Exploring The Network: Introduction To Networks
Exploring The Network: Introduction To Networks
Introduction to Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1: Objectives
After completing this chapter, students will be able to:
Explain how multiple networks are used in everyday life.
Explain the topologies and devices used in a small- to medium-
sized business network.
Explain the basic characteristics of a network that supports
communication in a small- to medium-sized business.
Explain trends in networking that will affect the use of networks in
small to medium-sized businesses.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform
1.4 The Changing Network Environment
1.5 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
1.1 Globally Connected
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Networking Today
Networks in Our Past and Daily Lives
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Networking Today
The Global Community
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Interconnecting Our Lives
Networking Impacts in Our Daily Lives
Networks support the way we learn.
Networks support the way we communicate.
Networks support the way we work.
Networks support the way we play.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Some forms of communication include
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Providing Resources in a Network
Networks of Many Sizes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Networks of Many Sizes
Small home networks connect a few computers to each other
and the Internet.
The Small Office/Home Office or SOHO network enables
computers within a home office or a remote office to connect
to a corporate network or access to centralized,
Medium to large networks, such as those used by
corporations and schools, can have many locations with
hundreds or thousands of interconnected computers.
The Internet is a network of networks that connects hundreds
of millions of computers world-wide.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Providing Resources in a Network
Clients and Servers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Providing Resources in a Network
Peer-to-Peer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
1.2 LANs, WANs, and the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Components of a Network
End Devices
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smart phones, tablets, PDAs, and
wireless debit / credit card readers and barcode scanners)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access points)
Internetworking Devices (routers)
Security Devices (firewalls)
Functions:
Regenerate and retransmit data signals
Maintain information about what pathways exist through the network and
internetwork
Maintain information about what pathways exist through the network and
internetwork
Direct data along alternate pathways when there is a link failure and
priority
Permit or deny the flow of data, based on security settings
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Components of a Network
Network Media
• The environment in
which the media is to be
installed
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Components of a Network
Network Representations
• NIC
• Ports
• Interface
1.2.1.2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Components of a Network
Topology Diagrams • It provides a
visual map of
how the
network is
connected.
• Identify the
physical
location of
intermediary
devices,
configured
ports, and
cable
installation.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Logical Topology
1.2.1.7
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
- Provides access to users and end devices in a small geographical area.
Wide Area Network (WAN).
- Provides access to other networks over a wide geographical area.
• A LAN is usually
administered by a
single organization or
individual.
• The administrative
control that governs
the security and
access control policies
are enforced on the
network level.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LANs and WANs
Wide Area Networks (WAN)
WANs are
typically
managed by
service providers
(SP) or Internet
Service
Providers (ISP).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
LANs, WANs, and the Internet
The Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
LANs, WANs, and the Internet
Intranet and Extranet
Intranet
• private connection of LANs
and WANs that belongs to
an organization.
Extranet
• Extranet to provide secure
and safe access to
individuals who work for a
different organizations, but
require company data.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Connecting to the Internet
Connecting Remote Users to the Internet
Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Connecting to the Internet
Connecting Businesses to the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
1.3 The Network as a Platform
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Converged Networks
The Converging Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Converged Networks
Planning for the Future
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Reliable Network
Supporting Network Architecture
As networks evolves, we are discovering that there are four basic
characteristics that the underlying architectures need to address in order to
meet user expectations:
Fault Tolerance(1.3.2.1)
Scalability
Quality of Service (QoS)
Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Reliable Network
Fault Tolerance in Circuit Switched Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Reliable Network
Packet-Switched Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Reliable Network
Scalable Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Reliable Network
Providing QoS
Examples of priority decisions for an organization might include:
Time-sensitive communication - increase priority for services like
telephony or video distribution.
Non time-sensitive communication - decrease priority for web page
retrieval or email.
High importance to organization - increase priority for production control
or business transaction data.
Undesirable communication - decrease priority or block unwanted activity,
like peer-to-peer file sharing or live entertainment.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Reliable Network
Providing Network Security
1.3.2.7
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Network Security
Two types of network security
Network infrastructure security (Device Protection)
Information security.(Data Protection)
Achieve the goals of network security
Ensuring confidentiality
Maintaining communication integrity - Data integrity
Ensuring availability
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
1.4 The Changing Network Environment
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Network Trends
New trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Network Trends
Bring Your Own Device (BYOD)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Network Trends
Online Collaboration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Network Trends
Video Communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Network Trends
Cloud Computing
Cloud computing offers the following potential benefits:
Organizational flexibility
Agility and rapid deployment
Reduced cost of infrastructure
Refocus of IT resources
Creation of new business
models
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Network Trends
Data Centers
A data center is a facility used to house computer systems and associated
components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server farms or
server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire suppression)
Security devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Networking Technologies for the Home
Technology Trends in the Home
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Networking Technologies for the Home
Powerline Networking
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Networking Technologies for the Home
Wireless Broadband
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Future of Networking
Network Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses (Malicious software and arbitrary code
running on a user device)
Spyware and adware(Software installed on a user device that secretly
collects information about the user)
Zero-day attacks, also called zero-hour attacks(an attack that occurs on
the first day that a vulnerability becomes known)
Hacker attacks (knowledgeable person to user devices or network
resources)
Denial of service (DoS) attacks(attacks designed to slow or crash
applications and processes on a network device)
Data interception and theft(attack to capture private information from an
organization’s network)
Identity theft(an attack to steal the login credentials of a user in order to
access private data)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware (to protect user devices from malicious
software)
Firewall filtering(block unauthorized access to the network. )
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS) (To identify fast-spreading threats,
such as zero-day or zero-hour attacks )
Virtual Private Networks (VPNs) (To provide secure access to remote
workers)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Network Architectures
Cisco Network Architectures
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Network Architectures
Cisco Certified Network Associate (CCNA)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Exploring the Networking
Summary
In this chapter, you learned:
Networks and the Internet have changed the way we communicate, learn,
work, and even play.
Networks come in all sizes. They can range from simple networks
consisting of two computers, to networks connecting millions of devices.
The Internet is the largest network in existence. In fact, the term Internet
means a ‘network of networks. The Internet provides the services that
enable us to connect and communicate with our families, friends, work,
and interests.
The network infrastructure is the platform that supports the network. It
provides the stable and reliable channel over which communication can
occur. It is made up of network components including end devices,
intermediate devices, and network media.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Exploring the Networking
Summary (cont.)
In this chapter, you learned:
Networks must be reliable.
Network security is an integral part of computer networking, regardless of
whether the network is limited to a home environment with a single
connection to the Internet, or as large as a corporation with thousands of
users.
The network infrastructure can vary greatly in terms of size, number of
users, and number and types of services that are supported on it. The
network infrastructure must grow and adjust to support the way the
network is used. The routing and switching platform is the foundation of
any network infrastructure.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56