0% found this document useful (0 votes)
14 views

Modulo 1 - Capitulo 1

Uploaded by

Gybes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Modulo 1 - Capitulo 1

Uploaded by

Gybes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CAPITULO 1: EXPLORE THE NETWORK

1.1.1. Networks
1. Small Home Networks: connect few computers to each other and the Internet
2. Small Office/Home Office: enables computer within a home or remote office to connect to a corporate network
3. Medium to Large Networks: many locations hundreds interconnected computers
4. World Wide Networks: connects hundreds of millions of computers to Internet

1.1.2. Clients and Servers


1. PC: host or end device.
2. Servers: provide information to end devices on the network.
3. Clients: PC’s that send requests to the servers to retrieve information

1.1.3. Peer-to-Peer
1. Client and server software run on separate computers.
2. Peer-to-peer networking: client also functions as the server.
1. Advantages: 1. easy to set up 2. less complex 3. lower cost.
2. Disadvantages: 1. no centralized administration 2. not as secure 3. not scalable 4. slower performance.

1.1.4. Network Components


1. End Devices
1. Where a message originates from or where it is received.
2. Intermediary Network Devices:
1. Interconnects end devices in a network (SW’s, SP’s, CPE’s, FW’s)
2. Regenerate and retransmit data signals.
3. Maintain information about what pathways exist through the network and internetwork.
4. Notify other devices of errors and communication failures.
3. Media
1. Medium carries message to travel from source to destination.
2. Types of medium / media:
1. Metallic cables: copper
2. Glass: fibre optic cables
3. Wireless transmission
4. Services

1.1.5. Network Representations


1. Network Interface Card (NIC)
2. Physical Port
3. Interface

1.1.6. Topology Diagrams


1. Physical location of devices
2. Ports and network addressing schemes

1.2. Types of Networks


1. Local Area Network (LAN): small geographic area owned or operated by IT department.
2. Wide Area Network (WAN): large geographic area - telecommunications service provider.
Interconnect LANs, administered by multiple ISP’s, provide slower speed links between LANs.
3. Metropolitan Area Network (MAN)
4. Wireless LAN (WLAN)
5. Storage Area Network (SAN)

1.3. Internet, Intranets, and Extranets

1.3.1. Internet
1. The following groups were developed to help maintain the structure: 1. IETF 2. ICANN 3. IAB

1.3.2. Intranet
1. Private collection of LANs and WANs internal to an organization accessible only to the organizations members or
others with authorization.

1.3.2. Extranet
1. Provide secure access to their network for individuals who work for a different organization that need access to
their data on their network.
1.4. Internet Connections

1.4.1. Home and Small Office Internet Connections


1. Cable: high bandwidth, always on, Internet connection offered by cable television service providers.
2. DSL: high bandwidth, always on, Internet connection that runs over a telephone line.
3. Cellular: cell phone network to connect to the Internet;
4. Satellite: major benefit to rural areas without Internet Service Providers.
5. Dial-up telephone: inexpensive, low bandwidth option using a modem.

1.4.2. Businesses Internet Connections


1. Dedicated Leased Line: reserved circuits within the service provider’s network that connect distant offices with
private voice and/or data networking.
2. Ethernet WAN: extends LAN access technology into the WAN.
3. DSL: Business DSL , Symmetric Digital Subscriber Lines (SDSL).
4. Satellite: provide connection when a wired solution is not available.

1.5. Network Platform

1.5.1. Traditional Separate Networks


1. Each network use different technologies to carry the communication signals using a different set of rules and
standards.

1.5.2. Converging Network


1. Deliver data, voice, and video between different types of devices over the same network infrastructure.
2. Network infrastructure uses the same set of rules and standards.

1.6. Reliable Network

1.6.1. Fault Tolerance


1. Limits impact of failure by limiting the number of affected devices.
2. Multiple paths are required for fault tolerance.
3. Implementing a packet switched network.
4. Packet switching splits traffic into packets that are routed over a network.
5. Each packet could theoretically take a different path to the destination.
6. This is not possible with circuit-switched networks which establish dedicated circuits.

1.6.2. Scalability
1. Network expand quickly and easily to support new users and applications without impacting the performance of
services to existing users.
2. Network designers follow accepted standards and protocols in order to make the networks scalable.

1.6.3. Quality of Service (QoS)


1. Primary mechanism used to ensure reliable delivery of content for all users.
2. With QoS policy the router can more easily manage the flow of data and voice traffic.

1.6.4. Security

1.6.4.1. Network infrastructure security


1. Physical security of network devices
2. Preventing unauthorized access to the management software on those devices

1.6.4.2. Information Security


1. Protection of the information or data transmitted over the network
2. Three goals of network security:
1. Confidentiality: only intended recipients can read the data
2. Integrity: assurance that the data has not be altered with during transmission
3. Availability: assurance of timely and reliable access to data for authorized users
1.7. Network Trends

1.7.1. Bring Your Own Device (BYOD)


1. Allows users to use their own devices giving them more opportunities and greater flexibility.
2. Allows users to have the freedom to use personal tools to access information:
3. Laptops/Netbooks/Tablets/Smartphones/E-readers

1.7.2. Online collaboration


1. Individuals want to collaborate and work with others over the network on joint projects.(Cisco WebEx)

1.7.3. Video communications


1. Cisco TelePresence powers the new way of working where everyone, everywhere, can be more

1.7.4. Cloud computing


1. Allows to store personal files or backup our data on servers over the Internet.
2. Made possible by data centers.
3. 4 types of Clouds:
1. Public Clouds
Services and applications are made available through a pay-per-use model or for free.
2. Private Clouds
Applications and services are intended for a specific organization or entity such as the government.
3. Hybrid Clouds
Made up of two or more Cloud types: for example, part custom and part public.
Each part remains a distinctive object but both are connected using the same architecture.
4. Custom Clouds

1.8. Home Trends

1.8.1. Powerline Networking


1. Allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.
2. Sevices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies.

1.8.2. Wireless Broadband


1. Found in rural environments, a Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to
designated access points or hotspots.
2. Solution for the home and small businesses.
3. Uses the same cellular technology used by a smart phone.
4. An antenna is installed outside the house providing wireless or wired connectivity for devices in home

1.9. Security Solutions


1. Security must be implemented in multiple layers using more than one security solution.
2. Network security components for home or small office network:
1. Antivirus and antispyware software should be installed on end devices.
2. Firewall filtering used to block unauthorized access to the network.
3. Larger networks have additional security requirements:
1. Dedicated firewall system to provide more advanced firewall capabilities.
2. Access control lists (ACL): used to further filter access and traffic forwarding.
3. Intrusion prevention systems (IPS): identify fast-spreading threats such as zero-day attacks.
4. Virtual private networks (VPN): used to provide secure access for remote workers

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy