itn instructor ppt_chapter1 exploring the network smartskills
TRANSCRIPT
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1:Exploring the Network
Introduction to Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
Students will be able to:
Explain how multiple networks are used in everyday life.
Explain the topologies and devices used in a small to medium-sized business network.
Explain the basic characteristics of a network that supports communication in a small to medium-sized business.
Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform
1.4 The Changing Network Environment
1.5 Summary and review Questions
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Today
Networks in Our Past and Daily Lives
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Today
The Global Community
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
How do you define communication?
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
Establishing the Rules
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
Establishing the Rules
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
Establishing the Rules
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quality of Communications
Communication – An essential part of our lives
For data networks, we use the same basic criteria to judge success. As a message moves through the network, many factors can prevent the message from reaching the recipient or distort its intended meaning. These factors can be either external or internal.
External Factors
1. The quality of the pathway between the sender and the recipient
2. The number of times the message has to change form
3. The number of times the message has to be redirected or readressed
4. The number of other messages being transmitted simultaneously on the communication network
5. The amount of time allotted for successful communication
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quality of Communications
Communication – An essential part of our lives
Different types of messages may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that they are delivered and understood by the recipient.
Internal Factors
1. The size of the message
2. The complexity of the message
3. The importance of the message
Large messages may be interrupted or delayed at different points within the network. A message with a low importance or priority could be dropped if the network becomes overloaded.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Learn
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Communicate
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Work
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Play
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Networks of Many Sizes
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Clients and Servers
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Peer-to-Peer
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
End Devices
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access points)
Internetworking Devices (routers)
Security Devices (firewalls)
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Media
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Representations
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Topology Diagrams
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Internet Access Technologies
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Local Area Networks (LAN)
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Wide Area Networks (WAN)
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
The Internet
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
Intranet and Extranet
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
Intranet and Extranet
Intranets, private networks in use by just one company, enable businesses to communicate and perform transactions among global employee and branch locations.
Companies develop extranets, or extended internetworks, to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Popular Communication Tools
The existence and broad adoption of the Internet has ushered in new forms of communication that empower individuals to create information that can be accessed by a global audience.
Instant Messaging
Weblogs (blogs)
Wikis
Podcasting
Collaboration Tools
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Businesses to the Internet
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
The Converging Network
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
The Converging Network
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Planning for the Future
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance
The expectation that the Internet is always available to the millions of users who rely on it requires a network architecture that is designed and built to be fault tolerant. A fault tolerant network is one that limits the impact of a hardware or software failure and can recover quickly when such a failure occurs.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance in Circuit Switched Network
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Packet-Switched Networks
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalability
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The ability of the network to support these new interconnections depends on a hierarchical layered design for the underlying physical infrastructure and logical architecture.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Tier 1
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Tier 2
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Tier 3
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Hierarchical
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Distributed
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks - Peers
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might include:
Time-sensitive communication - increase priority for services like telephony or video distribution.
Non time-sensitive communication - decrease priority for web page retrieval or email.
High importance to organization - increase priority for production control or business transaction data.
Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Security measures taken in a network should:
Prevent unauthorized disclosure or theft of information
Prevent unauthorized modification of information
Prevent Denial of Service
Means to achieve these goals include:
Ensuring confidentiality
Maintaining communication integrity
Ensuring availability
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Ensuring ConfidentialityData privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data.
Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information.
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Maintaining Communication IntegrityData integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - willfully or accidentally - before the intended recipient receives it.
Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient.
The use of digital signatures, hashing algorithms and check sum mechanisms are ways to provide source and data integrity across a network to prevent unauthorized modification of information.
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Ensuring AvailabilityEnsuring confidentiality and integrity are irrelevant if network resources become over burdened, or not available at all. Availability means having the assurance of timely and reliable access to data services for authorized users.
Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and cope with such attacks.
Building fully redundant network infrastructures, with few single points of failure, can reduce the impact of these threats.
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Information Technology and networking careers are growing and evolving as fast as the underlying technologies and services. As networks increase in sophistication, the demand for people with networking skills will continue to grow.
