Exploring The Network: Introduction To Networks
Exploring The Network: Introduction To Networks
Exploring The Network: Introduction To Networks
Introduction to Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1: Objectives
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform
1.4 The Changing Network Environment
1.5 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Networking Today
Networks in Our Past and Daily Lives
(IoE)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Networking Today
The Global Community
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Learn
• Support the creation of virtual classrooms
• Provide on-demand video
• Enable collaborative learning spaces
• Enable mobile learning
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Communicate
• Instant Messaging (IM) /Texting – IM and texting both enable
instant real-time communication between two or more people
• Social Media – Social media consists of interactive websites where
people and communities create and share user-generated content
with friends, family, peers, and the world
• Collaboration Tools - Collaboration tools give people the
opportunity to work together on shared documents
• Weblogs (blogs) - Weblogs are web pages that are easy to update
and edit
• Wikis - Wikis are web pages that groups of people can edit and view
together
• Podcasting - Podcasting is an audio-based medium that originally
enabled people to record audio and convert it for use
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Work
• In the business world, data networks were initially used by
businesses to internally record and manage financial information,
customer information, and employee payroll systems
• The use of networks to provide efficient and cost-effective employee
training is increasing in acceptance (email, video, messaging, and
telephony)
• Online learning opportunities can decrease time-consuming and
costly travel yet still ensure that all employees are adequately trained
to perform their jobs in a safe and productive manner.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Play
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Providing Resources in a Network
The Small
Networks of Many Sizes Office/Home
Office or SOHO
network
enables
computers
Small home within a home
networks office or a
connect a few remote office to
computers to connect to a
each other and corporate
the Internet. network or
access to
centralized,
shared
resources.
Medium to
large networks,
such as those The Internet is
used by a network of
corporations networks that
and schools, connects
can have many hundreds of
locations with millions of
hundreds or computers
thousands of world-wide.
interconnected
computers.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Providing Resources in a Network
Clients and Servers The File Server stores the file, the client
device accesses the file with client
software such as Windows Explorer
The Email
Server runs
server
software and A computer with
clients use server software can
their mail provide services
client simultaneously to
software, one or many clients
such as
Microsoft
Outlook, to
access
Email on the
server
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Providing Resources in a Network
Peer-to-Peer
One computer carry out both roles (Client/Server) at the same time
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Components of a Network
End Devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Components of a Network
Network Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Components of a Network
Services
• A network service provides information in response to a
request.
• Processes provide the functionality that directs and moves
the messages through the network.
• Processes are critical to the operation of networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Components of a Network
Network Representations
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Components of a Network
Topology Diagrams
Physical topology diagrams - Identify the physical location of
intermediary devices, configured ports, and cable installation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Components of a Network
Topology Diagrams
Logical topology diagrams - Identify devices, ports, and IP
addressing scheme.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN) - A network infrastructure that
provides access to users and end devices in a small
geographical area
Wide Area Network (WAN) - A network infrastructure that
provides access to other networks over a wide geographical
area.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LANs and WANs
Types of Networks
Other types of networks include:
Metropolitan Area Network (MAN) - A network
infrastructure that spans a physical area larger than a LAN
but smaller than a WAN (e.g., a city). MANs are typically
operated by a single entity such as a large organization.
Wireless LAN (WLAN) - Similar to a LAN but wirelessly
interconnects users and end points in a small geographical
area.
Storage Area Network (SAN) - A network infrastructure
designed to support file servers and provide data storage,
retrieval, and replication. It involves high-end servers,
multiple disk arrays (called blocks), and Fibre Channel
interconnection technology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
LANs and WANs
Local Area Networks (LAN)
Local Area Networks (LANs) are a
network infrastructure that spans a
small geographical area. Specific
features of LANs include:
LANs interconnect end devices
in a limited area such as a
home, school, office building, or
campus.
A LAN is usually administered by
a single organization or
individual. The administrative
control that governs the security
and access control policies are
enforced on the network level.
LANs provide high speed
bandwidth to internal end
devices and intermediary
devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
LANs and WANs
Wide Area Networks (WAN)
Wide Area Networks (WANs) are a network infrastructure that spans a
wide geographical area. WANs are typically managed by service
providers (SP) or Internet Service Providers (ISP).
Specific features of WANs include:
WANs interconnect LANs over wide geographical areas such as
between cities, states, provinces, countries, or continents.
WANs are usually administered by multiple service providers.
