0% found this document useful (0 votes)
4 views

1_Introduction To Networking-1

The document provides an introduction to networking, emphasizing the importance of networks in connecting people and facilitating communication. It outlines various network components, types, and architectures, including LANs, WANs, and the internet, while also discussing trends like Bring Your Own Device (BYOD) and online collaboration. Additionally, it highlights the significance of network security, quality of service, and fault tolerance in maintaining reliable network infrastructures.

Uploaded by

gezalmehmet06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

1_Introduction To Networking-1

The document provides an introduction to networking, emphasizing the importance of networks in connecting people and facilitating communication. It outlines various network components, types, and architectures, including LANs, WANs, and the internet, while also discussing trends like Bring Your Own Device (BYOD) and online collaboration. Additionally, it highlights the significance of network security, quality of service, and fault tolerance in maintaining reliable network infrastructures.

Uploaded by

gezalmehmet06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

11001010110001101010

INTRODUCTION TO
11001010101010

11001010101010
NETWORKING

11001010110001101010
11001010110001101010

NETWORKS AFFECT OUR LIVES


Networks Connect Us

Communication is almost as
important to us as our
11001010101010

11001010101010
reliance on air, water, food,
and shelter. In today’s world,
through the use of networks,
we are connected like never
before.

11001010110001101010
11001010110001101010

NETWORKS AFFECT OUR LIVES


Network and Needs!

 Software resource
 Hardware resource
11001010101010

11001010101010
11001010110001101010
11001010110001101010

NETWORKS AFFECT OUR LIVES


Network and Needs!

 Software resource
 Hardware resource
11001010101010

11001010101010
11001010110001101010
11001010110001101010

NETWORKS AFFECT OUR LIVES


No Boundaries

• World without boundaries


• Global communities
11001010101010

11001010101010
• Human network

11001010110001101010
11001010110001101010

NETWORK COMPONENTS
Host Roles

Every computer on a network is called a host or


end device.
11001010101010

11001010101010
Servers are computers that provide information to
end devices:
• email servers
Server Type Description
• web servers
• file server Email Email server runs email server software.
Clients use client software to access email.
Clients are computers that send requests to the
servers to retrieve information: Web Web server runs web server software.
Clients use browser software to access web pages.
• web page from a web server
• email from an email server
File File server stores corporate and user files.
The client devices access these files.

11001010110001101010
11001010110001101010

NETWORK COMPONENTS
Peer-to-Peer

It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only
recommended for very small networks.
11001010101010

11001010101010
Advantages Disadvantages
Easy to set up No centralized administration

Less complex Not as secure

Lower cost Not scalable

Used for simple tasks: transferring Slower performance


files and sharing printers

11001010110001101010
11001010110001101010

NETWORK COMPONENTS
End Devices

An end device is where a message


originates from or where it is
11001010101010

11001010101010
received. Data originates with an
end device, flows through the
network, and arrives at an end
device.

11001010110001101010
11001010110001101010

NETWORK COMPONENTS
Intermediary Network Devices

An intermediary device interconnects end devices. Examples include switches, wireless access points,
routers, and firewalls.
11001010101010

11001010101010
Management of data as it flows through a network is also the role of an intermediary device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.

11001010110001101010
11001010110001101010

NETWORK COMPONENTS
Network Media

Communication across a network is carried through a medium which allows a message to travel from
source to destination.
11001010101010

11001010101010
Media Types Description
Metal wires within cables Uses electrical impulses

Glass or plastic fibers within Uses pulses of light.


cables (fiber-optic cable)

Wireless transmission Uses modulation of specific


frequencies of
electromagnetic waves.

11001010110001101010
11001010110001101010

NETWORK REPRESENTATIONS AND TOPOLOGIES


Network Representations

Network diagrams, often called topology


diagrams, use symbols to represent devices within
11001010101010

11001010101010
the network.
Important terms to know include:
• Network Interface Card (NIC)
• Physical Port
• Interface

Note: Often, the terms port and interface are


used interchangeably

11001010110001101010
11001010110001101010

NETWORK REPRESENTATIONS AND TOPOLOGIES


Topology Diagrams
Physical Topology
11001010101010

Physical topology diagrams illustrate

11001010101010
the physical location of intermediary
devices and cable installation.

