentiality, Intetgrity, Availability, Authenticity, Non Repudiation.

14. Operational Technology (OT) security -  is hardware and software that detects or causes

a change through the direct monitoring and/or control of physical devices, processes and

events in the enterprise,

15. Operational Technology (OT) - is hardware and software that detects or causes a change,

through the direct monitoring and/or control of industrial equipment, assets, processes

and events.

16. IoT Network security - is the act of securing Internet of Things devices and

the networks they're connected to. In the business setting, IoT devices include industrial

machines, smart energy grids, building automation, plus whatever personal IoT devices

employees bring to work.

17. IoT Physical security - is the protection of people, property, and physical assets from

actions and events that could cause damage or loss.

18. data analytics pillar – Agility, Performance and speed.

19. application programming interfaces (APIs) - a system of tools and resources in an

operating system, enabling developers to create software applications.


20. System management and automation pillar - 1 of the 6 Pillars of IOT

21. Application Enablement Platform pillar -  is a technology-centric offering optimized to

deliver a best-of-breed, industry-agnostic, extensible middleware core for building a set

of interconnected or independent IoT solutions for customers.

22. Cisco IOx - is an application environment that is used by businesses ranging from

manufacturing and energy corporations to public sector organizations such as cities and

transportation authorities that use IoT technologies to produce effective business

outcomes.

23. National Institute of Standards and Technology (NIST) - is a physical sciences laboratory

and a non-regulatory agency of the United States Department of Commerce. Its mission

is to promote innovation and industrial competitiveness.

24. Software as a Service (SaaS) - is a software licensing and delivery model in which

software is licensed on a subscription basis and is centrally hosted. It is sometimes

referred to as "on-demand software", and was formerly referred to as "software plus

services" by Microsoft.

25. Platform as a Service (PaaS) - is a category of cloud computing services that allows

customers to provision, instantiate, run, and manage a modular 

26. Infrastructure as a Service (IaaS) -  are online services that provide high-level APIs used to

dereference various low-level details of underlying network infrastructure like physical

computing resources, location, data partitioning, scaling, security, backup etc

27. IT as a Service (ITaaS) - is an operational model where the information technology service

provider delivers an information technology service to a business. The IT service provider

can be an internal IT organization or an external IT services company

28. Public cloud - is a type of computing in which a service provider makes resources

available to the public via the internet. ... Public cloud allows for scalability and

resource sharing that would not otherwise be possible for a single organization to

achieve.

29. Private cloud -  is a computing model that offers a proprietary environment dedicated to a

single business entity. ... A private cloud strategy may be comprised of hardware hosted

locally at a facility owned by a business, or it may be hosted by a cloud service provider.


30. Hybrid cloud -  is a solution that combines a private cloud with one or more

public cloud services, with proprietary software enabling communication between each

distinct service.

31. Community cloud -  is a collaborative effort in which infrastructure is shared between

several organizations from a specific community with common concerns, whether

managed internally or by a third-party and hosted internally or externally.

32. Data center – a large group of networked computer servers typically used by

organizations for the remote storage, processing, or distribution of large amounts of data.

33. server operating system (OS) -  is an operating system specifically designed to run

on servers, which are specialized computers that operate within a client/server

architecture to serve the requests of client computers on the network.

34. single point of failure -  is a part of a system that, if it fails, will stop the entire system

from working.[1] SPOFs are undesirable in any system with a goal of high

availability or reliability, be it a business practice, software application, or other

industrial system.

35. server sprawl -  is a situation in which multiple, under-utilized servers take up more

space and consume more resources than can be justified by their workload.

36. hypervisors -  is a kind of emulator; it is computer software, firmware or hardware that

creates and runs virtual machines. A computer on which a hypervisor runs one or more

virtual machines is called a host machine, and each virtual machine is called a guest

machine.

37. virtual machines (VMs) - is a virtual environment that functions as a virtual computer

system with its own CPU, memory, network interface, and storage, created on a physical

hardware system (located off- or on-premises).

38. management console - A terminal or workstation used to monitor and control a network

either locally or remotely. The term often refers only to management software that resides

in any Windows, Mac or Linux client machine. 


39. Cisco Unified Computing System (UCS) - is a data center server computer product line

composed of computing hardware, virtualization support, switching fabric, and

management software introduced in 2009 by Cisco Systems.

40. Cisco UCS Manager - is the management system for all components in a UCS

Manager. ... You can use any of the interfaces available with this management service

to access, configure, administer, and monitor the network and server resources for all

chassis connected to the fabric interconnect.

41. East-West traffic - denotes a direction of traffic flow within a data center. Based on the

most commonly deployed topology of systems within a data center, East-West traffic

indicates flow of data among devices within a specific data center. 

42. Cisco Network Foundation Protection (NFP) - s a Cisco IOS® Technology. suite that

protects network devices, routing and forwarding of control. information, and

management of traffic bounded to the network devices. Data Plane Protection – protects

the data plane from malicious. traffic.

