0% found this document useful (0 votes)
9 views

Lecture 3 - Networking Today Network 1

Networks connect people and allow for the instant sharing of ideas and information worldwide. Modern networks are comprised of various components including end devices, intermediary devices, and networking media. Network diagrams use symbols to represent these components and their connections, depicting both the physical and logical topologies. Common network types include local area networks which span a small geographic area, and wide area networks which interconnect LANs and connect locations worldwide.

Uploaded by

mohamed ghnam
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Lecture 3 - Networking Today Network 1

Networks connect people and allow for the instant sharing of ideas and information worldwide. Modern networks are comprised of various components including end devices, intermediary devices, and networking media. Network diagrams use symbols to represent these components and their connections, depicting both the physical and logical topologies. Common network types include local area networks which span a small geographic area, and wide area networks which interconnect LANs and connect locations worldwide.

Uploaded by

mohamed ghnam
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Chapter 1: Networking Today

Module Objectives
Module Title: Networking Today

Module Objective: Explain the advances in modern technologies.

Topic Title Topic Objective


Networks Affect our Lives Explain how networks affect our daily lives.
Network Components Explain how host and network devices are used.
Network Representations and Topologies Explain network representations and how they are used in network topologies.
Common Types of Networks Compare the characteristics of common types of networks.
Internet Connections Explain how LANs and WANs interconnect to the internet.
Reliable Networks Describe the four basic requirements of a reliable network.

Network Trends Explain how trends such as BYOD, online collaboration, video, and cloud computing
are changing the way we interact.
Network Security Identify some basic security threats and solution for all networks.

The IT Professional Explain employment opportunities in the networking field.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
1.1 NETWORKS AFFECT OUR LIVES

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Networking Today
Networks Connect Us
 In today’s world, using networks, we are connected as never before.

 People with ideas can communicate instantly with others to make those ideas reality.

 News events and discoveries are known worldwide in seconds.

 Individuals can even connect and play games with friends physically separated by oceans and
continents.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Networking Today
No Boundaries
 Advancements in networking technologies
are helping create a world without
boundaries.
 The internet has changed the manner in
which our social, commercial, political, and
personal interactions occur.
 The creation of online communities for the
exchange of ideas and information has the
potential to increase productivity
opportunities around the globe.
 The cloud lets us store documents and
pictures and access them anywhere,
anytime.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
1.2 Network Components

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Components
Overview of Network Components
 A network can be as simple
as a single cable connecting
two computers or as
complex as a collection of
networks that span the
globe.
 Network infrastructure
contains three broad
categories of network
components:
• Devices
• Media
• Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Network Components
Network Components
 End Devices
• An end device is where a message originates
from or where it is received.
• Data originates with an end device, flows
through the network, and arrives at an end
device.
• To distinguish one end device from another,
each end device on a network has an address.
• When an end device initiates communication,
it uses the address of the destination end
device to specify where to deliver the
message.
• An end device is either the source or
destination of a message transmitted over the
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Components
Host Roles
Every computer on a network is
called a host or end device.
Servers are computers that
provide information to end
devices: Server Description
• email servers Type
• web servers Email Email server runs email server software.
Clients use client software to access email.
• file server
Web Web server runs web server software.
Clients are computers that send Clients use browser software to access web
requests to the servers to retrieve pages.
information: File File server stores corporate and user files.
• web page from a web server The client devices access these files.
• email from an email server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Components
Peer-to-Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of
network design is only recommended for very small networks.

Advantages Disadvantages
Easy to set up No centralized administration
Less complex Not as secure
Lower cost Not scalable

Used for simple tasks: transferring files and sharing Slower performance
printers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Network Components
Intermediary Network Devices
 An intermediary device interconnects end devices in a network.

 Examples include: switches, wireless access points, routers, and firewalls.

 The management of data as it flows through a network is also the role of an intermediary
device including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist through the network and internetwork.
• Notify other devices of errors and communication failures.
• Direct data along alternate pathways when there is a link failure
• Classify and direct messages according to priorities
• Permit or deny the flow of data, based on security settings

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Components
Network Media
 Communication across a
network is carried
through a medium which
allows a message to
travel from source to
destination.
 Networks typically use
three types of media:
• Metallic wires within
cables, such as copper
• Glass, such as fiber  Different types of network media have different features and
optic cables benefits.
 Not all network media have the same characteristics, and
• Wireless transmission they are not all appropriate for the same purpose.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
1.3 Network Representations and
Topologies