11001010110001101010
11001010110001101010

NETWORK REPRESENTATIONS AND TOPOLOGIES


Topology Diagrams
Logical Topology
11001010101010

Logical topology diagrams illustrate

11001010101010
devices, ports, and the addressing
scheme of the network.

11001010110001101010
11001010110001101010

COMMON TYPES OF NETWORKS


Networks of Many Sizes

• Small Home Networks – connect a few


computers to each other and the Internet
11001010101010

11001010101010
• Small Office/Home Office – enables computer
within a home or remote office to connect to a
corporate network
• Medium to Large Networks – many locations Small Home SOHO
with hundreds or thousands of interconnected
computers
• World Wide Networks – connects hundreds of
millions of computers world-wide – such as the
internet

Medium/Large World Wide

11001010110001101010
11001010110001101010

COMMON TYPES OF NETWORKS


LANs and WANs

Network infrastructures vary greatly in terms


of:
11001010101010

11001010101010
• Size of the area covered
• Number of users connected
• Number and types of services available
• Area of responsibility

Two most common types of networks:


• Local Area Network (LAN)
• Wide Area Network (WAN).

11001010110001101010
11001010110001101010

COMMON TYPES OF NETWORKS


LANs WANs
A LAN is a network infrastructure that A WAN is a network infrastructure
spans a small geographical area. that spans a wide geographical area.
11001010101010

11001010101010
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or individual. Typically administered by one or more service providers.
Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs.

11001010110001101010
11001010110001101010

COMMON TYPES OF NETWORKS


The Internet

The internet is a worldwide collection of


interconnected LANs and WANs.
11001010101010

11001010101010
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual or
group. The following groups were developed
to help maintain structure on the internet:
• IETF
• ICANN
• IAB
11001010110001101010
11001010110001101010

COMMON TYPES OF NETWORKS


Intranets and Extranets

An intranet is a private collection of LANs and


WANs internal to an organization that is
11001010101010

11001010101010
meant to be accessible only to the
organizations members or others with
authorization.
An organization might use an extranet to
provide secure access to their network for
individuals who work for a different
organization that need access to their data on
their network.

11001010110001101010
11001010110001101010

INTERNET CONNECTIONS
Internet Access Technologies

There are many ways to connect users and


organizations to the internet:
11001010101010

11001010101010
• Popular services for home users and
small offices include broadband cable,
broadband digital subscriber line (DSL),
wireless WANs, and mobile services.
• Organizations need faster connections
to support IP phones, video
conferencing and data center storage.
• Business-class interconnections are
usually provided by service providers
(SP) and may include: business DSL,
leased lines, and Metro Ethernet.

11001010110001101010
11001010110001101010

INTERNET CONNECTIONS
Home and Small Office Internet Connections

Connection Description
11001010101010

Cable high bandwidth, always on, internet offered by

11001010101010
cable television service providers.
DSL high bandwidth, always on, internet connection
that runs over a telephone line.
Cellular uses a cell phone network to connect to the
internet.
Satellite major benefit to rural areas without Internet
Service Providers.
Dial-up telephone an inexpensive, low bandwidth option using a
modem.

11001010110001101010
11001010110001101010

INTERNET CONNECTIONS
Businesses Internet Connections
Type of Description
Corporate business connections may require: Connection
• higher bandwidth Dedicated Leased These are reserved circuits within the service
11001010101010

11001010101010
Line provider’s network that connect distant offices with
• dedicated connections private voice and/or data networking.
• managed services
Ethernet WAN This extends LAN access technology into the WAN.

DSL Business DSL is available in various formats including


Symmetric Digital Subscriber Lines (SDSL).

Satellite This can provide a connection when a wired solution is


not available.

11001010110001101010
11001010110001101010

INTERNET CONNECTIONS
The Converging Network

Before converged networks, an


organization would have been
11001010101010

11001010101010
separately cabled for telephone,
video, and data. Each of these
networks would use different
technologies to carry the signal.
Each of these technologies would
use a different set of rules and
standards.

