Professional Documents
Culture Documents
nd
2 Semester | A.Y. 2020-2021
MODULE 7
Network Evolution
June 7 – 11, 2021
ELE3
Connecting Networks
Dennis L. Tacadena
Instructor
Learning objectives:
At the end of this lesson, student should be able to:
Describe the Cisco IoT System.
Describe the pillars of the Cisco IoT System.
Explain the importance of cloud computing.
Explain the importance of virtualization.
Describe the virtualization of network devices and services.
Describe software-defined networking.
Describe controllers used in network programming.
Topic Outline
Internet of Things
IoT Elements
What Is the IoT?
The Converged Network and Things
Challenges to Connecting Things
The Six Pillars of the Cisco IoT System
IoT Pillars
The Network Connectivity Pillar
The Fog Computing Pillar
The Security Pillar
Data Analytics Pillar
Management and Automation Pillar
Application Enablement Platform Pillar
Cloud and Virtualization
Cloud Computing
Cloud Overview
Cloud Services
Cloud Models
Cloud Computing versus Data Center
Virtualization
Cloud Computing and Virtualization
Dedicated Servers
Server Virtualization
Advantages of Virtualization
Abstraction Layers
Type 2 Hypervisors
Virtual Network Infrastructure
Type 1 Hypervisors
Installing a VM on a Hypervisor
Network Virtualization
Network Programming
Software-Defined Networking
Control Plane and Data Plane
Virtualizing the Network
SDN Architecture
Controllers
SDN Controller and Operations
Cisco Application Centric Infrastructure
Core Components of ACI
Spine-Leaf Topology
SDN Types
APIC-EM Features
APIC-EM ACL Analysis
Reference
Connecting Networks v6 Companion Guide, Cisco Press, Copyright © 2018 Cisco Systems, Inc,
ISBN-13: 978-1-58713-432-6 / ISBN-10: 1-58713-432-2
Connecting Networks (ELE3) Module Week 7
WORKSHEET ACTIVITY/IES:
—a.k.a. "things"—that are embedded with sensors, software, and other technologies for
the purpose of connecting and exchanging data with other devices and systems over the
Internet.
2. Cloud computing – the practice of using a network of remote servers hosted on the
internet to store, manage, and process data, rather than a local server or a personal
computer.
3. Virtualization - uses software to create an abstraction layer over computer hardware that
more—to be divided into multiple virtual computers, commonly called virtual machines
(VMs).
6. Sensors - a device which detects or measures a physical property and records, indicates,
7. Cisco IoT System - provides a comprehensive set of IoT technologies and products that
simplify and accelerate the deployment of infrastructure for the Internet of Things. This
9. Cloud computing model - the practice of using a network of remote servers hosted on the
internet to store, manage, and process data, rather than a local server or a personal
computer.
compute, storage and applications are located somewhere between the data source and
the cloud.
11. fog computing pillar - Security , Scalability, Open, Autonomy, Reliability, Agility,
Hierarchy, Programmabilty/
12. Fog applications – Linked vehicles, Smart Grids and Smart Cities, Real-time analytics.
14. Operational Technology (OT) security - is hardware and software that detects or causes
a change through the direct monitoring and/or control of physical devices, processes and
15. Operational Technology (OT) - is hardware and software that detects or causes a change,
through the direct monitoring and/or control of industrial equipment, assets, processes
and events.
16. IoT Network security - is the act of securing Internet of Things devices and
22. Cisco IOx - is an application environment that is used by businesses ranging from
manufacturing and energy corporations to public sector organizations such as cities and
outcomes.
23. National Institute of Standards and Technology (NIST) - is a physical sciences laboratory
and a non-regulatory agency of the United States Department of Commerce. Its mission
24. Software as a Service (SaaS) - is a software licensing and delivery model in which
services" by Microsoft.
25. Platform as a Service (PaaS) - is a category of cloud computing services that allows
26. Infrastructure as a Service (IaaS) - are online services that provide high-level APIs used to
27. IT as a Service (ITaaS) - is an operational model where the information technology service
28. Public cloud - is a type of computing in which a service provider makes resources
resource sharing that would not otherwise be possible for a single organization to
achieve.
