Escolar Documentos
Profissional Documentos
Cultura Documentos
Introduction to Networks
Presentation_ID
Cisco Confidential
Chapter 1: Objectives
Explain how multiple networks are used in everyday life.
Explain the topologies and devices used in a small to
medium-sized business network.
Explain the basic characteristics of a network
Explain trends in networking that will affect the use of
networks in small to medium-sized businesses.
Presentation_ID
Cisco Confidential
Networking Today
Cisco Confidential
Networking Today
Presentation_ID
Cisco Confidential
Networking Today
Cisco Confidential
Networking Today
Cisco Confidential
Networking Today
Cisco Confidential
Networking Today
Presentation_ID
Cisco Confidential
Networking Today
Cisco Confidential
Networking Today
Presentation_ID
Cisco Confidential
10
Presentation_ID
Cisco Confidential
11
Cisco Confidential
12
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Presentation_ID
Cisco Confidential
15
Presentation_ID
Cisco Confidential
16
Cisco Confidential
17
Presentation_ID
Cisco Confidential
18
Presentation_ID
Cisco Confidential
19
Presentation_ID
Cisco Confidential
20
Cisco Confidential
21
Cisco Confidential
22
Cisco Confidential
23
Presentation_ID
Cisco Confidential
24
Peer-to-Peer
Presentation_ID
Cisco Confidential
25
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID
Cisco Confidential
26
Components of a Network
End Devices
The network devices that people are most familiar with are
called end devices, or hosts. A host device is either the source
or destination of a message transmitted over the network.
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)
Presentation_ID
Cisco Confidential
27
Components of a Network
Intermediary Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access
points)
Internetworking Devices (routers)
Security Devices (firewalls)
Presentation_ID
Cisco Confidential
28
Components of a Network
Intermediary Devices
Processes running on the intermediary network devices
perform these functions:
Regenerate and retransmit data signals
Maintain information about what pathways exist through the
network and internetwork
Notify other devices of errors and communication failures
Direct data along alternate pathways when there is a link
failure
Classify and direct messages according to Quality of Service
(QoS) priorities
Permit or deny the flow of data, based on security settings
Presentation_ID
Cisco Confidential
29
Components of a Network
Network Media
Presentation_ID
Cisco Confidential
30
Components of a Network
Presentation_ID
Cisco Confidential
31
Components of a Network
rk
Presentation_ID
Cisco Confidential
32
Components of a Network
Network Representations
Presentation_ID
Cisco Confidential
33
Components of a Network
Topology Diagrams
Topology diagrams are mandatory for anyone working
with a network.
It provides a visual map of how the network is connected.
There are two types of topology diagrams including:
Physical topology diagrams - Identify the physical
location of intermediary devices, configured ports, and
cable installation.
Logical topology diagrams - Identify devices, ports, and
IP addressing scheme.
Presentation_ID
Cisco Confidential
34
Components of a Network
Topology Diagrams
Presentation_ID
Cisco Confidential
35
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
A network infrastructure that provides access to users and
end devices in a small geographical area.
LANs interconnect end devices in a limited area such as a
home, school, office building, or campus.
A LAN is usually administered by a single organization or
individual. The administrative control that governs the
security and access control policies are enforced on the
network level.
LANs provide high speed bandwidth to internal end
devices and intermediary devices.
Presentation_ID
Cisco Confidential
36
Types of Networks
Wide Area Network (WAN)
A network infrastructure that provides access to other
networks over a wide geographical area.
It spans a wide geographical area. WANs are typically
managed by service providers (SP) or Internet Service
Providers (ISP).
WANs interconnect LANs over wide geographical areas such
as between cities, states, provinces, countries, or continents.
WANs are usually administered by multiple service providers.
WANs typically provide slower speed links between LANs.
