Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

Chapter 1:

Exploring the Network

Introduction to Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Networking Today
Networks in Our Past and Daily Lives

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Learn

 Networks Support the Way We Communicate

 Networks Support the Way We Work

 Networks Support the Way We Play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Providing Resources in a Network
Clients and Servers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Providing Resources in a Network
Peer-to-Peer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
1. Devices
2. Media
3. Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Components of a Network
End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)
 End devices are referred to as hosts.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Components of a Network
Network Infrastructure (Intermediary) Devices

Examples of intermediary network devices are:


 Network Access Devices (switches, and wireless access
points)
 Internetworking Devices (routers)
 Security Devices (firewalls)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Components of a Network
Network Media
Different types of network
media have different
features and benefits.
• The distance the media
can successfully carry a
signal.
• The environment in
which the media is to be
installed.
• The amount of data and
the speed at which it
must be transmitted.
• The cost of the media
and installation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Components of a Network
Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Components of a Network
Topology Diagrams

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).

Other types of networks include:


 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
LANs and WANs
Local Area Networks (LAN)

• An individual network usually spans a single


geographical area, providing services and applications
to people within a common organizational structure,
such as a single business, campus or region.
• A LAN is usually administered by a single organization.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
LANs and WANs
Wide Area Networks (WAN)

 When a company or organization has locations that are separated by large


geographical distances, it may be necessary to use a telecommunications
service provider (TSP) to interconnect the LANs at the different locations.
These networks that connect LANs in geographically separated locations are referred to
as Wide Area Networks (WANs).
WANs use specifically designed network devices to make the interconnections between
LANs.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
LANs, WANs, and Internets
The Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
LANs, WANs, and Internets
Internet Access Technologies

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Connecting to the Internet
Connecting Remote Users to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Connecting to the Internet
Connecting Businesses to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Converged Networks
 Multiple services-multiple networks
Traditional telephone, radio, television, and
computer data networks each have their own
individual networks, every one of these services
required a different technology to carry its
particular communication signal.

 Converged networks
Technology advances are enabling us to
consolidate these disparate networks onto one
platform - a platform defined as a converged
network.
The flow of voice, video, and data traveling
over the same network eliminates the need to
create and maintain separate networks.
On a converged network there are still many
points of contact and many specialized
devices - for example, personal computers,
phones, TVs, personal assistants, and retail
point-of-sale registers - but only one common
network infrastructure.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Converged Networks
Planning for the Future

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
1. Fault Tolerance
2. Scalability
3. Quality of Service (QoS)
4. Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Reliable Network
Fault Tolerance: Circuit Switched Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Reliable Network
Fault Tolerance: Packet-Switched Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Reliable Network
Scalable Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Reliable Network
Providing (QoS)
 Networks must provide secure, predictable, measurable, and, at
times, guaranteed services.
The packet-switched network architecture does not guarantee
that all packets that comprise a message will arrive on time, in
their correct in order, or even that they will arrive at all.
Examples of priority decisions for an organization might include:
 Time-sensitive communication - increase priority for services like
telephony or video distribution.
 Non time-sensitive communication - decrease priority for web page
retrieval or email.
 High importance to organization - increase priority for production
control or business transaction data.
 Undesirable communication - decrease priority or block unwanted
activity, like peer-to-peer file sharing or live entertainment

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Reliable Network
Providing Network Security
There are two types of network security concerns:
1. Securing a network infrastructure: includes the physical securing of
devices that provide network connectivity and preventing
unauthorized access to them.
2. Content security: refers to protecting the information contained within
the packets being transmitted over the network and the information
stored on network attached devices.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Network Trends
Predictions

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Network Trends
New trends
Some of the top trends include:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Network Trends
Bring Your Own Device (BYOD)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Network Trends
Online Collaboration

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Network Trends
Video Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Network Trends
Cloud Computing
There are four primary types of clouds:
 Public clouds
 Private clouds
 Custom clouds
 Hybrid clouds

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
 Redundant data communications connections
 High-speed virtual servers (sometimes referred to as server
farms or server clusters)
 Redundant storage systems (typically uses SAN technology)
 Redundant or backup power supplies
 Environmental controls (e.g., air conditioning, fire
suppression)
 Security devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Networking Technologies for the Home
Technology Trends in the Home

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Networking Technologies for the Home
Wireless Broadband

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39

You might also like