itn instructorppt chapter1 final

51
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_I D 1 Chapter 1: Exploring the Network Introduction to Networks

Upload: jemal-assres

Post on 14-Nov-2015

75 views

Category:

Documents


5 download

DESCRIPTION

dfagsdf

TRANSCRIPT

ITE PC v4.0 Chapter 1

Interconnecting Our LivesNetworking Impacts in Our Daily LivesNetworks support the way we learn.Networks support the way we communicate.Networks support the way we work.Networks support the way we play.Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential71.1.1.4 Networks Support the Way We Learn1.1.1.5 Networks Support the Way We Communicate1.1.1.6 Networks Support the Way We Work1.1.1.7 Networks Support the Way We Play 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrChapter 1: ObjectivesAfter completing this chapter, students will be able to:Explain how multiple networks are used in everyday life.Explain the topologies and devices used in a small- to medium-sized business network.Explain the basic characteristics of a network that supports communication in a small- to medium-sized business.Explain trends in networking that will affect the use of networks in small to medium-sized businesses.Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential2 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrChapter 11.1 Globally Connected1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform1.4 The Changing Network Environment1.5 SummaryPresentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential3Chapter 1 Sections 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr1.1 Globally Connected 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID#Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential4Cisco Networking Academy programIntroduction to NetworksChapter 1: Exploring the Network 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrProviding Resources in a NetworkNetworks of Many Sizes

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential81.1.2.1 Networks of Many Sizes 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrProviding Resources in a NetworkClients and Servers

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential91.1.2.2 Clients and Servers1.1.2.3 Clients and Servers (Cont.) 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrProviding Resources in a NetworkPeer-to-Peer

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential101.1.2.4 Peer-to-Peer 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr1.2 LANs, WANs, and the Internet 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID#Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential11Cisco Networking Academy programIntroduction to NetworksChapter 1: Exploring the Network 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrLANs, WANs, and InternetsComponents of a NetworkThere are three categories of network components:Devices MediaServices

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential121.2.1.1 Components of the Network 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrComponents of a NetworkEnd DevicesSome examples of end devices are:Computers (work stations, laptops, file servers, web servers)Network printersVoIP phonesTelePresence endpointSecurity camerasMobile handheld devices (such as smart phones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential131.2.1.2 End Devices 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrComponents of a NetworkNetwork Infrastructure DevicesExamples of intermediary network devices are:Network Access Devices (switches, and wireless access points)Internetworking Devices (routers)Security Devices (firewalls)Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential141.2.1.3 Intermediary Network Devices 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrComponents of a NetworkNetwork Media

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential151.2.1.4 Network Media 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrComponents of a NetworkNetwork Representations

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential161.2.1.5 Network Representations 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrComponents of a NetworkTopology Diagrams

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential171.2.1.6 Topology Diagrams 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrLANs and WANsTypes of NetworksThe two most common types of network infrastructures are:Local Area Network (LAN)Wide Area Network (WAN).

Other types of networks include:Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN)Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential181.2.2.1 Types of Networks 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrLANs and WANsLocal Area Networks (LAN)

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential191.2.2.2 Local Area Networks 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrLANs and WANsWide Area Networks (WAN)

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential201.2.2.3 Wide Area Networks 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrLANs, WANs, and the InternetThe Internet

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential211.2.3.1 The Internet 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrLANs, WANs, and the InternetIntranet and Extranet

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential221.2.3.2 Intranet and Extranet 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrConnecting to the InternetConnecting Remote Users to the Internet

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential231.2.4.1 Internet Access Technologies1.2.4.2 Connecting Remote Users to the Internet

2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrConnecting to the InternetConnecting Businesses to the Internet

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential241.2.4.1 Internet Access Technologies1.2.4.3 Connecting Businesses to the Internet 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr1.3 The Network as a Platform 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID#Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential25Cisco Networking Academy programIntroduction to NetworksChapter 1: Exploring the Network 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrConverged NetworksThe Converging Network

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential261.3.1.1 The Converging Network 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrConverged NetworksPlanning for the Future