WANs typically provide slower speed links between LANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
LANs, WANs, and Internets
The Internet
The Internet is a worldwide collection of interconnected networks
(internetworks or internet for short), cooperating with each other to
exchange information using common standards
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
The Internet
Intranet and Extranet
• Intranet is a private
connection of LANs and
WANs that belongs to an
organization, and is
designed to be accessible
only by the organization's
members, employees, or
others with authorization
• Extranet is a intranet plus
some other users who
work for a different
organizations, but require
company data; to provide
secure and safe access to
individuals
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
LANs, WANs, and Internets
Internet Access Technologies
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Connecting to the Internet
Connecting Businesses to the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Converged Networks
The Converging Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Converged Networks
The Converging Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Converged Networks
Planning for the Future
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Reliable Network
Supporting Network Architecture
Fault Tolerance
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Reliable Network
Fault Tolerance in Circuit Switched Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Reliable Network
Packet-Switched Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Reliable Network
Supporting Network Architecture
Scalability
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Reliable Network
Scalable Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Reliable Network
Supporting Network Architecture
Quality of Service (QoS)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Reliable Network
Supporting Network Architecture
Quality of Service (QoS)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
Time-sensitive communication - increase priority for services
like telephony or video distribution.
Non time-sensitive communication - decrease priority for web
page retrieval or email.
High importance to organization - increase priority for
production control or business transaction data.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Reliable Network
Supporting Network Architecture
Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Reliable Network
Providing Network Security
Security measures taken in a network should:
Prevent unauthorized disclosure
Prevent theft of information
Prevent unauthorized modification of
information
Prevent Denial of Service (DoS)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Reliable Network
Providing Network Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Network Trends
New trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Network Trends
Bring Your Own Device (BYOD)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Network Trends
Online Collaboration
• Collaboration is defined as
“the act of working with
another or others on a joint
project.”
• Three primary collaboration
questions:
1. How can they get everyone on the
same page?
2. With decreased budgets and
personnel, how can they balance
resources to be in more places at
once?
3. How can they maintain face-to-face
relationships with a growing
networks in an environment that is
more dependent on 24-hour
connectivity?
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Network Trends
Online Collaboration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Network Trends
Video Communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Network Trends
Cloud Computing
Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service over
a network
The term “cloud computing” really refers to web-based
computing
Cloud computing offers the following potential benefits:
• Organizational flexibility
• Agility and rapid deployment.
• Reduced cost of infrastructure
• Refocus of IT resources
• Creation of new business models
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server
farms or server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire
suppression)
Security devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Networking Technologies for the Home
Technology Trends in the Home
Smart home
technology will
become more of a
reality as home
networking and
high-speed Internet
technology
becomes more
widespread in
homes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Networking Technologies for the Home
Powerline Networking
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Networking Technologies for the Home
Wireless Broadband
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Future of Networking
Network Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Network Architectures
Cisco Network Architectures
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Network Architectures
Cisco Certified Network Associate (CCNA)
• CCNA certification validates an
individual’s ability to install,
configure, operate, and troubleshoot
medium-size route and switched
networks, including implementation
and verification of connections to
remote sites in a WAN.
• CCNA curriculum also includes
basic mitigation of security threats,
introduction to wireless networking
concepts and terminology, and
performance-based skills. CCNA
• This CCNA curriculum includes the
use of various protocols, such as:
IP, Open Shortest Path First
(OSPF), Serial Line Interface
Protocol, Frame Relay, VLANs,
Ethernet, access control lists
(ACLs) and others.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Exploring the Networking
Summary
In this chapter, you learned:
Networks and the Internet have changed the way we
communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple
networks consisting of two computers, to networks
connecting millions of devices.
The Internet is the largest network in existence. In fact, the
term Internet means a ‘network of networks. The Internet
provides the services that enable us to connect and
communicate with our families, friends, work, and interests.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Exploring the Networking
Summary
In this chapter, you learned:
The network infrastructure is the platform that supports the
network. It provides the stable and reliable channel over
which communication can occur. It is made up of network
components including end devices, intermediate device, and
network media.
Networks must be reliable.
Network security is an integral part of computer networking,
regardless of whether the network is limited to a home
environment with a single connection to the Internet, or as
large as a corporation with thousands of users.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Exploring the Networking
Summary
In this chapter, you learned:
The network infrastructure can vary greatly in terms of size,
number of users, and number and types of services that are
supported on it. The network infrastructure must grow and
adjust to support the way the network is used. The routing
and switching platform is the foundation of any network
infrastructure.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64