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Representations and Topologies
Network Representations
 Network diagrams, often
called topology diagrams, use
symbols to represent devices
within the network.
 In addition to the device
representations on the right, it
is important to remember and
understand the following
terms:
• Network Interface Card
(NIC)
• Physical Port
• Interface
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Representations and Topologies
Topology Diagrams A logical topology diagram illustrates devices,
ports, and the addressing scheme of a network. You
 A physical topology diagram illustrates the can see which end devices are connected to which
physical locations of intermediary devices and intermediary devices and what media are being
cable installation. used.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
1.4 Common Types of Networks

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Providing Resources in a Network
Networks of Many Sizes
 Small Home Networks – connect a few
computers to each other and the Internet
 Small Office/Home Office – enables
computer within a home or remote office
to connect to a corporate network
 Medium to Large Networks – many
locations with hundreds or thousands of
interconnected computers
 World Wide Networks – connects
hundreds of millions of computers world-
wide – such as the Internet

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Common Types of Networks
Types of Networks
 Two most common types of networks:
• Local Area Network (LAN) – spans
a small geographic area owned or
operated by an individual or IT
department.
• Wide Area Network (WAN) – spans
a large geographic area typically
involving a telecommunications
service provider.
• Other types of networks:
• Metropolitan Area Network (MAN)
• Wireless LAN (WLAN)
• Storage Area Network (SAN)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Common Types of Networks
Local Area Networks
 Three characteristics
of LANs:
• Spans a small
geographic area
such as a home,
school, office
building, or campus.
• Usually administered
by a single
organization or
individual.
• Provides high speed
bandwidth to end
and intermediary
devices within the
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Common Types of Networks
Wide Area Networks

 Three characteristics of WANs:


• WANs interconnect LANs over wide geographical areas such as between cities, states, or countries.
• Usually administered by multiple service providers.
• WANs typically provide slower speed links between LANs.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Common Types of Networks
The Internet
 The Internet is a worldwide collection
of interconnected LANs and WANs.
 LANs are connected to each other
using WANs.
 WANs are then connected to each
other using copper wires, fiber optic
cables, and wireless transmissions.
 The Internet is not owned by any
individual or group, however, the
following groups were developed to
help maintain structure:
• IETF
• ICANN
• IAB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Common Types of Networks
Intranets and Extranets
 Unlike the Internet, an
intranet is a private collection
of LANs and WANs internal
to an organization that is
meant to be accessible only
to the organizations
members or others with
authorization.
 An organization might use an
extranet to provide secure
access to their network for
individuals who work for a
different organization that
need access to their data on
their network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Quiz
1. _____________ is an internal network that uses Internet 4. Which network infrastructure provides access to users
technologies and it is a small version of the internet that and end devices in a small geographical area, which is
exists within an organization. typically a network in a department in an enterprise, a home,
a) Ethernet or small business?
b) Intranet a) LAN
c) Extranet b) WAN
d) Internet c) Extranet
d) Internet

2. Web browsing, Email, Instant messaging is the type of services Which network infrastructure might an organization use to
that was provided by ------------------ provide secure and safe access to individuals who work for a
a) Intranet different organization but require access to the organization’s
b) Extranet data?
c) Internet a) LAN
b) WAN
3. Internet serves everyone but Extranet serves extended c) Extranet
d) Internet
enterprise, including defined sets of customers or
suppliers or other partners
a) Yes
b) No
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
1.5 Internet Connections

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Internet Connections
Internet Access Technologies
 There are many ways to connect users
and organizations to the Internet:
• Popular services for home users and
small offices include broadband cable,
broadband digital subscriber line (DSL),
wireless WANs, and mobile services.
• Organizations need faster connections
to support IP phones, video
conferencing and data center storage.
• Business-class interconnections are
usually provided by service providers
(SP) and may include: business DSL,
leased lines, and Metro Ethernet.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Internet Connections
Home and Small Office Internet Connections
 Cable – high bandwidth, always on, Internet
connection offered by cable television service
providers.
 DSL – high bandwidth, always on, Internet
connection that runs over a telephone line.
 Cellular – uses a cell phone network to connect
to the Internet; only available where you can get a
cellular signal. Performance is limited by the
capabilities of the phone or other device and the
cell tower to which it is connected.
 Satellite – major benefit to rural areas without
Internet Service Providers. A satellite dish must
have a clear line of sight to the satellite.
 Dial-up telephone – an inexpensive, low
bandwidth option using
© 2016 Cisco and/ora modem.
its affiliates. All rights reserved. Cisco Confidential 26
Internet Connections
Businesses Internet Connections  Corporate business connections may require

• higher bandwidth,

• dedicated connections, or

• managed services.