29. Private cloud - is a computing model that offers a proprietary environment dedicated to a
single business entity. ... A private cloud strategy may be comprised of hardware hosted
distinct service.
31. Community cloud - is a collaborative effort in which infrastructure is shared between
32. Data center – a large group of networked computer servers typically used by
organizations for the remote storage, processing, or distribution of large amounts of data.
33. server operating system (OS) - is an operating system specifically designed to run
34. single point of failure - is a part of a system that, if it fails, will stop the entire system
industrial system.
35. server sprawl - is a situation in which multiple, under-utilized servers take up more
space and consume more resources than can be justified by their workload.
36. hypervisors - is a kind of emulator; it is computer software, firmware or hardware that
creates and runs virtual machines. A computer on which a hypervisor runs one or more
virtual machines is called a host machine, and each virtual machine is called a guest
machine.
system with its own CPU, memory, network interface, and storage, created on a physical
38. management console - A terminal or workstation used to monitor and control a network
either locally or remotely. The term often refers only to management software that resides
Manager. ... You can use any of the interfaces available with this management service
to access, configure, administer, and monitor the network and server resources for all
41. East-West traffic - denotes a direction of traffic flow within a data center. Based on the
most commonly deployed topology of systems within a data center, East-West traffic
42. Cisco Network Foundation Protection (NFP) - s a Cisco IOS® Technology. suite that
management of traffic bounded to the network devices. Data Plane Protection – protects
43. Control plane - n network routing, the control plane is the part of the router architecture
that is concerned with drawing the network topology, or the information in a routing table
device is the element of a system that configures, monitors, and provides management,
monitoring and configuration services to, all layers of the network stack and other parts
of the system.
45. Data plane - is the part of the software that processes the data requests. By contrast, the
control plane is the part of the software that configures and shuts down the data plane.
The conceptual separation of the data plane from the control plane has been done for
years.
(www.vmware.com) that allows multiple copies of the same operating system or several
48. OpenFlow - s a communications protocol that gives access to the forwarding plane of a
49. OpenStack - is an open source platform that uses pooled virtual resources to build and
50. Application Programming Interfaces (APIs) - API is the acronym for Application
52. southbound APIs - are used to communicate between the SDN Controller and the
54. SDN controllers - is the application that acts as a strategic control point in a software-
forwarding functions.
55. Transport Layer Security (TLS) - is the successor protocol to SSL. TLS is an improved
version of SSL. It works in much the same way as the SSL, using encryption to protect
56. Flow Table - a device for measuring the consistency of freshly made concrete or mortar
consisting of a table top that can be raised and dropped and a mold for shaping the test
57. Group Table - represent sets of actions for flooding as well as more complex forwarding
semantics (e.g. multipath, fast reroute, and link aggregation). As a general layer of
indirection, groups also enable multiple flow entries to forward to a single identifier (e.g.
IP forwarding to a common next hop). This abstraction allows common output actions
incoming packet rate and performs QoS operations including rate-limiting and DiffServ.
60. end-point groups (EPG) - ot only allow for better mapping of applications to the network
itself, but also for better mapping of the network to application owners and developers. ...
These are used to define the connectivity of application tiers such as web-app-database,
61. Application Policy Infrastructure Controller (APIC) - is the main architectural
component of the Cisco ACI solution. It is the unified point of automation and
62. Cisco Nexus 9000 Series switches - data center switches deliver proven high
performance and density up to 400G, as well as low latency and exceptional power
and spine switches. ... Leaf switches mesh into the spine, forming the access layer that
64. ACL Analysis - stands for Audit Command Language, and ACL Robotics helps auditors
perform analysis and audit tests on 100% of the available data rather than merely
sampling the data. The ability to audit 100% of the available data assists auditors with
65. ACL Path Trace - An ACL path trace shows whether the traffic matching your criteria
It is not the intention of the author/s nor the publisher of this module to have monetary gain in
using the textual information, imageries, and other references used in its production. This module
is only for the exclusive use of a bona fide student of Mabalacat City College.
In addition, this module or no part of it thereof may be reproduced, stored in a retrieval system,
or transmitted, in any form or by any means, electronic, mechanical, photocopying, and/or
otherwise, without the prior permission of Mabalacat City College.