Traditional IT positions like programmers, software engineers, data base administrators and network technicians are now joined by new titles, such as network architect, e-Commerce site designer, information security officer, and home integration specialist.
As students of networking technology, we examine the components of data networks and the roles they play in enabling communication. This course,is designed to empower you with the networking knowledge to build and manage these evolving networks.
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Bring Your Own Device (BYOD)
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Online Collaboration
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Video Communication
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Cloud Computing
There are four primary types of clouds:
Public clouds
Private clouds
Custom clouds
Hybrid clouds
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Data Centers
A data center is a facility used to house computer systems and associated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server farms or server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire suppression)
Security devices
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Technology Trends in the Home
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Powerline Networking
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Wireless Broadband
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of Networking
Network Security
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Network Architectures
Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Certified Network Associate (CCNA)
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
Networks and the Internet have changed the way we communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.
The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
Presentation_ID 76© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media.
Networks must be reliable.
Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
Presentation_ID 77© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.
Presentation_ID 78© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
Describe the external factors that impact network communication.
External factors affecting the quality of communication are related to the processes that devices use to talk to each other and include:
• Whether a confirmation of the message was returned to the sender.
• The quality of the pathway between the sender and the recipient.
• The number of times the message has to change form.
• The number of other messages in the communication network.
• The number of times the message is reformatted.
• The amount of time allotted for successful communication.
Presentation_ID 79© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
Describe the Internal factors that impact network communication.
Internal factors that interfere with communication are related to the nature of the communication itself. The communication may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that the meaning is received properly.
Internal factors affecting the quality of communication include:
• The size of the message
• The complexity of the message
• The importance of the message
Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
Describe network-supported technologies that impact how people learn, work, and play.
Includes instant messaging, weblogs, podcasting, collaboration tools using text, graphic, audio and video technologies over both fixed and mobile data networks.
Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
What is data? What is a data network? What is a converged network?
Data is the pieces of information, such as files, audio, phone calls and video shared across the network.
A data network consists of:
• Devices that communicate with each other
• A means of connecting these devices together – a medium that can transport messages from one device to another
• The digital messages or units of information that will travel from one device to another
• Rules of agreements to govern how the messages are sent, directed, and received.
Presentation_ID 82© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
What is a converged network?Traditionally telephone, data communications between computers, radio, and television each had separate networks and each required a different technology to carry its particular communication signal. Additionally, each service had its own set of rules and standards to ensure the successful communication of its service across a specific medium.
Technology can now consolidate these disparate networks into one platform – a platform we define as the converged network. The flow of voice, radio, video, and data travelling over the same network eliminates the need to create and maintain separate networks. As converged networks become more common, businesses and individual users can use a single network for its services.
Presentation_ID 83© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
Why does Quality of Service matter on a data network?Converged networks carry multiple types of communication. Data network resources, however are always constrained by budgets, physical limitations, and technology. The existence of these limitations means that decisions must be made regarding the priority of different types of communication.
The management of different types of communication involves balancing both the traffic´s importance and its characteristics. Both of these factors are considered when developing a Quality of Service (QoS) strategy for managing data in a given data network.
Presentation_ID 84© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
What happens without a properly designed and implemented QoS mechanism?
Without properly designed and implemented QoS mechanisms, data packets will be dropped without consideration of the application characteristics or priority.
Presentation_ID 85© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
What does security mean in the context of data networks?Data network security has two aspects:
• Interception of data communications – data encryption can negate such interceptions.
• Unauthorized access to the network and its data – User authentication (usernames, passwords and classifications are tools to prevent this - In addition to physical security)
Intruders may desire to gain access to information for monetary gain. They steal financial records or sell trade secrets to competitors. For others stealing data is merely a game about which they can brag, often boast about it their latest online conquests. Many have limited computer and network skills and do this just for fun. Some change, destroy or just disrupt. Some are disgruntled employees to wreak havoc.
Presentation_ID 86© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Lab: Skills Integration Challenge: Introduction to PT
Presentation_ID 87© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Lab: Skills Integration: Use of TCP/IP in PT demo
Exploring the Networking