11001010110001101010
11001010110001101010

INTERNET CONNECTIONS
The Converging Network

Converged data networks carry


multiple services on one link
11001010101010

11001010101010
including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same
network infrastructure. The network
infrastructure uses the same set of
rules and standards.

11001010110001101010
11001010110001101010

RELIABLE NETWORK
Network Architecture

Network Architecture refers to the


technologies that support the infrastructure
11001010101010

11001010101010
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security

11001010110001101010
11001010110001101010

RELIABLE NETWORK
Fault Tolerance

A fault tolerant network limits the impact of


a failure by limiting the number of affected
11001010101010

11001010101010
devices. Multiple paths are required for
fault tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a
network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated circuits.
11001010110001101010
11001010110001101010

RELIABLE NETWORK
Scalability

A scalable network can expand quickly and


easily to support new users and applications
11001010101010

11001010101010
without impacting the performance of
services to existing users.
Network designers follow accepted
standards and protocols in order to make
the networks scalable.

11001010110001101010
11001010110001101010

RELIABLE NETWORK
Quality of Service

Voice and live video transmissions require higher


expectations for those services being delivered.
11001010101010

11001010101010
Have you ever watched a live video with constant
breaks and pauses? This is caused when there is
a higher demand for bandwidth than available –
and QoS isn’t configured.
• Quality of Service (QoS) is the primary
mechanism used to ensure reliable delivery of
content for all users.
• With a QoS policy in place, the router can
more easily manage the flow of data and voice
traffic.

11001010110001101010
11001010110001101010

RELIABLE NETWORK
Network Security

There are two main types of network security that must be


addressed:
11001010101010

11001010101010
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended recipients can read
the data
• Integrity – assurance that the data has not be
altered with during transmission
• Availability – assurance of timely and reliable
access to data for authorized users
11001010110001101010
11001010110001101010

NETWORK TRENDS
Recent Trends

The role of the network must adjust and


continually transform in order to be able to keep
11001010101010

11001010101010
up with new technologies and end user devices
as they constantly come to the market.
Several new networking trends that effect
organizations and consumers:
• Bring Your Own Device (BYOD)
• Online collaboration
• Video communications
• Cloud computing

11001010110001101010
11001010110001101010

NETWORK TRENDS
Bring Your Own Device

Bring Your Own Device (BYOD) allows users to


use their own devices giving them more
11001010101010

11001010101010
opportunities and greater flexibility.
BYOD allows end users to have the freedom to
use personal tools to access information and
communicate using their:
• Laptops
• Netbooks
• Tablets
• Smartphones
• E-readers
BYOD means any device, with any ownership,
used anywhere.
11001010110001101010
11001010110001101010

NETWORK TRENDS
Online Collaboration

• Collaborate and work with others over


the network on joint projects.
11001010101010

11001010101010
• Collaboration tools including Cisco
WebEx (shown in the figure) gives users
a way to instantly connect and interact.
• Collaboration is a very high priority for
businesses and in education.
• Cisco Webex Teams is a multifunctional
collaboration tool.
• send instant messages
• post images
• post videos and links

11001010110001101010
11001010110001101010

NETWORK TRENDS
Video Communication

• Video calls are made to anyone,


regardless of where they are located.
11001010101010

11001010101010
• Video conferencing is a powerful tool
for communicating with others.
• Video is becoming a critical requirement
for effective collaboration.
• Cisco TelePresence powers is one way of
working where everyone, everywhere.

11001010110001101010
11001010110001101010

NETWORK TRENDS
Cloud Computing

Cloud computing allows us to store personal files or backup our data on


11001010101010

servers over the internet.

11001010101010
• Applications can also be accessed using the Cloud.
• Allows businesses to deliver to any device anywhere in the world.

Cloud computing is made possible by data centers.


• Smaller companies that can’t afford their own data centers, lease server and
storage services from larger data center organizations in the Cloud.

