SlideShare une entreprise Scribd logo
1  sur  7
Cisco suggests a Three−Tier (Three Layer) hierarchical network model,
that consists of three layers: the Core layer, the Distribution layer, and the
Access layer. Cisco Three-Layer network model is the preferred approach
to network design.
Core Layer
 Core Layer consists of biggest, fastest, and most expensive
routers with the highest model numbers and Core Layer is
considered as the back bone of networks.
 Core Layer routers are used to merge geographically separated
networks.
 The Core Layer routers move information on the network as fast
as possible.
 The switches operating at core layer switches packets as fast as
possible.
Distribution layer
 The Distribution Layer is located between the access and core
layers.
 The purpose of this layer is to provide boundary definition by
implementing access lists and other filters.
 Therefore the Distribution Layer defines policy for the network.
 Distribution Layer include high-end layer 3 switches.
 Distribution Layer ensures that packets are properly routed
between subnets and VLANs in your enterprise.
Access layer
 Access layer includes access switches which are connected to the
end devices (Computers, Printers, Servers etc).
 Access layer switches ensures that packets are delivered to the
end devices.
Benefits of Cisco Three-Layer hierarchical model
The main benefits of Cisco Three-Layer hierarchical model is
that it helps to design, deploy and maintain a scalable,
trustworthy, cost effective hierarchical internetwork.
 Better Performance:
Cisco Three Layer Network Model allows in creating high
performance networks
 Better management & troubleshooting:
Cisco Three Layer Network Model allows better network
management and isolate causes of network trouble.
 Better Filter/Policy creation and application:
Cisco Three Layer Network Model allows better filter/policy
creation application.
 Better Scalability:
Cisco Three Layer Network Model allows us to efficiently
accommodate future growth.
 Better Redundancy:
Cisco Three Layer Network Model provides better redundancy.
Multiple links across multiple devices provides better
redundancy. If one switch is down, we have another alternate
path to reach the destination.

Contenu connexe

Tendances

Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
asimnawaz54
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 

Tendances (20)

Mpls technology
Mpls technologyMpls technology
Mpls technology
 
IPv6
IPv6IPv6
IPv6
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Layered Architecture
Layered ArchitectureLayered Architecture
Layered Architecture
 
IntServ & DiffServ
IntServ & DiffServIntServ & DiffServ
IntServ & DiffServ
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
 
IEEE presentation
IEEE presentationIEEE presentation
IEEE presentation
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 
VTP
VTPVTP
VTP
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 

En vedette

Vacations in the Eyes of Women
Vacations in the Eyes of WomenVacations in the Eyes of Women
Vacations in the Eyes of Women
swansonp9319
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 

En vedette (20)

CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
Setting up SSH
Setting up SSHSetting up SSH
Setting up SSH
 
Vacations in the Eyes of Women
Vacations in the Eyes of WomenVacations in the Eyes of Women
Vacations in the Eyes of Women
 
Loopback
LoopbackLoopback
Loopback
 
Configuring Standard ACLs
Configuring Standard ACLsConfiguring Standard ACLs
Configuring Standard ACLs
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domain
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
CCNA Data Center Host to Host Communications
CCNA Data Center Host to Host CommunicationsCCNA Data Center Host to Host Communications
CCNA Data Center Host to Host Communications
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Chapter05
Chapter05Chapter05
Chapter05
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network design
Network designNetwork design
Network design
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Similaire à Cisco's Three-tier Hierarchical Network Model

Lecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptxLecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptx
ssuserc1e786
 
The key lan layers
The key lan layersThe key lan layers
The key lan layers
Pratik Pawar
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1
nixon
 
Osi model
Osi modelOsi model
Osi model
ufaq kk
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBA
KK Bajpai
 

Similaire à Cisco's Three-tier Hierarchical Network Model (20)

Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1
 
Mod 2 end copy
Mod 2 end copyMod 2 end copy
Mod 2 end copy
 
Chapter5 16 marks for PG PAWSN
Chapter5 16 marks for PG PAWSNChapter5 16 marks for PG PAWSN
Chapter5 16 marks for PG PAWSN
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
Lecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptxLecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptx
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Networks
Networks Networks
Networks
 
Ncsweek2 osi model
Ncsweek2 osi modelNcsweek2 osi model
Ncsweek2 osi model
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 
The key lan layers
The key lan layersThe key lan layers
The key lan layers
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1
 
Osi model
Osi modelOsi model
Osi model
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBA
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 

Plus de NetProtocol Xpert

Plus de NetProtocol Xpert (20)

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
 
Regular expression examples
Regular expression examplesRegular expression examples
Regular expression examples
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Dernier (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Cisco's Three-tier Hierarchical Network Model

  • 1.
  • 2. Cisco suggests a Three−Tier (Three Layer) hierarchical network model, that consists of three layers: the Core layer, the Distribution layer, and the Access layer. Cisco Three-Layer network model is the preferred approach to network design.
  • 3. Core Layer  Core Layer consists of biggest, fastest, and most expensive routers with the highest model numbers and Core Layer is considered as the back bone of networks.  Core Layer routers are used to merge geographically separated networks.  The Core Layer routers move information on the network as fast as possible.  The switches operating at core layer switches packets as fast as possible.
  • 4. Distribution layer  The Distribution Layer is located between the access and core layers.  The purpose of this layer is to provide boundary definition by implementing access lists and other filters.  Therefore the Distribution Layer defines policy for the network.  Distribution Layer include high-end layer 3 switches.  Distribution Layer ensures that packets are properly routed between subnets and VLANs in your enterprise.
  • 5. Access layer  Access layer includes access switches which are connected to the end devices (Computers, Printers, Servers etc).  Access layer switches ensures that packets are delivered to the end devices.
  • 6. Benefits of Cisco Three-Layer hierarchical model The main benefits of Cisco Three-Layer hierarchical model is that it helps to design, deploy and maintain a scalable, trustworthy, cost effective hierarchical internetwork.  Better Performance: Cisco Three Layer Network Model allows in creating high performance networks  Better management & troubleshooting: Cisco Three Layer Network Model allows better network management and isolate causes of network trouble.
  • 7.  Better Filter/Policy creation and application: Cisco Three Layer Network Model allows better filter/policy creation application.  Better Scalability: Cisco Three Layer Network Model allows us to efficiently accommodate future growth.  Better Redundancy: Cisco Three Layer Network Model provides better redundancy. Multiple links across multiple devices provides better redundancy. If one switch is down, we have another alternate path to reach the destination.