43. Control plane - n network routing, the control plane is the part of the router architecture

that is concerned with drawing the network topology, or the information in a routing table

that defines what to do with incoming packets.

44. Management plane - n computer networking, the management plane of a networking

device is the element of a system that configures, monitors, and provides management,

monitoring and configuration services to, all layers of the network stack and other parts

of the system.

45. Data plane -  is the part of the software that processes the data requests. By contrast, the

control plane is the part of the software that configures and shuts down the data plane.

The conceptual separation of the data plane from the control plane has been done for

years.

46. VMware- Virtual machine software from VMware, Inc., Palo Alto, CA

(www.vmware.com) that allows multiple copies of the same operating system or several

different operating systems to run in the same x86-based machine. For

years, VMware has been the leader in virtualization software (see virtual machine).


47. Cisco Application Centric Infrastructure (ACI) - ACI is the SDN solution to automate

networking moves, additions and changes in the data center.

48. OpenFlow - s a communications protocol that gives access to the forwarding plane of a

network switch or router over the network

49. OpenStack -  is an open source platform that uses pooled virtual resources to build and

manage private and public clouds.

50. Application Programming Interfaces (APIs) - API is the acronym for Application

Programming Interface, which is a software intermediary that allows two applications to

talk to each other.

51. northbound APIs - In computer networking and computer architecture, a northbound

interface of a component is an interface that allows the component to communicate with a

higher level component, using the latter component's southbound interface

52. southbound APIs - are used to communicate between the SDN Controller and the

switches and routers of the network. They can be open-source or proprietary.

53. North-South traffic - North-South Traffic or Communication denotes a direction of traffic

flow into and out of a data center.

54. SDN controllers - is the application that acts as a strategic control point in a software-

defined network. Essentially, it is the “brains” of the network. Software-

defined networking (SDN) is the separation of a network's control functions from its

forwarding functions.

55. Transport Layer Security (TLS) -  is the successor protocol to SSL. TLS is an improved

version of SSL. It works in much the same way as the SSL, using encryption to protect

the transfer of data and information.

56. Flow Table - a device for measuring the consistency of freshly made concrete or mortar

consisting of a table top that can be raised and dropped and a mold for shaping the test

specimen — compare flow entry 2 sense 6b.

57. Group Table - represent sets of actions for flooding as well as more complex forwarding

semantics (e.g. multipath, fast reroute, and link aggregation). As a general layer of

indirection, groups also enable multiple flow entries to forward to a single identifier (e.g.
IP forwarding to a common next hop). This abstraction allows common output actions

across flow entries to be changed efficiently.

58. Meter Table - onsists of meter entries, defining per-flow meters. A meter measures an

incoming packet rate and performs QoS operations including rate-limiting and DiffServ.

A meter entry includes a meter band as one of the main elements.

59. Application Network Profile (ANP) -  a generalization of AHP which represents a

decision making problem as a network of elements (including criteria and other

alternatives) that are grouped into clusters.

60. end-point groups (EPG) - ot only allow for better mapping of applications to the network

itself, but also for better mapping of the network to application owners and developers. ...

These are used to define the connectivity of application tiers such as web-app-database,

compute, -network -storage.

61. Application Policy Infrastructure Controller (APIC) -  is the main architectural

component of the Cisco ACI solution. It is the unified point of automation and

management for the Cisco ACI fabric, policy enforcement, and health monitoring.

62. Cisco Nexus 9000 Series switches - data center switches deliver proven high

performance and density up to 400G, as well as low latency and exceptional power

efficiency in a range of form factors. The switches are highly programmable and offer

industry-leading software-defined networking for data center automation.

63. spine-leaf topology -  is a two-layer network topology composed of leaf switches

and spine switches. ... Leaf switches mesh into the spine, forming the access layer that

delivers network connection points for servers. Every leaf switch in a leaf-spine

architecture connects to every switch in the network fabric.

64. ACL Analysis - stands for Audit Command Language, and ACL Robotics helps auditors

perform analysis and audit tests on 100% of the available data rather than merely

sampling the data. The ability to audit 100% of the available data assists auditors with

identifying potential fraud patterns and data irregularities.

65. ACL Path Trace - An ACL path trace shows whether the traffic matching your criteria

would be permitted or denied based on the ACLs configured on the path.


OFFICIAL MCC MODULE DISCLAIMER

It is not the intention of the author/s nor the publisher of this module to have monetary gain in
using the textual information, imageries, and other references used in its production. This module
is only for the exclusive use of a bona fide student of Mabalacat City College.
In addition, this module or no part of it thereof may be reproduced, stored in a retrieval system,
or transmitted, in any form or by any means, electronic, mechanical, photocopying, and/or
otherwise, without the prior permission of Mabalacat City College.

You might also like