R RE ED DE ES SD DE EC CO OM MP PU UT TA AD DOR Ores ES: Clase 1. Introducción Clase 1. Introducción
R RE ED DE ES SD DE EC CO OM MP PU UT TA AD DOR Ores ES: Clase 1. Introducción Clase 1. Introducción
ORES
ES
Clase 1. Introduccin
What is a Network?
INTERNET
http://internet-map.net/
Networks Applications
Learn
Communicate
Work
Play
Social Networking
Client
Server
A host
Client, Server, or both.
Software determines the role.
Servers provide information and services to clients
e-mail or web pages
Clients request information from the server.
7
Server Computers
Client Computers
Clients are computers that have software installed that enable them to
request and display the information obtained from the server.
A single computer can also run multiple types of client software.
There must be client software for every service required.
Student Successes
End devices
Intermediary
Devices
switch
or hub
switch
or hub
routers
Intermediary devices:
Connectivity to and between networks
Examples (4):
Network Access Devices (Hubs, switches, and wireless access points)
Internetworking Devices (routers)
Communication Servers and Modems
Security Devices (firewalls)
12
Networking Devices
13
Network Media
15
Physical Topology
16
Logical Topology
17
18
19
The Internet
20
The Internet
A Network of
Networks
21
Connecting
Residences to
the Internet
23
Converged Networks
24
Multiple Networks
Converged Networks
27
Fault Tolerance
The expectation is that the network or Internet is always available to the
millions of users who rely on it.
28
Fault Tolerance
29
Fault Tolerance
30
Scalability
A scalable network can expand quickly to support new users and
applications without impacting the performance of the service being
delivered to existing users.
31
Scalability
The Internet has a hierarchical layered structure for addressing, for naming,
and for connectivity services.
As a result, network traffic that is destined for local or regional services does
not need to traverse to a central point for distribution.
32
Quality of Service
QoS refers to the ability of a network to provide improved service to
selected network traffic over various underlying technologies.
33
Quality of Service
Quality of Service
Quality of Service
36
Security
The Internet has evolved from a tightly controlled internetwork of educational and
government organizations to a widely accessible means for transmission of
business and personal communications.
37
Security
38
Network Trends
BYOD is about end users having the freedom to use personal tools to
access information and communicate across a business or campus
network.
39
Network Trends
Network Trends
41
Network Trends
Network Trends
43
44
Network Security
45
External Threats
46
Internal Threats
The most common data breaches happen because of internal users of the
network.
Due to:
lost or stolen devices
accidental misuse by employees
malicious employees
With the evolving BYOD strategies, corporate data is much more
vulnerable.
Therefore, when developing a security policy, it is important to address both
external and internal security threats..
47
Security Solutions
Network security components for a home or small office network should
include:
Antivirus and antispyware - to protect user devices from malicious
software
Firewall filtering - to block unauthorized access to the network.
In addition to the above, larger networks and corporate networks often have
other security requirements:
Dedicated firewall systems - to provide more advanced firewall
capability that can filter large amounts of traffic with more granularity
Access control lists (ACL) - to further filter access and traffic
forwarding
Intrusion prevention systems (IPS) - to identify fast-spreading threats,
such as zero-day or zero-hour attacks
Virtual private networks (VPN) - to provide secure access to remote
workers.
48