 Typical connection options for businesses:


• Dedicated Leased Line – reserved circuits
within the service provider’s network that
connect distant offices with private voice
and/or data networking.
• Ethernet WAN – extends LAN access
technology into the WAN.
• DSL – Business DSL is available in various
formats including Symmetric Digital Subscriber
Lines (SDSL).
• Satellite – can provide a connection when a
wired solution is not available.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Internet Connections
Traditional Separate Networks
 An example of multiple networks
might be a school 30 years ago.
Some classrooms were cabled
for data networks. Those same
classrooms were cabled for
telephone networks, and also
cabled separately for video.
 Each of these networks used
different technologies to carry the
communication signals using a
different set of rules and
standards.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Internet Connections
The Converging Network
 Converged data networks
carry multiple services on one
link including data, voice, and
video.
 Unlike dedicated networks,
converged networks can
deliver data, voice, and video
between different types of
devices over the same network
infrastructure.
 The network infrastructure
uses the same set of rules and
standards.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
1.6 Reliable Networks

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Reliable Network
Network Architecture
 Networks must support a wide range of
applications and services, as well as
operate over many different types of
cables and devices, which make up the
physical infrastructure.
 The term network architecture, in this
context, refers to the technologies that
support the infrastructure and the
programmed services and rules, or
protocols, that move data across the
network.
 There are four basic characteristics that
the underlying architectures need to
address to meet user expectations.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Reliable Network
Fault Tolerance  A fault tolerant network limits the
impact of a failure by limiting the
number of affected devices.
 Multiple paths are required for fault
tolerance.
 Reliable networks provide
redundancy by implementing a
packet switched network.
 Packet switching splits traffic into
packets that are routed over a
network.
 Each packet could theoretically take
a different path to the destination.
 This is not possible with circuit-
switched networks which establish
dedicated
© 2016 Cisco and/orcircuits.
its affiliates. All rights reserved. Cisco Confidential 32
Reliable Network
Scalability

 A scalable network can expand quickly and easily to support new users and applications without
impacting the performance of services to existing users.
 Network designers follow accepted standards and protocols in order to make the networks scalable.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Reliable Network
 Voice and live video transmissions
Quality of Service require higher expectations for
those services being delivered.
 Have you ever watched a live video
with constant breaks and pauses?
This is caused when there is a
higher demand for bandwidth than
available – and QoS isn’t
configured.
 Quality of Service (QoS) is the
primary mechanism used to ensure
reliable delivery of content for all
users.
 With a QoS policy in place, the
router can more easily manage the
flow of data and voice traffic.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Reliable Network  There are two main types of
Security network security that must be
addressed:
Ensure Confidentiality: • Network infrastructure security
• Physical security of network devices
Strong authentication and
• Preventing unauthorized access to the
appropriate encryption management software on those devices
• Information Security
Communication Integrity: • Protection of the information or data
transmitted over the network
Digital Signatures, Hashing
 Three goals of network security:
Algorithms, Checksum
• Confidentiality – only intended
recipients can read the data
Ensuring Availability:
• Integrity – assurance that the data
Combating virus attacks, has not be altered with during
transmission
Firewalls, Redundant
• Availability – assurance of timely
Architecture and reliable access to data for
authorized users
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Quiz
1. When designers follow accepted standards 3. With which type of policy, a router can
and protocols, which of the four basic manage the flow of data and voice traffic,
characteristics of network architecture is giving priority to voice communications if the
achieved? network experiences congestion?
a) Fault tolerance a) Fault tolerance
b) Scalability b) Scalability
c) Quality of Service (QoS) c) Quality of Service (QoS)
d) Security d) Security

2. Confidentiality, integrity, and availability are 4. Having multiple paths to a destination is


requirements of which of the four basic known as redundancy. This is an example of
characteristics of network architecture? which characteristic of network architecture?
a) Fault tolerance a) Fault tolerance
b) Scalability b) Scalability
c) Quality of Service (QoS) c) Quality of Service (QoS)
d) Security d) Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
1.7 Network Trends