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Presentation_ID
Cisco Confidential
37
Presentation_ID
Cisco Confidential
38
Presentation_ID
Cisco Confidential
39
Presentation_ID
Cisco Confidential
40
The Internet
Presentation_ID
Cisco Confidential
41
The Internet
Cisco Confidential
42
Lab
Lab1.2.3.3 - Researching Converged Network Services
Objectives
Part 1: Survey Your Understanding of Convergence
Part 2: Research ISPs Offering Converged Services
Part 3: Research Local ISPs Offering Converged Services
Part 4: Select Best Local ISP Converged Service
Part 5: Research Local Company or Public
Institution Using Convergence Technologies
Presentation_ID
Cisco Confidential
43
Presentation_ID
Cisco Confidential
44
Presentation_ID
Cisco Confidential
45
Cisco Confidential
46
Cisco Confidential
47
Presentation_ID
Cisco Confidential
48
Cisco Confidential
49
Presentation_ID
Cisco Confidential
50
Converged Networks
Presentation_ID
Cisco Confidential
51
Converged Networks
Presentation_ID
Cisco Confidential
52
Converged Networks
Presentation_ID
Cisco Confidential
53
Converged Networks
Presentation_ID
Cisco Confidential
54
Converged Networks
Presentation_ID
Cisco Confidential
55
Reliable Network
Presentation_ID
Cisco Confidential
56
Reliable Network
Presentation_ID
Cisco Confidential
57
Reliable Network
Presentation_ID
Cisco Confidential
58
Reliable Network
Presentation_ID
Cisco Confidential
59
Reliable Network
Quality of Service in
Circuit Switched Network
Presentation_ID
Cisco Confidential
60
Reliable Network
Presentation_ID
Cisco Confidential
61
Reliable Network
Circuit-Switched Networks
Presentation_ID
Cisco Confidential
62
Reliable Network
Packet-Switched Networks
Presentation_ID
Cisco Confidential
63
Reliable Network
Scalable Networks
Presentation_ID
Cisco Confidential
64
Reliable Network
Scalable Networks
Presentation_ID
Cisco Confidential
65
Reliable Network
Scalable Networks
Presentation_ID
Cisco Confidential
66
Reliable Network
Converged Networks
Presentation_ID
Cisco Confidential
67
Reliable Network
Providing (QoS)
Presentation_ID
Cisco Confidential
68
Reliable Network
Providing (QoS)
Presentation_ID
Cisco Confidential
69
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
Time-sensitive communication - increase priority for services
like telephony or video distribution.
Non time-sensitive communication - decrease priority for web
page retrieval or email.
High importance to organization - increase priority for
production control or business transaction data.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Presentation_ID
Cisco Confidential
70
Reliable Network
Presentation_ID
Cisco Confidential
71
Reliable Network
Presentation_ID
Cisco Confidential
72
Network Trends
New trends
Presentation_ID
Cisco Confidential
73
Network Trends
New trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing
Presentation_ID
Cisco Confidential
74
Network Trends
Presentation_ID
Cisco Confidential
75
Network Trends
Presentation_ID
Cisco Confidential
76
Network Trends
Online Collaboration
Presentation_ID
Cisco Confidential
77
Network Trends
Video Communication
Presentation_ID
Cisco Confidential
78
Network Trends
Cloud Computing
There are four primary types of clouds:
Public clouds
Private clouds
Custom clouds
Hybrid clouds
Presentation_ID
Cisco Confidential
79
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server
farms or server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire
suppression)
Security devices
Presentation_ID
Cisco Confidential
80
Presentation_ID
Cisco Confidential
81
Powerline Networking
Presentation_ID
Cisco Confidential
82
Wireless Broadband
Presentation_ID
Cisco Confidential
83
Future of Networking
Network Security
Presentation_ID
Cisco Confidential
84
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Presentation_ID
Cisco Confidential
85
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
Presentation_ID
Cisco Confidential
86
Network Architectures
Presentation_ID
Cisco Confidential
87
Network Architectures
Presentation_ID
Cisco Confidential
88
Summary
In this chapter, you learned:
Networks and the Internet have changed the way we
communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple
networks consisting of two computers, to networks
connecting millions of devices.
The Internet is the largest network in existence. In fact, the
term Internet means a network of networks. The Internet
provides the services that enable us to connect and
communicate with our families, friends, work, and interests.
Presentation_ID
Cisco Confidential
89
Summary
In this chapter, you learned:
The network infrastructure is the platform that supports the
network. It provides the stable and reliable channel over
which communication can occur. It is made up of network
components including end devices, intermediate device, and
network media.
Networks must be reliable.
Network security is an integral part of computer networking,
regardless of whether the network is limited to a home
environment with a single connection to the Internet, or as
large as a corporation with thousands of users.
Presentation_ID
Cisco Confidential
90
Summary
In this chapter, you learned:
The network infrastructure can vary greatly in terms of size,
number of users, and number and types of services that are
supported on it. The network infrastructure must grow and
adjust to support the way the network is used. The routing
and switching platform is the foundation of any network
infrastructure.
Presentation_ID
Cisco Confidential
91
Presentation_ID
Cisco Confidential
92