You are on page 1of 39

Living in a Network-Centric World

Mike Fuszner

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Communicating in a NetworkCentric World

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Communication: An Essential Part of Our Lives

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

What is Communication?
Before communicating, we must establish rules or agreements to govern the conversation. In networking, we call these rules protocols.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

The Network as a Platform

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Communicating Over Networks


All networks have four basic elements in common:
Rules or agreements to govern how the messages are sent, directed, received and interpreted. Messages or units of information. A means of interconnecting these devices - a medium. Devices on the network.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14

Protocols are the rules that the networked devices use to communicate with each other.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

16

Traceroute
Tracert is used at a Windows command prompt to trace the route to a destination.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17

VisualTrace
Download and install VisualTrace (formerly NeoTrace) from: http://www.softpedia.com/progDownload/McAfee-NeoTrace-ProfessionalDownload-42.html

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18

VisualTrace

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Companies used to have multiple networks for voice, video, and data. Todays networks combine voice, video, and data onto a single converged network.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

20

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

21

The Architecture of the Internet

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

22

The Network Architecture


The term network architecture, in this context, refers to both the technologies that support the infrastructure and the programmed services and protocols that move the messages across that infrastructure. A fault tolerant network is one that limits the impact of a hardware or software failure and can recover quickly when such a failure occurs. A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

23

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

24

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

25

The Internet
The Internet, in its early inception, was the result of research funded by the United States Department of Defense (DoD). Its primary goal was to have a communications medium that could withstand the destruction of numerous sites and transmission facilities without disruption of service.

Fault tolerance was the focus of the effort of the initial internetwork design work.
The DoD researchers realized that a packet switched connectionless network had the features necessary to support a resilient, fault tolerant network architecture.
Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

26

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

27

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

28

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

29

Congestion
Congestion is caused when the demand on the network resources exceeds the available capacity.

When the volume of packets is greater than what can be transported across the network, devices queue the packets in memory until resources become available to transmit them. Queuing packets causes delay.
If the number of packets to be queued continues to increase, the memory queues fill up and packets are dropped.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

30

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

31

Quality of Service (QoS)


Quality of Service (QoS) is used to prioritize which types of data packets must be delivered at the expense of other types of packets that can be delayed or dropped. Applications are classified into categories based on specific quality of service requirements.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

32

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

33

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

34

Network Security
Securing a network infrastructure includes the physical securing of devices that provide network connectivity and preventing unauthorized access to the management software that resides on them.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

35

CIA
Confidentiality ensures data privacy through encryption.

Integrity ensures that the information was not altered by using hashing algorithms and checksums. Source integrity assures the identity of the sender by using digital signatures. Availability ensures timely and reliable delivery of data.

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

36

Trends in Networking

Subtitle

Presentation_ID

2008 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

37 37

Where is it all going?


There are three major trends that are contributing to the future shape of complex information networks:
Increasing number of mobile users. Proliferation of network capable devices. Expanding range of services including wireless.
Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

38

Presentation_ID

2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

39

You might also like