1_Introduction To Networking-1
1_Introduction To Networking-1
INTRODUCTION TO
11001010101010
11001010101010
NETWORKING
11001010110001101010
11001010110001101010
Communication is almost as
important to us as our
11001010101010
11001010101010
reliance on air, water, food,
and shelter. In today’s world,
through the use of networks,
we are connected like never
before.
11001010110001101010
11001010110001101010
Software resource
Hardware resource
11001010101010
11001010101010
11001010110001101010
11001010110001101010
Software resource
Hardware resource
11001010101010
11001010101010
11001010110001101010
11001010110001101010
11001010101010
• Human network
11001010110001101010
11001010110001101010
NETWORK COMPONENTS
Host Roles
11001010101010
Servers are computers that provide information to
end devices:
• email servers
Server Type Description
• web servers
• file server Email Email server runs email server software.
Clients use client software to access email.
Clients are computers that send requests to the
servers to retrieve information: Web Web server runs web server software.
Clients use browser software to access web pages.
• web page from a web server
• email from an email server
File File server stores corporate and user files.
The client devices access these files.
11001010110001101010
11001010110001101010
NETWORK COMPONENTS
Peer-to-Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only
recommended for very small networks.
11001010101010
11001010101010
Advantages Disadvantages
Easy to set up No centralized administration
11001010110001101010
11001010110001101010
NETWORK COMPONENTS
End Devices
11001010101010
received. Data originates with an
end device, flows through the
network, and arrives at an end
device.
11001010110001101010
11001010110001101010
NETWORK COMPONENTS
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include switches, wireless access points,
routers, and firewalls.
11001010101010
11001010101010
Management of data as it flows through a network is also the role of an intermediary device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.
11001010110001101010
11001010110001101010
NETWORK COMPONENTS
Network Media
Communication across a network is carried through a medium which allows a message to travel from
source to destination.
11001010101010
11001010101010
Media Types Description
Metal wires within cables Uses electrical impulses
11001010110001101010
11001010110001101010
11001010101010
the network.
Important terms to know include:
• Network Interface Card (NIC)
• Physical Port
• Interface
11001010110001101010
11001010110001101010
11001010101010
the physical location of intermediary
devices and cable installation.
11001010110001101010
11001010110001101010
11001010101010
devices, ports, and the addressing
scheme of the network.
11001010110001101010
11001010110001101010
11001010101010
• Small Office/Home Office – enables computer
within a home or remote office to connect to a
corporate network
• Medium to Large Networks – many locations Small Home SOHO
with hundreds or thousands of interconnected
computers
• World Wide Networks – connects hundreds of
millions of computers world-wide – such as the
internet
11001010110001101010
11001010110001101010
11001010101010
• Size of the area covered
• Number of users connected
• Number and types of services available
• Area of responsibility
11001010110001101010
11001010110001101010
11001010101010
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or individual. Typically administered by one or more service providers.
Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs.
11001010110001101010
11001010110001101010
11001010101010
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual or
group. The following groups were developed
to help maintain structure on the internet:
• IETF
• ICANN
• IAB
11001010110001101010
11001010110001101010
11001010101010
meant to be accessible only to the
organizations members or others with
authorization.
An organization might use an extranet to
provide secure access to their network for
individuals who work for a different
organization that need access to their data on
their network.
11001010110001101010
11001010110001101010
INTERNET CONNECTIONS
Internet Access Technologies
11001010101010
• Popular services for home users and
small offices include broadband cable,
broadband digital subscriber line (DSL),
wireless WANs, and mobile services.
• Organizations need faster connections
to support IP phones, video
conferencing and data center storage.
• Business-class interconnections are
usually provided by service providers
(SP) and may include: business DSL,
leased lines, and Metro Ethernet.
11001010110001101010
11001010110001101010
INTERNET CONNECTIONS
Home and Small Office Internet Connections
Connection Description
11001010101010
11001010101010
cable television service providers.
DSL high bandwidth, always on, internet connection
that runs over a telephone line.
Cellular uses a cell phone network to connect to the
internet.
Satellite major benefit to rural areas without Internet
Service Providers.
Dial-up telephone an inexpensive, low bandwidth option using a
modem.
11001010110001101010
11001010110001101010
INTERNET CONNECTIONS
Businesses Internet Connections
Type of Description
Corporate business connections may require: Connection
• higher bandwidth Dedicated Leased These are reserved circuits within the service
11001010101010
11001010101010
Line provider’s network that connect distant offices with
• dedicated connections private voice and/or data networking.
