nb instructorppt chapter1

Upload: orlando-leon

Post on 04-Jun-2018

236 views

Category:

Documents


1 download

TRANSCRIPT

  • 8/14/2019 NB InstructorPPT Chapter1

    1/49

    2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

    Chapter 1:

    Exploring the Network

    Network Basics

  • 8/14/2019 NB InstructorPPT Chapter1

    2/49

    Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Chapter 1: Objectives

    Students will be able to:

    Explain how networks affect the way we communicate,collaborate, and share.

    Explain the basic characteristics of a network thatsupports communication in a small to medium-sizedbusiness.

    Explain the topologies and devices used in a small tomedium-sized business network.

    Explain trends in networking that will affect the use ofnetworks in small to medium-sized business.

  • 8/14/2019 NB InstructorPPT Chapter1

    3/49

    Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Chapter 1

    1.1 Communicating in a Network-Centric World

    1.2 The Network as a Platform

    1.3 LANs, WANs, and Internets

    1.4 Expanding the Networking1.5 Summary

  • 8/14/2019 NB InstructorPPT Chapter1

    4/49

    Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Interconnecting our Lives

    Networks in Our Past and Daily Lives

  • 8/14/2019 NB InstructorPPT Chapter1

    5/49

    Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Interconnecting our Lives

    The Global Community

  • 8/14/2019 NB InstructorPPT Chapter1

    6/49

    Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Interconnecting our Lives

    Networking impacts in our daily lives

    Networks Support the Way We Communicate

    Networks Support the Way We Learn

    Networks Support the Way We Work

    Networks Support the Way We Play

  • 8/14/2019 NB InstructorPPT Chapter1

    7/49Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Supporting Communication

    What is Communication?

    Establishing the Rules

    An identified sender and receiver

    Agreed upon method of communicating (face-to-face,telephone, letter, photograph)

    Common language and grammar

    Speed and timing of delivery

    Confirmation or acknowledgement requirements

  • 8/14/2019 NB InstructorPPT Chapter1

    8/49Presentation_ID 8 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Supporting Communication

    Quality of Communication

    External factors affecting the success of communicationinclude:

    The quality of the pathway between the sender and therecipient

    The number of times the message has to change form

    The number of times the message has to be redirected orreaddressed

    The number of other messages being transmittedsimultaneously on the communication network

    The amount of time allotted for successful communication

  • 8/14/2019 NB InstructorPPT Chapter1

    9/49Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Supporting Communication

    Internal QoS Factors

    Internal factors affecting successful communication across thenetwork include:

    The size of the message

    The complexity of the message

    The importance of the message

  • 8/14/2019 NB InstructorPPT Chapter1

    10/49Presentation_ID 10 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Converged Networks

    Traditional Service Networks

  • 8/14/2019 NB InstructorPPT Chapter1

    11/49Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Converged Networks

    Planning for the Future

  • 8/14/2019 NB InstructorPPT Chapter1

    12/49Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reliable Network

    Supporting Network Architecture

    As networks evolve, we are discovering that there are fourbasic characteristics that the underlying architectures need toaddress in order to meet user expectations:

    Fault Tolerance

    Scalability

    Quality of Service (QoS)

    Security

  • 8/14/2019 NB InstructorPPT Chapter1

    13/49Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reliable Network

    Fault Tolerance in Circuit Switched Network

  • 8/14/2019 NB InstructorPPT Chapter1

    14/49Presentation_ID 14 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reliable Network

    Packet-Switched Networks

  • 8/14/2019 NB InstructorPPT Chapter1

    15/49Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reliable Network

    Scalability

  • 8/14/2019 NB InstructorPPT Chapter1

    16/49Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reliable Network

    Quality of Service (QoS)

    Examples of priority decisions for an organization mightinclude:

    Time-sensitive communication - increase priority for serviceslike telephony or video distribution.

    Non time-sensitive communication - decrease priority for webpage retrieval or email.

    High importance to organization - increase priority for

    production control or business transaction data. Undesirable communication - decrease priority or block

    unwanted activity, like peer-to-peer file sharing or liveentertainment

  • 8/14/2019 NB InstructorPPT Chapter1

    17/49Presentation_ID 17 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reliable Network

    Network Security

  • 8/14/2019 NB InstructorPPT Chapter1

    18/49Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    LANs, WANs, and Internets

    Components of a Network

    There are three categories of network components:

    End devices

    Intermediary devices

    Network media

  • 8/14/2019 NB InstructorPPT Chapter1

    19/49Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Components of a Network

    End Devices

    Some examples of end devices are:

    Computers (work stations, laptops, file servers, web servers)

    Network printers

    VoIP phones

    TelePresence endpoint

    Security cameras

    Mobile handheld devices (such as smartphones, tablets,PDAs, and wireless debit / credit card readers and barcodescanners)

  • 8/14/2019 NB InstructorPPT Chapter1

    20/49Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Components of a Network

    Network Infrastructure Devices

    Examples of intermediary network devices are:

    Network Access Devices (switches, and wireless accesspoints)

    Internetworking Devices (routers) Security Devices (firewalls)

  • 8/14/2019 NB InstructorPPT Chapter1

    21/49Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Components of a Network

    Network Media

  • 8/14/2019 NB InstructorPPT Chapter1

    22/49Presentation_ID 22 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Components of a Network

    Network Topology Diagrams

  • 8/14/2019 NB InstructorPPT Chapter1

    23/49Presentation_ID 23 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    LANs and WANs

    Types of Networks

    The two most common types of network infrastructures are:

    Local Area Network (LAN)

    Wide Area Network (WAN).

