Cisco Catalyst 6880-X Specifications Page 11

  • Download
  • Add to my manuals
  • Print
  • Page
    / 111
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 10
Introduction April 2014
8
Access Layer
The access layer is where user-controlled devices, user-accessible devices, and other end-point devices are
connected to the network. The access layer provides both wired and wireless connectivity and contains features
and services that ensure security and resiliency for the entire network.
Device Connectivity
The access layer provides high-bandwidth device connectivity. Once expensive options, high-bandwidth access
technologies like Gigabit Ethernet and 802.11n and 802.11ac wireless are now standard configurations on end-
user devices. While an end-user device in most cases will not use the full capacity of these connections for long
periods of time, the ability to burst up to these high bandwidths when performing routine tasks does help make
the network a transparent part of an end-users day-to-day job. The longer someone has to wait to back up their
machine, send an email, or open a file off an internal web page, the harder it is for the network to be transparent.
Figure 3 - Access layer connectivity
2085
Access
Switch
Wireless
Access Point
Personal
Telepresence
Handheld
IP PhoneUser
LAN, WAN
and Internet
It is common for many different types of devices to connect at the access layer. Personal computers, IP phones,
wireless access points, and IP video surveillance cameras all might connect to the same access layer switch.
Since it can be beneficial for performance, management, and security reasons to segment these different
devices, the access layer provides the capability to support many logical networks on one physical infrastructure.
Resiliency and Security Services
In general, the goal of the resiliency and security services in the infrastructure is to ensure that the network is
available for use without impairment for everyone that needs it. Because the access layer is the connection point
between the network and client devices, it plays a role in ensuring the network is protected from human error
and from malicious attacks. This protection includes making sure the devices connecting to the network do not
attempt to provide services to any end users that they are not authorized for, that they do not attempt to take
over the role of any other device on the network, and, when possible, that they verify the device is allowed on
the network.
Enabling these services in the access layer contributes not only to the overall security of the network, but also to
the resiliency and availability of the network.
Advanced Technology Capabilities
Finally, the access layer provides a set of network services that support advanced technologies. Voice and
video are commonplace in todays organizations and the network must provide services that enable these
technologies. This includes providing specialized access for these devices, ensuring others do not impair the
traffic from these devices, and providing efficient delivery of traffic that is needed by many devices in the
network.
Page view 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 110 111

Comments to this Manuals

No comments