11001010110001101010
11001010110001101010

NETWORK TRENDS
Cloud Computing

Four types of Clouds:


11001010101010

11001010101010
• Public Clouds
• Available to the general public through a pay-per-use model or for free.
• Private Clouds
• Intended for a specific organization or entity such as the government.
• Hybrid Clouds
• Made up of two or more Cloud types – for example, part custom and part public.
• Each part remains a distinctive object but both are connected using the same architecture.
• Custom Clouds
• Built to meet the needs of a specific industry, such as healthcare or media.
• Can be private or public.

11001010110001101010
11001010110001101010

NETWORK TRENDS
Technology Trends in the Home

• Smart home technology is a growing


trend that allows technology to be
11001010101010

11001010101010
integrated into every-day appliances
which allows them to interconnect with
other devices.
• Ovens might know what time to cook a
meal for you by communicating with
your calendar on what time you are
scheduled to be home.
• Smart home technology is currently
being developed for all rooms within a
house.

11001010110001101010
11001010110001101010

NETWORK TRENDS
Powerline Networking

• Powerline networking can allow devices


to connect to a LAN where data network
11001010101010

11001010101010
cables or wireless communications are
not a viable option.
• Using a standard powerline adapter,
devices can connect to the LAN wherever
there is an electrical outlet by sending
data on certain frequencies.
• Powerline networking is especially useful
when wireless access points cannot
reach all the devices in the home.

11001010110001101010
11001010110001101010

NETWORK TRENDS
Wireless Broadband

In addition to DSL and cable, wireless is


another option used to connect homes
11001010101010

11001010101010
and small businesses to the internet.
• More commonly found in rural
environments, a Wireless Internet
Service Provider (WISP) is an ISP that
connects subscribers to designated
access points or hotspots.
• Wireless broadband is another solution
for the home and small businesses.
• Uses the same cellular technology
used by a smart phone.
• An antenna is installed outside the
house providing wireless or wired
connectivity for devices in the home.
11001010110001101010
11001010110001101010

NETWORK SECURITY
Security Threats

• Network security is an integral part of


networking regardless of the size of the
11001010101010

11001010101010
network.
• The network security that is implemented
must take into account the environment
while securing the data, but still allowing
for quality of service that is expected of the
network.
• Securing a network involves many
protocols, technologies, devices, tools, and
techniques in order to secure data and
mitigate threats.
• Threat vectors might be external or
internal.

11001010110001101010
11001010110001101010

NETWORK SECURITY
Security Threats

External Threats:
• Viruses, worms, and Trojan horses
11001010101010

11001010101010
• Spyware and adware
• Zero-day attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
• Threat Actor attacks

Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
11001010110001101010
11001010110001101010

NETWORK SECURITY
Security Solutions

Security must be implemented in multiple


layers using more than one security
11001010101010

11001010101010
solution.
Network security components for home or
small office network:
• Antivirus and antispyware
software should be installed on
end devices.
• Firewall filtering used to block
unauthorized access to the
network.

11001010110001101010
11001010110001101010

NETWORK SECURITY
Security Solutions

Larger networks have additional security


requirements:
11001010101010

11001010101010
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems
(IPS)
• Virtual private networks (VPN)
The study of network security starts with
a clear understanding of the underlying
switching and routing infrastructure.

11001010110001101010
11001010110001101010

NETWORKING TODAY
Key Terms
 server  satellite connection
 client  dialup telephone connection
end device converged data network
11001010101010

 

11001010101010
 intermediary device  fault-tolerant network
 topology  scalable network
 small office and home office (SOHO) networks  quality of service (QoS)
 local-area networks (LANs)  security

 wide-area networks (WANs)  bring your own device (BYOD)


 internet  cloud computing
 intranet  powerline networking
 extranet  wireless internet service provider (WISP)
 internet service provider (ISP)
 digital subscriber line (DSL)
 cellular connection
11001010110001101010
11001010110001101010

NETWORKING TODAY
Summary
 Networks Affect Our Lives
 Network Components
11001010101010

 Network Representations and Topologies

11001010101010
 Common Types of Networks
 Internet Connections
 Reliable Networks
 Network Trends
 Network Security

11001010110001101010
11001010110001101010

CHECK YOUR
11001010101010

11001010101010
UNDERSTANDING
QUESTIONS

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 1:
During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat is
11001010101010

11001010101010
affecting this computer?

