Week 01 - Introduction To Computer Network

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 47

Interconnecting

Cisco Networking
Devices Part 1
(ICND1 v1.0)

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1


Course Introduction

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2


Learner Skills and Knowledge

▪ Basic computer literacy


▪ Basic Windows navigation skills
▪ Basic Internet usage skills
▪ Basic e-mail usage skills

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3


Course Goal
“To provide you with the knowledge and skills
necessary to install, operate, and troubleshoot
a small network”

Interconnecting Cisco Networking Devices Part 1

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—4


General Administration

Class-Related Facilities-Related
▪ Sign-in sheet ▪ Course materials
▪ Length and times ▪ Site emergency procedures
▪ Break and lunch room locations ▪ Rest rooms
▪ Attire ▪ Telephones and faxes

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—5


Course Flow
Week 01 Week 02 Week 03 Week 04 Week 05 Week 06 Week 07 Week 08
Course OSI Model TCP/IP IP Variable LAN, Internet Midterm
Introducin Protocol Address Length Repeater, Operating Exam (60
g Peer to Stack Subnet Switch, System minutes,
peer TCP/UDP Mask Hub (NIC) multiple
Building a network choices ,
simple Closed
network book)

Week 09 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Week 16


Static, Distance OSPF OSPF, DR, DHCP, DHCP, Review Final
Dynamic vector, Route BDR NAT PAT Exam (90
Route RIP minutes,
multiple
choices ,
Closed
book)

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—6


Course descriptions

• Course: Computer Networking


• Course code: MT106DV01
• Credit: 3
• Period: 60 (Theory: 30, Practice: 30)
• Prerequisite: None
• Reference:
– Interconnecting Cisco Network Devices, Part 1 (ICND1)
– Interconnecting Cisco Network Devices, Part 2 (ICND2)
• Software: Packet Tracer

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—7


Documents online

• http://tiny.cc/mmtcs

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—8


Cisco Icons and Symbols

Router Wireless Secure Router Firewall Home Office


Router

Workgroup Access Point IP Phone Mobile Small


Switch Access Business
Phone

Wireless Line: Serial Line: Ethernet


Connectivity

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—9


Cisco Career Certifications

Cisco
Certifications

www.cisco.com/go/certifications
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—10
Cisco Career Certifications
Expand Your Professional Options, Advance Your Career
Cisco Certified Network Associate
CCIE Expert Recommended Training Through
Cisco Learning Partners
Interconnecting Cisco Networking Devices Part 1
CCNP Professional
Interconnecting Cisco Networking Devices Part 2

CCENT Associate
CCNA
Entry Technician

Cisco Certified Entry Network Technician

Recommended Training Through


Cisco Learning Partners
www.cisco.com/go/certifications
Interconnecting Cisco Networking Devices Part 1

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—11


What Is the Lifecycle Services Framework?

• The Cisco Lifecycle Services Framework defines the minimum set of activities needed to deploy, operate,
and optimize Cisco technologies successfully throughout the lifecycle of a network.
• There are six phases in the network lifecycle: Prepare, Plan, Design, Implement, Operate and Optimize.
• Each phase has a set of service components comprising activities and deliverables to help ensure
service excellence. A network service is performed when a service component item is completed.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—12


CCNA Students:
A Focus on “Implement” and “Operate”

Phase Benefits of the Lifecycle Services Approach


Make sound financial decisions by developing a business case that
Prepare
establishes the financial justification for making a technology change.
Assess the existing environment to determine whether it can support the
Plan
proposed system sufficiently and securely.

Design Design a solution that meets business and technical requirements.

Integrate the new solution without disrupting the network or creating


Implement
points of vulnerability.

Operate Maintain network health through day-to-day operations.

Achieve operational excellence by adapting the architecture,


operation, and performance of the network to ever-changing
Optimize
business requirements and positioning it to reenter the prepare
phase of its lifecycle.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—13


A Network Lifecycle Services Approach:
Why Is It Important Now?

▪ In the past, point approaches for the Design, Implement, and Operate phases were sufficient to deploy
and support a network.
▪ Today, network complexity and technology convergence increase the importance of having a network
lifecycle approach that adapts over time to changing business conditions. A coordinated and continual
sequence of lifecycle service activities leads to successful initial implementations and operations as well
as to future optimized performance.
▪ The Cisco Lifecycle Services approach helps meet these new and more complex requirements.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—14


Learner Introductions

▪ Your name
▪ Your company
▪ Job responsibilities
▪ Skills and
knowledge
▪ Brief history
▪ Objective

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—15


Exploring the
Functions of
Networking

Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—16


What Is a Network?