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential271.3.1.2 Planning for the Future 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrReliable NetworkSupporting Network ArchitectureAs networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault ToleranceScalabilityQuality of Service (QoS)Security

http://localhost/CCNA1/course/module1/index.html#1.3.2.1

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential281.3.2.1 The Supporting Network Architecture 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrReliable NetworkFault Tolerance in Circuit Switched Network

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential291.3.2.2 Fault Tolerance in Circuit Switched Networks 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrReliable NetworkPacket-Switched Networks

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential301.3.2.3 Fault Tolerance in Packet-Switched Networks 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrReliable NetworkScalable Networks

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential311.3.2.4 Scalable Networks 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrReliable NetworkProviding QoSExamples of priority decisions for an organization might include:Time-sensitive communication - increase priority for services like telephony or video distribution.Non time-sensitive communication - decrease priority for web page retrieval or email.High importance to organization - increase priority for production control or business transaction data.Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential321.3.2.5 Providing QoS 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrReliable NetworkProviding Network Security

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential331.3.2.6 Providing Network Security 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr1.4 The Changing Network Environment 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID#Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential34Cisco Networking Academy programIntroduction to NetworksChapter 1: Exploring the Network 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork TrendsNew trendsSome of the top trends include:Bring Your Own Device (BYOD)Online collaborationVideoCloud computing

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential351.4.1.1 New Trends 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork TrendsBring Your Own Device (BYOD)

The concept of any device, to any content, in anyway is a major global trend that requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD).Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential361.4.1.2 BYOD 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork TrendsOnline Collaboration

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential371.4.1.3 Online Collaboration 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrthis image did not come from this page. but honestly, you could probably keep it as is.Network TrendsVideo Communication

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential381.4.1.4 Video Communication 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork TrendsCloud ComputingCloud computing offers the following potential benefits:Organizational flexibilityAgility and rapid deployment Reduced cost of infrastructureRefocus of IT resourcesCreation of new business models

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential391.4.1.5 Cloud Computing 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork TrendsData CentersA data center is a facility used to house computer systems and associated components including:Redundant data communications connectionsHigh-speed virtual servers (sometimes referred to as server farms or server clusters)Redundant storage systems (typically uses SAN technology)Redundant or backup power suppliesEnvironmental controls (e.g., air conditioning, fire suppression)Security devicesPresentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential401.4.1.6 Data Centers 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetworking Technologies for the HomeTechnology Trends in the Home

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential411.4.2.1 Technology Trends in the Home 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetworking Technologies for the HomePowerline Networking

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential421.4.2.2 Powerline Networking 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetworking Technologies for the HomeWireless Broadband

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential431.4.2.3 Wireless Broadband 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrFuture of NetworkingNetwork Security

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential441.4.3.1 Security threats 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork SecuritySecurity ThreatsThe most common external threats to networks include:Viruses, worms, and Trojan horses Spyware and adwareZero-day attacks, also called zero-hour attacksHacker attacks Denial of service (DoS) attacksData interception and theftIdentity theftPresentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential451.4.3.1 Security threats (cont.) 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork SecuritySecurity SolutionsNetwork security components often include:Antivirus and antispyware Firewall filteringDedicated firewall systemsAccess control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential461.4.3.2 Security Solutions 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork ArchitecturesCisco Network Architectures

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential471.4.4.1 Cisco Network Architectures 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrNetwork ArchitecturesCisco Certified Network Associate (CCNA)

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential481.4.4.2 CCNA 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrExploring the NetworkingSummaryIn this chapter, you learned:Networks and the Internet have changed the way we communicate, learn, work, and even play. Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices. The Internet is the largest network in existence. In fact, the term Internet means a network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests. The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate devices, and network media.

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential49Chapter I Summary 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scrExploring the NetworkingSummary (cont.)In this chapter, you learned:Networks must be reliable. Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users. The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential50Chapter 12 Summary (cont.) 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

Presentation_ID# 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential