Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Module 1: Networking Today

Instructor Materials

Introduction to Networks v7.0


(ITN)

Prof. Ben slama Sami


bemslama.sami@gmail.com
Module Objectives
Module Objective: Explain the advances in modern technologies.

Topic Title Topic Objective


Networks Affect our Lives Explain how networks affect our daily lives.
Network Components Explain how host and network devices are used.
Network Representations and Explain network representations and how they are used in network
Topologies topologies.
Common Types of Networks Compare the characteristics of common types of networks.
Internet Connections Explain how LANs and WANs interconnect to the internet.
Reliable Networks Describe the four basic requirements of a reliable network.

Network Trends Explain how trends such as BYOD, online collaboration, video, and cloud
computing are changing the way we interact.
Network Security Identify some basic security threats and solution for all networks.

The IT Professional Explain employment opportunities in the networking field.


1.8 Network Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Network Security
Security Threats • Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service that
is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques in
order to secure data and mitigate
threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Security External Threats:
‫التهديدات‬
Security Threats (Cont.) • Viruses, worms, and Trojan
horses
‫المفقودة أو المسروقة‬ • Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft

Internal Threats:
• lost or stolen devices
• accidental misuse by
employees
‫الموظفين‬
• malicious employees
‫الخبثاء‬
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Security
Security Solutions (Cont.)

Larger networks have additional security


requirements:
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems (IPS)
• Virtual private networks (VPN)
The study of network security starts with a clear
understanding of the underlying switching and
routing infrastructure.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
1.9 The IT Professional

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Exercices-Chapter -1
At which layer of the OSI model would a Which PDU format is used when bits
1- What is a WAN? logical address be added during are received from the network medium
• a network infrastructure designed to provide data storage, encapsulation? by the NIC of a host?
retrieval, and replication • physical layer • file
• a network infrastructure that provides access to other • frame
networks over a large geographic area • data link layer
• a network infrastructure that spans a limited physical area • network layer • packet
such as a city • transport layer • segment
• a network infrastructure that provides access in a small
geographic area

What type of communication will send a What process is used to place one message inside
message to all devices on a local area another message for transfer from the source to
network? the destination?
• broadcast • access control
• multicast • decoding
• unicast • encapsulation
• allcast • flow control

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
What command can be used on a

Quiz-Chapter -1 Windows PC to see the IP configuration


of that computer?
• ping
• ipconfig
1- What is a WAN? Which device performs the function of • show interfaces
• a network infrastructure designed to provide data storage, determining the path that messages should • show ip interface brief
retrieval, and replication take through internetworks?
• a network infrastructure that provides access to other • a router Which type of connector does a network
networks over a large geographic area • a firewall interface card use?
• a network infrastructure that spans a limited physical area • a web server 1. DIN
such as a city • a DSL modem 2. PS-2
• a network infrastructure that provides access in a small 3. RJ-11
geographic area An employee at a branch office is creating a 4. RJ-45
quote for a customer. In order to do this, the
employee needs to access confidential pricing
2- Which three devices are considered end What are two types of router interfaces?
information from internal servers at the Head
devices in a network? (Choose three.) (Choose two.)
Office. What type of network would the
• router • SVI
employee access?
• switch • LAN
• an intranet
• VoIP phone • DHCP
• the Internet
• security camera • Telnet
• an extranet
• ​access point • WAN
• a local area network
• TelePresence endpoint

What are the two characteristics of RAM on a What are two types of router interfaces?
3- What is an ISP? Cisco device? (Choose two.)
• It is a standards body that develops cabling and • During a power cycle, the contents of RAM are • SVI
wiring standards for networking. erased. • LAN
• It is a protocol that establishes how computers • RAM is used for non-volatile storage.RAM stores • DHCP
within a local network communicate. the configuration that is currently active on the • Telnet
• It is an organization that enables individuals and device. • WAN
businesses to connect to the Internet. • Storage for a limited period of time
• It is a networking device that combines the • RAM is used in Cisco switches but not Cisco
functionality of several different networking routers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
devices in one. • RAM can store multiple versions of IOS as well as
configuration files.
What command can be used on a

Quiz-Chapter -1 Windows PC to see the IP configuration


of that computer?
• ping
• ipconfig
Which three commands are used to set up secure Which device performs the function of • show interfaces
access to a router through a connection to the determining the path that messages should • show ip interface brief
remotly interface? (Choose three.) take through internetworks?
• interface fastethernet 0/0 • a router Which type of connector does a network
• line vty 0 4 • a firewall interface card use?
• Line console • a web server 1. DIN
• enable secret cisco • a DSL modem 2. PS-2
• login 3. RJ-11
• password cisco An employee at a branch office is creating a 4. RJ-45
quote for a customer. In order to do this, the
employee needs to access confidential pricing
What are two types of router interfaces?
information from internal servers at the Head
(Choose two.)
Office. What type of network would the
• SVI
employee access?
• LAN
• an intranet
• DHCP
• the Internet
• Telnet
• an extranet
• WAN
• a local area network

What are the two characteristics of RAM on a What are two types of router interfaces?
3- What is an ISP? Cisco device? (Choose two.)
• It is a standards body that develops cabling and • During a power cycle, the contents of RAM are • SVI
wiring standards for networking. erased. • LAN
• It is a protocol that establishes how computers • RAM is used for non-volatile storage.RAM stores • DHCP
within a local network communicate. the configuration that is currently active on the • Telnet
• It is an organization that enables individuals and device. • WAN
businesses to connect to the Internet. • Storage for a limited period of time
• It is a networking device that combines the • RAM is used in Cisco switches but not Cisco
functionality of several different networking routers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
devices in one. • RAM can store multiple versions of IOS as well as
configuration files.
The IT Professional
Networking Jobs

At www.netacad.com you can click the


Careers menu and then select Employment
opportunities.
• Find employment opportunities by
using the Talent Bridge Matching
Engine.
• Search for jobs with Cisco, Cisco
partners and distributors seeking
Cisco Networking Academy students
and alumni.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Skills

The following chapter will enable students to following tasks :

a. All computers that are connected to a network and participate directly in network
communication are classified as hosts.
b. Diagrams of networks often use symbols to represent the different devices and
connections that make up a network.
c. A diagram provides an easy way to understand how devices connect in a large
network.
d. The two types of network infrastructures are Local Area Networks (LANs), and
Wide Area Networks (WANs).
e. SOHO internet connections include cable, DSL, Cellular, Satellite, and Dial-up
telephone.
f. Business internet connections include Dedicated Leased Line, Metro Ethernet,
Business DSL, and Satellite. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
1.10 Module Practice and
Quiz

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

You might also like