    Other types of networks include:

    Metropolitan Area Network (MAN)

    Wireless LAN (WLAN)

    Storage Area Network (SAN)

  • 8/14/2019 NB InstructorPPT Chapter1

    24/49Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    LANs and WANs

    Local Area Networks (LAN)

  • 8/14/2019 NB InstructorPPT Chapter1

    25/49

    Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    LANs and WANs

    Wide Area Networks (WAN)

  • 8/14/2019 NB InstructorPPT Chapter1

    26/49

    Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    LANs, WANs, and Internets

    The Internet

  • 8/14/2019 NB InstructorPPT Chapter1

    27/49

    Presentation_ID 27 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Internet

    Intranet and Extranet

  • 8/14/2019 NB InstructorPPT Chapter1

    28/49

    Presentation_ID 28 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    LANs, WANs, and Internets

    Internet Access Technologies

  • 8/14/2019 NB InstructorPPT Chapter1

    29/49

    Presentation_ID 29 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Connecting to the Internet

    Connecting Remote Users to the Internet

  • 8/14/2019 NB InstructorPPT Chapter1

    30/49

    Presentation_ID 30 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Connecting to the Internet

    Connecting Businesses to the Internet

  • 8/14/2019 NB InstructorPPT Chapter1

    31/49

    Presentation_ID 31 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    New trends

    Some of the top trends include:

    Bring Your Own Device (BYOD)

    Online collaboration

    Video

    Cloud computing

  • 8/14/2019 NB InstructorPPT Chapter1

    32/49

    Presentation_ID 32 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    Bring Your Own Device (BYOD)

  • 8/14/2019 NB InstructorPPT Chapter1

    33/49

    Presentation_ID 33 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    BYOD Considerations

  • 8/14/2019 NB InstructorPPT Chapter1

    34/49

    Presentation_ID 34 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    Online Collaboration and Considerations

  • 8/14/2019 NB InstructorPPT Chapter1

    35/49

    Presentation_ID 35 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    Video

  • 8/14/2019 NB InstructorPPT Chapter1

    36/49

    Presentation_ID 36 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    Cloud Computing

    There are four primary types of clouds:

    Public clouds

    Private clouds

    Custom clouds

    Hybrid clouds

  • 8/14/2019 NB InstructorPPT Chapter1

    37/49

    Presentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Trends

    Data Centers

    A data center is a facility used to house computer systems andassociated components including:

    Redundant data communications connections

    High-speed virtual servers (sometimes referred to as serverfarms or server clusters)

    Redundant storage systems (typically uses SAN technology)

    Redundant or backup power supplies

    Environmental controls (e.g., air conditioning, firesuppression)

    Security devices

  • 8/14/2019 NB InstructorPPT Chapter1

    38/49

    Presentation_ID 38 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Future of Networking

    Network Security

  • 8/14/2019 NB InstructorPPT Chapter1

    39/49

    Presentation_ID 39 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Security

    Security Threats

    The most common external threats to networks include:

    Viruses, worms, and Trojan horses

    Spyware and adware

    Zero-day attacks, also called zero-hour attacks

    Hacker attacks

    Denial of service attacks

    Data interception and theft

    Identity theft

  • 8/14/2019 NB InstructorPPT Chapter1

    40/49

    Presentation_ID 40 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Security

    Security Solutions

    Network security components often include:

    Antivirus and antispyware

    Firewall filtering

    Dedicated firewall systems

    Access control lists (ACL)

    Intrusion prevention systems (IPS)

    Virtual Private Networks (VPNs)

  • 8/14/2019 NB InstructorPPT Chapter1

    41/49

    Presentation_ID 41 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Architectures

    Cisco Network Architectures

  • 8/14/2019 NB InstructorPPT Chapter1

    42/49

    Presentation_ID 42 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Architectures

    Cisco Borderless Network

  • 8/14/2019 NB InstructorPPT Chapter1

    43/49

    Presentation_ID 43 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Architectures

    Collaboration Architecture

  • 8/14/2019 NB InstructorPPT Chapter1

    44/49

    Presentation_ID 44 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Architectures

    Data Center Architecture

  • 8/14/2019 NB InstructorPPT Chapter1

    45/49

    Presentation_ID 45 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Architectures

    Cisco Certified Network Associate (CCNA)

  • 8/14/2019 NB InstructorPPT Chapter1

    46/49

    Presentation_ID 46 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Exploring the Networking

    Summary

    In this chapter, you learned:

    Networks and the Internet have changed the way wecommunicate, learn, work, and even play.

    Networks come in all sizes. They can range from simplenetworks consisting of two computers, to networksconnecting millions of devices.

    The Internet is the largest network in existence. In fact, theterm Internet means a network of networks. The Internet

    provides the services that enable us to connect andcommunicate with our families, friends, work, and interests.

  • 8/14/2019 NB InstructorPPT Chapter1

    47/49

    Presentation_ID 47 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Exploring the Networking

    Summary

    In this chapter, you learned:

    The network infrastructure is the platform that supports thenetwork. It provides the stable and reliable channel overwhich communication can occur. It is made up of network

    components including end devices, intermediate device, andnetwork media.

    Networks must be reliable.

    Network security is an integral part of computer networking,regardless of whether the network is limited to a homeenvironment with a single connection to the Internet, or aslarge as a corporation with thousands of users.

  • 8/14/2019 NB InstructorPPT Chapter1

    48/49

    Presentation_ID 48 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Exploring the Networking

    Summary

    In this chapter, you learned:

    The network infrastructure can vary greatly in terms of size,number of users, and number and types of services that aresupported on it. The network infrastructure must grow and

    adjust to support the way the network is used. The routingand switching platform is the foundation of any networkinfrastructure.

  • 8/14/2019 NB InstructorPPT Chapter1

    49/49