You are on page 1of 85

…For the courtesy of others

 Cell phones may be put on


vibrate mode, but please take the
call outside of the room.

Eng. Ashraf Sabha PSUT Cisco


1 Academy Training Center 2014.
CCNA Routing and Switching:
Introduction to Networks course

Eng. Ashraf Sabha


2014 Training Quality Guaranteed
asabha@psut.edu.jo
The Main Cisco Academy web
00-962-775624340 site
http://www.psut.edu.jo/asabha

www.netacad.com 2
Cisco CCNA Network Associate

 Certifies knowledge and skills to install, operate and troubleshoot a small to medium
size enterprise branch network
 Includes connecting multiple WANs, basic security measures and wireless extension of
the network.
 Two options for the exams (2 exam option or one composite exam)
2 Exam option:
• ICND1 100-101 exam
• ICND2 200-101 exam
1 Composite Exam option: CCIE
• CCNA 200-125 exam
CCNP

CCNA
www.cisco.com/go/ccna CCENT

Eng. Ashraf Sabha PSUT Cisco


Academy Training Center 2014. 3
Different Paths to different Certificates..

Eng. Ashraf Sabha PSUT Cisco


Academy Training Center 2014. 4
Discount Vouchers for Students

Question Answer

How many discount


One for each: ICND1, ICND2
vouchers will be available or CCNA composite
?and for which exams

58% based on Sem. 4 Final


What is the discount value exam

CCNA: Complete four courses of


How do students qualify either CCNA Discovery or CCNA
for a vouchers Exploration & receive 75% or
higher on first attempt of final
exam for course 4

Eng. Ashraf Sabha PSUT Cisco Academy Training 5


Center 2014.
CCNA Routing & Switching Course Outline
Introduction to Routing & Switching
Ch Networks essentials
Scaling Networks Connecting Networks

1 Exploring the Network Routing Concepts LAN Design WAN Concepts

Configuring a Network Point-To-Pint


2 Operating System
Static Routing Scaling VLANs
Connections
Network Protocols and
3 Communications
Dynamic Routing STP Branch Connections

4 Network Access Switched Network EtherChannel and HSRP Access-Control Lists

Network Security and


5 Ethernet Switch Configuration Dynamic Routing
Monitoring
6 Network Layer VLANs EIGRP Quality of Service
EIGRP Tuning and
7 Transport Layer Access Control Lists
Troubleshooting
Network Evolution

8 IP addressing DHCP Single-Area OSPF Network Troubleshooting

9 Subnetting IP Networks NAT for IPv4 Multi-Area OSPF

Device Discovery,
OSPF Tuning and
10 Application Layer Management and
Troubleshooting
Maintenance

11 Build a Small Network 6


Practice leads to Mastery

Eng. Ashraf Sabha PSUT Cisco


Academy Training Center 2014. 7
Exploring the Curriculum

Next / Back

Eng. Ashraf Sabha PSUT Cisco


Navigation tools Academy Training Center 2014. 8
Chapter 1

Exploring The Network

9
1. Describe how human networks impact our daily lives.

Supporting the way we live Supporting the way we learn

Supporting the way we work Supporting the way we play

10
Introduction to the human networks

Networks Supporting The Way We Live

 Started with character-based information between computer-to-computer.

 Its now developed to be Internet of Everything “IOE” through which resources


sharing , voice, video , text and graphics are shared between different devices
establishing people-to-people communications (Human Network).

11
The Global Community
Today’s popular communication tools

1- Instant Messaging

A real-time communication by typing text.


Developed from earlier Internet Relay Chat (IRC)
services . Incorporates features such as: file
transfer, voice ,video communication (web cam),
chat .

2- Weblogs (blogs)

Web pages that are easy to update and edit. It is an


individual, personal journal.

12
3- Wikis

Web pages that groups of people can edit and view


together. There is a public wiki, called Wikipedia

4- Podcasting

Enabled people to record audio and convert it for


use with iPods - a small, portable device for audio
playback

5- Collaboration Tools

Give people the opportunity to work together on


shared documents. Without the constraints of
location or time zone, individuals connected to a
shared system can speak to each other.

13
6- Social Media

Websites where people and communities create and


share user-generated content with friends, family,
peers, and the world.

7- Peer-to-Peer (P2P)
File Sharing –

Allows people to share files with each other without


having to store and download files from a central
server. The user joins the P2P network by installing
a P2P software. This lets them locate and share files
with others in the P2P network.

14
2. Supporting the way
we Learn

Traditional learning methods : the textbook and the


instructor.

Online distance learning courses contain voice, data, video,


available any time from any where reducing cost .

Current and accurate training materials.

Availability of training to a wide audience.

Consistent quality of instruction, assessments & grading.