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—17


Common Physical Components of a
Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—18


Interpreting a Network Diagram

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—19


Resource-Sharing Functions and
Benefits

▪ Data and applications


▪ Resources
▪ Network storage
▪ Backup devices
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—20
Network User Applications

▪ E-mail (Outlook, POP3, Google, Yahoo, and so on)


▪ Web browser (IE, Firefox, Chrome, and so on)
▪ Instant messaging (Yahoo IM, Microsoft Messenger, and so on)
▪ Collaboration (Whiteboard, Netmeeting, WebEx, and so on)
▪ Databases (file servers)

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—21


Impact of User Applications on the
Network
▪ Batch applications
– FTP, TFTP, inventory updates
– No direct human interaction
– Bandwidth important, but not critical
▪ Interactive applications
– Inventory inquiries, database updates.
– Human-to-machine interaction.
– Because a human is waiting for a
response, response time is important
but not critical, unless the wait
becomes excessive.
▪ Real-time applications
– VoIP, video
– Human-to-human interaction
– End-to-end latency critical

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—22


Characteristics of a Network

▪ Speed
▪ Cost
▪ Security
▪ Availability
▪ Scalability
▪ Reliability
▪ Topology

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—23


Physical Topology Categories

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—24


Logical Topologies

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—25


Bus Topology

▪ All devices receive the signal.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—26


Star Topology

▪ Transmission through a central point.


▪ Single point of failure.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—27
Extended-Star Topology

▪ More resilient than star topology.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—28


Ring Topology

▪ Signals travel around ring.


▪ Single point of failure.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—29


Dual-Ring Topology

▪ Signals travel in opposite directions.


▪ More resilient than single ring.
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—30
Full-Mesh Topology

▪ Highly fault-tolerant
▪ Expensive to implement
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—31
Partial-Mesh Topology

▪ Trade-off between fault tolerance and cost

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—32


Connection to the Internet

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—33


Securing the
Network

Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—34


Closed Networks

Attacks from inside the network remain a threat.


© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—35
Open Networks

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—36


Threat Capabilities—
More Dangerous and Easier to Use

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—37


E-Business Challenge

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—38


Adversaries, Adversary Motivations, and
Classes of Attack

Adversaries Motivations Classes of Attack


▪ Nation-states ▪ Intelligence ▪ Passive
▪ Terrorists ▪ Theft ▪ Active
▪ Criminals ▪ DoS ▪ Close-in
▪ Hackers ▪ Embarrassment ▪ Insider
▪ Crackers ▪ Challenge ▪ Distributed
▪ Competitors
▪ “Script kiddies”
▪ Disgruntled
employees
▪ Government

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—39


Common Threats
▪ Physical installations
– Hardware threats
– Environmental threats
– Electrical threats
– Maintenance threats
▪ Reconnaissance attacks—Learning information about a target
network by using readily available information and applications
▪ Access attacks—Attacks on networks or systems for these reasons:
– Retrieve data
– Gain access
– Escalate their access privileges
▪ Password attacks—Tools used by hackers to compromise passwords

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—40


Password Attack Threat Mitigation

Here are password attack threat-mitigation techniques:


▪ Do not allow users to use the same password on multiple
systems.
▪ Disable accounts after a certain number of unsuccessful login
attempts.
▪ Do not use cleartext passwords.
▪ Use “strong” passwords; for example, “mY8!Rthd@y” rather than
“mybirthday.”

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—41


Summary
▪ A network is a connected collection of devices that can
communicate with each other. Networks carry data in many kinds
of environments, including homes, small businesses, and large
enterprises.
▪ There are four major categories of physical components in a
computer network: the computer, interconnections, switches, and
routers.
▪ Networks are depicted graphically using a set of standard icons.
▪ The major resources that are shared in a computer network
include data and applications, peripherals, storage devices, and
backup devices.
▪ The most common network user applications include e-mail, web
browsers, instant messaging, collaboration, and databases.
▪ User applications affect the network by consuming network
resources.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—42


Summary (Cont.)

▪ The ways in which networks can be described include


characteristics that address network performance and structure:
speed, cost, security, availability, scalability, reliability, and
topology.
▪ A physical topology describes the layout for wiring the physical
devices, while a logical topology describes how information flows
through a network.
▪ In a physical bus topology, a single cable effectively connects all
the devices.
▪ In a physical star topology, each device in the network is
connected to the central device with its own cable.
▪ When a star network is expanded to include additional
networking devices that are connected to the main networking
device, it is called an extended-star topology.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—43


Summary (Cont.)

▪ In a ring topology, all the hosts are connected in the form of a ring
or circle. In a dual-ring topology, there are two rings to provide
redundancy in the network.
▪ A full-mesh topology connects all devices to each other; in a
partial-mesh topology, at least one device has multiple
connections to all other devices.
▪ There are three common methods of connecting the small office
to the Internet: DSL using the existing telephone lines, cable
using the CATV infrastructure, and serial links using the classic
digital local loops.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—44


Summary

▪ Sophisticated attack tools and open networks continue to


generate an increased need for network security policies and
infrastructure to protect organizations from internally and
externally based attacks.
▪ Organizations must balance network security needs against
e-business processes, legal issues, and government policies.
Establishing a network security policy is the first step in changing
a network over to a secure infrastructure.
▪ Network adversaries come in many shapes and sizes and with
multiple motivations.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—45


Summary (Cont.)
▪ It is very important to provide physical installation security for
enterprise network devices.
▪ Password attack threats can be mitigated.
– Restrict password use.
– Disable accounts after unsuccessful logins.
– Do not use cleartext passwords; use strong passwords.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—46


Thanks you!

Any questions?

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—60

You might also like