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Network Trends
New Trends
 The role of the network must
adjust and continually
transform in order to be able
to keep up with new
technologies and end user
devices as they constantly
come to the market.
 Several new networking
trends that effect
organizations and consumers:
• Bring Your Own Device
(BYOD)
• Online collaboration
• Video communications
• Cloud computing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Network Trends
Bring Your Own Device
 Bring Your Own Device (BYOD) is a
major global trend that allows users
to use their own devices giving
them more opportunities and
greater flexibility.
 BYOD allows end users to have the
freedom to use personal tools to
access information and
communicate using their:
• Laptops
• Netbooks
• Tablets
• Smartphones
• E-readers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Network Trends
Online Collaboration
 Individuals want to
collaborate and work with
others over the network on
joint projects.
 Collaboration is defined as
“the act of working with
another or others on a joint
project”.
 Collaboration tools including
Cisco WebEx (shown in the
figure) gives users a way to
instantly connect, interact
and achieve their objectives.
 Collaboration is a very high
priority for businesses and in
education.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
40
Network Trends
Video Communication
 Video conferencing is a powerful tool
for communicating with others, both
locally and globally.
 Video is becoming a critical
requirement for effective collaboration
as organizations extend across
geographic and cultural boundaries.
 Cisco TelePresence powers the new
way of working where everyone,
everywhere, can be more productive
through face to face collaboration.
 Around the world each day, we
transform organizations by transforming
our customer experiences.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Network Trends
Cloud Computing
 Cloud computing is a global trend that
allows us to store personal files or backup our
data on servers over the Internet.
 Applications such as word processing and
photo editing can also be accessed using the
Cloud.
 Cloud computing also allows businesses to
extend their capabilities on demand and
delivered automatically to any device
anywhere in the world.
 Cloud computing is made possible by data
centers. Smaller companies that can’t afford
their own data centers, lease server and
storage services from larger data center
organizations in the Cloud.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Network Trends
 Four types of Clouds:
Cloud Computing (Cont.)
• Public Clouds
• Services and applications are made available to the general
public through a pay-per-use model or for free.
• Private Clouds
• Applications and services are intended for a specific
organization or entity such as the government.
• Hybrid Clouds
• Made up of two or more Cloud types – for example, part
custom and part public. Each part remains a distinctive
object but both are connected using the same architecture.
• Custom Clouds
• implies an infrastructure that is shared between
organizations, usually with the shared data and data
management concerns. For example, a community cloud
can belong to a government of a single country. Community
clouds can be located both on and off the premises.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Network Trends
Technology Trends in the Home
• Smart home
technology is a
growing trend that
allows technology to
be integrated into
every-day appliances
which allows them to
interconnect with
other devices.
• Ovens might know
what time to cook a
meal for you by
communicating with
your calendar on what
time you are
scheduled to be
home.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Network Trends
Powerline Networking

• Powerline
networking can allow
devices to connect
to a LAN where data
network cables or
wireless
communications are
not a viable option.
• Using a standard
powerline adapter,
devices can connect
to the LAN wherever
there is an electrical
outlet by sending
data on certain
frequencies.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Network Trends
Wireless Broadband • In addition to DSL and cable,
wireless is another option used to
connect homes and small
businesses to the Internet.
• More commonly found in rural
environments, a Wireless Internet
Service Provider (WISP) is an ISP
that connects subscribers to
designated access points or
hotspots.
• Wireless broadband is another
solution for the home and small
businesses.
• Uses the same cellular technology
used by a smart phone.
• An antenna is installed outside the
house providing wireless or wired
connectivity for devices in the home.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
1.8 Network Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Network Security
Security Threats
• Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service
that is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques
in order to secure data and
mitigate threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Network Security
Security Threats (Cont.)
• External threats:
• Viruses, worms, and Trojan horses
• Spyware and adware
• Zero-day attacks, also called zero-hour
attacks
• Hacker attacks (Threat actor attacks)
• Denial of Service attacks
• Data interception and theft
• Identify Theft

• Internal threats:
• Whether intentional or not, many studies
show that the internal users of the network
cause the most security breaches.
• With BYOD strategies, corporate data is
more vulnerable.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Network Security
Security Solutions
• Security must be
implemented in
multiple layers
using more than
one security
solution.
• Network security
components for
home or small
office network:
• Antivirus and
antispyware
software should be
installed on end
devices.
• Firewall filtering
used to block
unauthorized
access to the
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
network.
Network Security
Security Solutions (Cont.)
• Larger networks have
additional security
requirements:
• Dedicated firewall system to
provide more advanced
firewall capabilities.
• Access control lists (ACL) –
used to further filter access
and traffic forwarding.
• Intrusion prevention
systems (IPS) – used to
identify fast-spreading
threats such as zero-day
attacks.
• Virtual private networks
(VPN) – used to provide
secure access for remote
workers.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51

You might also like