You are on page 1of 32

Chapter 1:

Exploring the Network

Introduction to Networks
UMT 2021
Sumazly Bin Sulaiman (sumazly@umt.edu.my)
Rozniza Ali (rozniza@umt.edu.my)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1 - Objectives

• Explain how multiple networks are used in everyday life.

• Describe the topologies and devices used in a small to medium-sized business


network.
• Explain the basic characteristics of a network that supports communication in a
small to medium-sized business.
• Explain trends in networking that will affect the use of networks in small to
medium-sized businesses.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Globally Connected
 Networks are all around us.

 They provide us with a way to communicate and share information and resources
with individuals in the same location or around the world.
Networking Today
 Communication is almost as important to us as our reliance on air, water, food,
and shelter.
 The methods that we use to communicate are constantly changing and evolving.

 Networks connect people and promote unregulated communication. Everyone can


connect, share, and make a difference.
Technology Then and Now

How different would your lives be without all of this?

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Globally Connected
 In the course of a day, resources that are available through the Internet can help you

■ Post and share your photographs, home videos, and experiences with friends or
with the world
■ Access and submit school work
■ Communicate with friends, family, and peers using email, instant messaging, or
Internet phone calls
■ Watch videos, movies, or television episodes on demand
■ Play online games with friends
■ Decide what to wear using online current weather conditions
■ Find the least congested route to your destination, displaying weather and traffic
video from webcams
■ Check your bank balance and pay bills electronically

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Networking Today
Networks in Our Past and Daily Lives
This Figure showed the changes that have happened over the last 25 years.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Internet of Everything (IoE)

 A reference to adding devices of all types onto the Internet.


 The IoE is bringing together people, process, data, and things to make
networked connections more relevant and valuable.
 It is turning information into actions that create new capabilities, richer
experiences, and unprecedented economic opportunity for individuals,
businesses, and countries.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
The Global Community
 The Internet helps to create a world in which national borders,
geographic distances, and physical limitations become less relevant, and
present ever-diminishing obstacles.
 The Internet has changed the manner in which social, commercial,
political, and personal interactions occur.
 The immediate nature of communications over the Internet encourages
the creation of global communities.
 Global communities allow social interaction that is independent of
location or time zone.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Supporting networks
 Networks Support the Way We Learn
■ Support the creation of virtual classrooms
■ Provide on-demand video
■ Enable collaborative learning spaces
■ Enable mobile learning

 Networks Support the Way We Communicate


■ Instant messaging
■ Social media
■ Collaboration tools
■ Weblogs
■ Wikis
■ Podcasting
■ Peer-to-peer (P2P) file sharing

 Networks Support the Way We Work


These business networks evolved to enable the transmission of many different types of information
services, including email, video, messaging, and telephony.
The use of networks to provide efficient and cost-effective employee training is increasing in
acceptance.

 Networks Support the Way We Play


Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Networks of Many Sizes

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Types of network
There are different networking models for how to connect computers over a network.

 Clients and Servers


 Servers are hosts that have software installed that enable them to provide information, like
email or web pages, to other hosts on the network.
 Clients are computer hosts that have software installed that enable them to request and
display the information obtained from the server. An example of client software is a web
browser, like Windows Internet Explorer.

 Peer-to-Peer
Client and server software usually runs on separate computers, but it is also possible for one
computer to carry out both roles at the same time

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Components of a Network
Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Components of a Network
Topology Diagrams

Logical topology diagrams


Identify devices, ports, and IP
addressing scheme.

Physical topology diagrams Identify


the physical location of intermediary
devices, configured ports, and cable
installation.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN): A network infrastructure that provides access
to users and end devices in a small geographical area.

 Wide Area Network (WAN): A network infrastructure that provides access


to other networks over a wide geographical area.

Other types of networks include:


 Metropolitan Area Network (MAN): A network infrastructure that spans
a physical area larger than a LAN but smaller than a WAN (for example, a city).

 Wireless LAN (WLAN): Similar to a LAN but wirelessly interconnects users


and endpoints in a small geographical area.

 Storage Area Network (SAN): A network infrastructure designed to


support file servers and provide data storage, retrieval, and replication.
It involves high-end servers, multiple disk arrays, and Fibre Channel interconnection technology

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
LANs and WANs
Local Area Networks (LAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
LANs and WANs
Wide Area Networks (WAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
LANs, WANs, and Internets
The Internet

The term internet (with a lowercase i) is used to describe multiple interconnected networks.
When referring to the global system of interconnected computer networks, used by services
such as the World Wide Web, the term Internet (with a capital I) is used.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Intranet and Extranet
 Intranet is a term often used to refer to a private connection of LANs and
WANs that belongs to an organization, and is designed to be accessible only
by the organization’s members, employees, or others with authorization.
 Intranets are basically an internet that is usually only accessible from within
the organization, but is insulated from the global internet.
 Extranet is an intranet that is accessible to some people from outside the
company, or possibly shared by more than one organisation.
 Extranet is providing secure and safe access to individuals who work for a
different organization, but require company data.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Connecting to the Internet
Internet Access Technologies
• Most commonly used

• 56K Dial-up Lines (individuals)


• T1 or T3 Lines into Internet service provider ISPs (organizations)

• New access technologies

• Commonly called “Broadband Access”


• Provide higher speed access
• Digital Subscriber Line (DSL)
• Cable Modems
• Fixed Wireless (including satellite access)
• Mobile Wireless (WAP)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Connecting to the Internet
Connecting Remote Users to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Connecting to the Internet
Connecting Businesses to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Converged Networks
The Converging Network

Traditional telephone, radio, and television Converged networks are capable of delivering
networks were maintained separately from data voice, video streams, text, and graphics among
networks. In the past, every one of these services many different types of devices over the same
required a dedicated network, with different communication channel and network structure.
communication channels and different technologies
to carry a particular communication signal. Each
service had its own set of rules and standards to
ensure successful communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Reliable Network
Supporting Network Architecture
Networks must support a wide range of applications and services, as well
as operate over many different types of cables and devices

Network Architecture: refers to the technologies that support the


infrastructure and the programmed services and rules, or protocols, that
move messages across the network.

There are four basic characteristics of a Reliable Network:


 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Reliable Network
Fault Tolerance in Circuit Switched Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Reliable Network
Packet-Switched Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
 Time-sensitive communication - increase priority for services
like telephony or video distribution.
 Non time-sensitive communication - decrease priority for web
page retrieval or email.
 High importance to organization - increase priority for
production control or business transaction data.
 Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Reliable Network
Providing Network Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Future of Networking
Network Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Network Architectures
Cisco Certified Network Associate (CCNA)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32

You might also like