Information Technology Reference
In-Depth Information
Ta b l e 2 - 3
Cisco Enterprise Architecture Model
Enterprise Area or
Module
Description
Enterprise teleworker
The enterprise teleworker module supports a small office, mo-
bile users, or home users providing access to corporate systems
via VPN tunnels.
Borderless Network Services
Cisco borderless network architecture is a next-generation solution that enables connec-
tivity to anyone and anything, anywhere, and at any time. The connectivity needs to be
secure, reliable, and seamless. The borderless architecture optimizes both business and
network performance.
Borderless network services divide into four key pillars of functionality:
Mobility: Cisco Motion delivers anywhere, anytime access to information for wired,
wireless, and remote users from any device. It also provides detection, classification,
location, and mitigation of sources of wireless interference.
Security: Cisco Tr u stS ec provides a foundat ion for identity-directed, policy-based
access, and one-touch ease of use to strengthen security across distributed networks.
Uses Cisco ASA devices, Cisco Virtualization Security, and Cisco AnyConnect, an
endpoint/user service. The Cisco SAFE blueprint provides design and implementa-
tion guidelines for building secure and reliable network infrastructure. Security de-
signs are covered in Chapter 12, “Managing Security,” and Chapter 13, “Security
Solutions.”
Application performance: Application Velocity optimizes the speed and perform-
ance of any application by using Wide Area Application Services (WAAS).
Voice and video (IP Communication): Medianet for the Enterprise optimizes mul-
timedia though the automatic endpoints and optimized network configuration. It re-
duces video deployment time and provides clear and accurate multicast video from
wired to wireless networks with Cisco VideoStream technology. Voice and video de-
sign are covered in Chapter 14, “Voice and Video Design.”
High Availability Network Services
This section covers designs for high availability network services in the access layer.
When designing a network topology for a customer who has critical systems, services, or
network paths, you should determine the likelihood that these components will fail and
design redundancy where necessary. Consider incorporating one of the following types of
redundancy into your design:
Key
To p i c
Wo r k s t a t i o n - t o - r o u t e r r e d u n d a n c y i n t h e b u i l d i n g a c c e s s l a y e r
Server redundancy in the server farm module
 
 
Search WWH ::




Custom Search