• managed services
Ethernet WAN This extends LAN access technology into the WAN.
11001010110001101010
11001010110001101010
INTERNET CONNECTIONS
The Converging Network
11001010101010
separately cabled for telephone,
video, and data. Each of these
networks would use different
technologies to carry the signal.
Each of these technologies would
use a different set of rules and
standards.
11001010110001101010
11001010110001101010
INTERNET CONNECTIONS
The Converging Network
11001010101010
including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same
network infrastructure. The network
infrastructure uses the same set of
rules and standards.
11001010110001101010
11001010110001101010
RELIABLE NETWORK
Network Architecture
11001010101010
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
11001010110001101010
11001010110001101010
RELIABLE NETWORK
Fault Tolerance
11001010101010
devices. Multiple paths are required for
fault tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a
network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated circuits.
11001010110001101010
11001010110001101010
RELIABLE NETWORK
Scalability
11001010101010
without impacting the performance of
services to existing users.
Network designers follow accepted
standards and protocols in order to make
the networks scalable.
11001010110001101010
11001010110001101010
RELIABLE NETWORK
Quality of Service
11001010101010
Have you ever watched a live video with constant
breaks and pauses? This is caused when there is
a higher demand for bandwidth than available –
and QoS isn’t configured.
• Quality of Service (QoS) is the primary
mechanism used to ensure reliable delivery of
content for all users.
• With a QoS policy in place, the router can
more easily manage the flow of data and voice
traffic.
11001010110001101010
11001010110001101010
RELIABLE NETWORK
Network Security
11001010101010
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended recipients can read
the data
• Integrity – assurance that the data has not be
altered with during transmission
• Availability – assurance of timely and reliable
access to data for authorized users
11001010110001101010
11001010110001101010
NETWORK TRENDS
Recent Trends
11001010101010
up with new technologies and end user devices
as they constantly come to the market.
Several new networking trends that effect
organizations and consumers:
• Bring Your Own Device (BYOD)
• Online collaboration
• Video communications
• Cloud computing
11001010110001101010
11001010110001101010
NETWORK TRENDS
Bring Your Own Device
11001010101010
opportunities and greater flexibility.
BYOD allows end users to have the freedom to
use personal tools to access information and
communicate using their:
• Laptops
• Netbooks
• Tablets
• Smartphones
• E-readers
BYOD means any device, with any ownership,
used anywhere.
11001010110001101010
11001010110001101010
NETWORK TRENDS
Online Collaboration
11001010101010
• Collaboration tools including Cisco
WebEx (shown in the figure) gives users
a way to instantly connect and interact.
• Collaboration is a very high priority for
businesses and in education.
• Cisco Webex Teams is a multifunctional
collaboration tool.
• send instant messages
• post images
• post videos and links
11001010110001101010
11001010110001101010
NETWORK TRENDS
Video Communication
11001010101010
• Video conferencing is a powerful tool
for communicating with others.
• Video is becoming a critical requirement
for effective collaboration.
• Cisco TelePresence powers is one way of
working where everyone, everywhere.
11001010110001101010
11001010110001101010
NETWORK TRENDS
Cloud Computing
11001010101010
• Applications can also be accessed using the Cloud.
• Allows businesses to deliver to any device anywhere in the world.
11001010110001101010
11001010110001101010
NETWORK TRENDS
Cloud Computing
11001010101010
• Public Clouds
• Available to the general public through a pay-per-use model or for free.
• Private Clouds
• Intended for a specific organization or entity such as the government.
• Hybrid Clouds
• Made up of two or more Cloud types – for example, part custom and part public.
• Each part remains a distinctive object but both are connected using the same architecture.
• Custom Clouds
• Built to meet the needs of a specific industry, such as healthcare or media.
• Can be private or public.
11001010110001101010
11001010110001101010
NETWORK TRENDS
Technology Trends in the Home
11001010101010
integrated into every-day appliances
which allows them to interconnect with
other devices.
• Ovens might know what time to cook a
meal for you by communicating with
your calendar on what time you are
scheduled to be home.
• Smart home technology is currently
being developed for all rooms within a
house.
11001010110001101010
11001010110001101010
NETWORK TRENDS
Powerline Networking
11001010101010
cables or wireless communications are
not a viable option.
• Using a standard powerline adapter,
devices can connect to the LAN wherever
there is an electrical outlet by sending
data on certain frequencies.
• Powerline networking is especially useful
when wireless access points cannot
reach all the devices in the home.