A. DoS attack

B. identity theft

C. spyware

D. zero-day attack

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 2:
Which term refers to a network that provides secure access to the corporate offices for suppliers,
customers, and collaborators?
11001010101010

11001010101010
A. internet

B. intranet

C. extranet

D. extended net

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 3:
A large Corporation has modified its network to allow users to access network resources from their
personal laptops and smartphones. Which networking trend does this describe?
11001010101010

11001010101010
A. cloud computing

B. online collaboration

C. bring your own device

D. video conferencing

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 4:
What is an ISP?
11001010101010

11001010101010
A. It is a standards body that develops cabling and wiring standards for networking.

B. It is a protocol that establishes how computers in a local network communicate.

C. It is an organization that enables individuals and businesses to connect to the internet.

D. It is a networking device that combines the functionality of several different networking devices in
one.

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 5:
For which of the following would the use of a WISP be recommended?
11001010101010

11001010101010
A. an internet cafe in a city

B. a farm in a rural area without wired broadband access

C. any home with multiple wireless devices

D. an apartment in a building with cable access to the internet

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 6:
What characteristic of a network enables it to quickly grow to support new users and applications without
impacting the performance of the service being delivered to existing users?
11001010101010

11001010101010
A. reliability

B. scalability

C. quality of service

D. accessibility

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 7:
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water
pipe for the dormitory. A worker accidentally damages a fiber-optic cable that connects two of the existing
dormitories to the campus data center. Although the cable has been cut, students in the dormitories experience
11001010101010

11001010101010
only a very short interruption of network services. What characteristic of the network is described here?

A. quality of service

B. scalability

C. security

D. fault tolerance

E. integrity
11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 8:
What are two characteristics of a scalable network? (Choose two.)
11001010101010

11001010101010
A. easily overloaded with increased traffic

B. grows in size without impacting existing users

C. is not as reliable as a small network

D. suitable for modular devices that allow for expansion

E. offers limited number of applications

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 9:
Which device performs the function of determining the path that messages should take through
internetworks?
11001010101010

11001010101010
A. a router

B. a firewall

C. a web server

D. a DSL modem

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 10:
Which two internet connection options do not require that physical cables be run to a building? (Choose
two.)
11001010101010

11001010101010
A. DSL

B. cellular

C. satellite

D. dialup

E. dedicated leased line

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 11:
What type of network must a home user access in order to do online shopping?
11001010101010

11001010101010
A. an intranet

B. the internet

C. an extranet

D. a local area network

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 12:
How does BYOD change the way businesses implement networks?
11001010101010

11001010101010
A. BYOD requires organizations to purchase laptops rather than desktops.

B. BYOD users are responsible for their own network security, thus reducing the need for organizational

security policies.

C. BYOD devices are more expensive than devices that are purchased by an organization.

D. BYOD provides flexibility in where and how users can access network resources.

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 13:
An employee wants to access the network of an organization remotely, in the safest possible way. What
network feature would allow an employee to gain secure remote access to a company network?
11001010101010

11001010101010
A. ACL

B. IPS

C. VPN

D. BYOD

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 14:
What is the internet?
11001010101010

11001010101010
A. It is a network based on Ethernet technology.

B. It provides network access for mobile devices.

C. It provides connections through interconnected global networks.

D. It is a private network for an organization with LAN and WAN connections.

11001010110001101010
11001010110001101010

CHECK YOUR UNDERSTANDING QUESTIONS


Question – 15:
What are two functions of end devices on a network? (Choose two.)
11001010101010

11001010101010
A. They originate the data that flows through the network.

B. They direct data over alternate paths in the event of a link failure.

C. They filter the flow of data to enhance security.

D. They are the interface between humans and the communications network.

E. They provide the channel over which the network message travels.

11001010110001101010

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy