chapter 1 intro to routing & switching. networks have changed how we communicate everyone can...
TRANSCRIPT
EXPLORING THE NETWORK
Chapter 1
Intro to Routing & Switching
OBJECTIVES
NETWORKING IN OUR LIVES Networks have changed how we
communicateEveryone can connect & share
How have networks changed the way…You learn?You communicate?You play? You work?
HOMEWORK Read slides 1.1.1.1 - 1.1.1.8
Complete Lab - Researching Network Collaboration Tools on 1.1.18
You will use the wiki to keep track of questions you get wrong on chapter tests
NETWORKS OF MANY SIZES Form 6 groups
On poster paper, draw a picture & use key words to describe:Simple small home networkSOHOMedium-large networksWorld-wide networkClient/ServerPeer-to-peer
CLIENT-SERVER NETWORK Host
Can send & receive messages
Server Host with special software Provides a service, like email or web pages
Email server/web server
Client Host with special software Requests & displays info from a server
PC with web browser to display pages from web server
CLIENT-SERVER NETWORK
PEER-TO-PEER NETWORK A computer can be a client AND a server SOHO & home use P2P networks
Simple P2P- 2 computers connected
Multiple devices with network device to connect them
PEER-TO-PEER NETWORK Advantages
Disadvantages
REVIEW
COMPONENTS OF A NETWORK
1.2.1
NETWORK ICONS
END DEVICES (HOSTS) Interface between users & the network Host is either source or destination Each host has an address to identify it
INTERMEDIARY DEVICES Connect end devices Work behind scenes to make data flow
Network Access- switches and WAPs Internetworking- routers Security- firewalls
INTERMEDIARY DEVICES Knows the path Finds detour when link fails Can prioritize data with Quality of
Service (QoS) prioritiesWhat does this mean?
Filter dataSecurity
IDENTIFYING DEVICES Complete the handout
VISUAL MAPS
ACTIVITY End device Intermediary Media
END OF DAY 2
REVIEW
LANS & WANSINTERNET &
CONNECTING TO IT
1.2.2, 1.2.3, 1.2.4
TYPES OF NETWORKSThe two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN).
Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN)
LAN Over a small area
WAN
INTERNET Connected networks Not owned by anyone
Organizations maintain it & standards
INTRANET & EXTRANET
INTERNET CONNECTIONS- SOHO In groups of 4
How you connect, bandwidth (s, m, f), device needed, special info
Cable/fiber DSL Cellular Satellite Dial-up
INTERNET CONNECTIONS- BUSINESS Dedicated leased line
Connection from ISP to you
T1 (1.5Mbps) & T3 (44Mbps)
Metro Ethernet What is it?
DSL ADSL & SDSL 18,000ft. over copper
Satellite Higher cost Slower
END OF DAY 3
REVIEW
CONVERGED NETWORKSRELIABLE NETWORKS
1.3.1, 1.3.2
NETWORKS CONVERGE
NETWORK EVOLUTION
LAB 1.3.1.3 Mapping the Internet
RELIABILITY To support all of these methods of
communication, these need to be addresses to meet user expectations:Fault Tolerance Scalability Quality of Service (QoS) Security
FAULT TOLERANCE Limits failures Quick recovery when failure occurs
One path fails, message takes different path Circuit-switched network Packet-switched network
SCALABILITY Grow, able to support more users & new
applications w/out major changes
QOS Have you ever tried to watch a video
with constant breaks and pauses? Must provide predictable, measurable,
and at times, guaranteed services Is packet-switched guaranteed?
Can be used on home routersWhat has priority? Phone, video game,
Internet?
SECURITY What can happen if bad or no security?
Network infrastructure security Information security
Ensure data is kept confidential, data integrity, data availability
ACTIVITY Complete the handout
END OF DAY 4
REVIEW
NETWORK TRENDSNETWORK SECURITY
1.4.1, 1.4.2, 1.4.3
NEW TRENDS AT COMPANIES BYOD Online collaboration Video communication Cloud computing
Access application through online subscription
Store files on network servers online Kept in data centers (WE HAVE ONE!)
How does this help an IT department & business
EXTERNAL & INTERNAL THREATS Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-
hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft
Make a poster for each, in groups
THREAT SOLUTIONS Antivirus Anti-spyware Firewall filtering
In a larger network:Dedicated firewall systemACLs IPS (intrusion prevention system)VPN
ACTIVITY
REVIEW & STUDY Complete the study guide handout
Take the quiz on netacad.com
Jeopardy review
SUMMARYIn this chapter, you learned: Networks and the Internet have changed the way
we communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.
The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
SUMMARY 2 The network infrastructure is the platform that
supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media.
Networks must be reliable.
Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
SUMMARY 3 The network infrastructure can vary
greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.
EXPLORING THE NETWORK
Chapter 1
Intro to Routing & Switching