11001010110001101010
11001010110001101010
NETWORK TRENDS
Wireless Broadband
11001010101010
and small businesses to the internet.
• More commonly found in rural
environments, a Wireless Internet
Service Provider (WISP) is an ISP that
connects subscribers to designated
access points or hotspots.
• Wireless broadband is another solution
for the home and small businesses.
• Uses the same cellular technology
used by a smart phone.
• An antenna is installed outside the
house providing wireless or wired
connectivity for devices in the home.
11001010110001101010
11001010110001101010
NETWORK SECURITY
Security Threats
11001010101010
network.
• The network security that is implemented
must take into account the environment
while securing the data, but still allowing
for quality of service that is expected of the
network.
• Securing a network involves many
protocols, technologies, devices, tools, and
techniques in order to secure data and
mitigate threats.
• Threat vectors might be external or
internal.
11001010110001101010
11001010110001101010
NETWORK SECURITY
Security Threats
External Threats:
• Viruses, worms, and Trojan horses
11001010101010
11001010101010
• Spyware and adware
• Zero-day attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
• Threat Actor attacks
Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
11001010110001101010
11001010110001101010
NETWORK SECURITY
Security Solutions
11001010101010
solution.
Network security components for home or
small office network:
• Antivirus and antispyware
software should be installed on
end devices.
• Firewall filtering used to block
unauthorized access to the
network.
11001010110001101010
11001010110001101010
NETWORK SECURITY
Security Solutions
11001010101010
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems
(IPS)
• Virtual private networks (VPN)
The study of network security starts with
a clear understanding of the underlying
switching and routing infrastructure.
11001010110001101010
11001010110001101010
NETWORKING TODAY
Key Terms
server satellite connection
client dialup telephone connection
end device converged data network
11001010101010
11001010101010
intermediary device fault-tolerant network
topology scalable network
small office and home office (SOHO) networks quality of service (QoS)
local-area networks (LANs) security
NETWORKING TODAY
Summary
Networks Affect Our Lives
Network Components
11001010101010
11001010101010
Common Types of Networks
Internet Connections
Reliable Networks
Network Trends
Network Security
11001010110001101010
11001010110001101010
CHECK YOUR
11001010101010
11001010101010
UNDERSTANDING
QUESTIONS
11001010110001101010
11001010110001101010
11001010101010
affecting this computer?
A. DoS attack
B. identity theft
C. spyware
D. zero-day attack
11001010110001101010
11001010110001101010
11001010101010
A. internet
B. intranet
C. extranet
D. extended net
11001010110001101010
11001010110001101010
11001010101010
A. cloud computing
B. online collaboration
D. video conferencing
11001010110001101010
11001010110001101010
11001010101010
A. It is a standards body that develops cabling and wiring standards for networking.
D. It is a networking device that combines the functionality of several different networking devices in
one.
11001010110001101010
11001010110001101010
11001010101010
A. an internet cafe in a city
11001010110001101010
11001010110001101010
11001010101010
A. reliability
B. scalability
C. quality of service
D. accessibility
11001010110001101010
11001010110001101010
11001010101010
only a very short interruption of network services. What characteristic of the network is described here?
A. quality of service
B. scalability
C. security
D. fault tolerance
E. integrity
11001010110001101010
11001010110001101010
11001010101010
A. easily overloaded with increased traffic
11001010110001101010
11001010110001101010
11001010101010
A. a router
B. a firewall
C. a web server
D. a DSL modem
11001010110001101010
11001010110001101010
11001010101010
A. DSL
B. cellular
C. satellite
D. dialup
11001010110001101010
11001010110001101010
11001010101010
A. an intranet
B. the internet
C. an extranet
11001010110001101010
11001010110001101010
11001010101010
A. BYOD requires organizations to purchase laptops rather than desktops.
B. BYOD users are responsible for their own network security, thus reducing the need for organizational
security policies.
C. BYOD devices are more expensive than devices that are purchased by an organization.
D. BYOD provides flexibility in where and how users can access network resources.
11001010110001101010
11001010110001101010
11001010101010
A. ACL
B. IPS
C. VPN
D. BYOD
11001010110001101010
11001010110001101010
11001010101010
A. It is a network based on Ethernet technology.
11001010110001101010
11001010110001101010
11001010101010
A. They originate the data that flows through the network.
B. They direct data over alternate paths in the event of a link failure.
D. They are the interface between humans and the communications network.
E. They provide the channel over which the network message travels.
11001010110001101010