15
Supporting the way we Learn

16
Using Networks in our work
 Networks are now necessary to conduct
businesses, governments.

 Enable the transmission of many different


types of information services, including
e-mail, video, messaging, and telephony.

 This helps to reduce employees training


and travel costs.

17
Networks Supporting The Way We Work

18
Concepts
Intranets

The private networks of the company that is used


only by the company , its branch locations and its
local and global employees.

Extranets

To provide suppliers, vendors, and customers limited


access to corporate data to check order status,
inventory, and parts lists.

Teleworkers or
telecommuters,

Remote workers use secure remote access services


from home or while traveling.

19
Networks Supporting the
Way We Play
• Email.
• Personal Web Sites.
• Sharing photos and videos
(YouTube).
• Travel: On board data
networks.
• IM.
• Network Gaming.

20
Networks of many sizes

Small home networks : The Small Office/Home Office (SOHO : (


connect a few computers to each Allow telecommuters to work from
other and to the Internet. home and access their business files ,
shared resources and to save long
distance phone call costs.

21
Networks of many sizes

Medium to large networks : Allows World Wide Networks : The Internet is a


corporations and schools to connect network of networks that connects
medium to large locations with hundreds of millions of computers world-
hundreds or thousands of devices. wide.

22
Network As A Platform

Networks have Four basic elements in common:

 Devices that exchange messages : Might be source or destination of data.

 Messages that travel from one device to another.

 Medium used to interconnect devices and transport messages : Wired or


Wireless media

 Rules (protocols) to govern the handling of the message.

23
The Client-Server Model
• Sometimes , you access data that is not stored on your device and that is
requested from where it resides. i.e. downloading email from mail server to the
client mail PC after client request.

• The software in the Application


layer determine device role as
a client or server.

• Data transfer from a client to


a server is referred to as an
upload and data from a server
to a client as a download.

24
End Devices :
Servers and Clients

Client

Server

The software of the device determines it’s role as a client or server.

• Clients are those devices that originate data flow and request information
from the server and display received data. i.e. Internet Explorer.

• Servers provide information and services to clients through different


server softwares

 “e-mail or web pages “ 25


Servers examples

26
Servers

APPLICATIONS

Usually, a single server will function as a server for multiple services and
multiple clients simultaneously.

Usually , Client stations include a different client software for each required
service to be requested ( Browser , email ,ftp , etc)
27
Servers
 A server is usually a computer that contains information needed to be shared
between many clients. Information might be on a ..

• Web server.
• Email server.
• FTP Server: File or database server (Different files ) , may require an account
and password before allowing a transfer.
• Domain Controller Server: Will require a user name and password in order to
access the network.

28
Client/Server Model
May also require control information. Clients – hardware, software
combination
User Authentication
Identify a file to be transferred.
Centralized administration.
The client begins the
exchange by making a
request for data.

The server responds with


one or more streams of
data.

Files uploaded to the


Resources are stored or downloaded server
on the server.

The biggest advantage of the client/server model is the centralization of resources.


User Names and Passwords, Files, Databases. Security is easier to be enforced in
client server mode. This exchange may also require control information. 29
Peer-to-Peer
 Client and server software usually
runs on separate computers, but it is
also possible for one computer to
carry out both roles at the same time.
In small businesses and homes, many
computers function as the servers and
clients on the network. This type of
network is called a peer-to-peer
network.
30
Peer-to-Peer

31
Components of the Network - Hardware

Devices and media are the physical visible components of the


network called hardware.

 Devices : End devices also called (hosts) or intermediate


devices.

 Media “ Channel” : Wired or wireless media.

End devices

32
Components of the Network - software

 Services include many of the common network


applications people use every day, like email hosting
services and web hosting services.

33
Network As A Platform
Devices on a network – Symbols

34
End Devices
 An end device is either the source or
destination of a message transmitted over
the network.
 To distinguish one end device from
another, each end device on a network is
identified by an address. When an end
device initiates communication, it uses the
address of the destination end device to
specify where the message should be sent

35
Intermediary switch switch
or hub or hub
Devices routers

LAN

WAN
 Intermediary devices:

• Used for connectivity between network\s.

 These might be :

• Network Access Devices (Hubs, switches, and wireless access points).


• Internetworking Devices (routers).
• Communication Servers and Modems.
• Security Devices (i.e. firewalls).
36
Intermediary Devices
 Processes running on the intermediary network devices perform these functions:

 Regenerate and retransmit data signals.


 Determine all network path ways available.
 Direct data along alternate paths if exist when the main path failure.
 Notify other devices of errors and communication failures.
 Classify and direct messages according to QoS priorities.
 Permit or deny and manage the flow of data, based on security settings.

37
Media
• The signal encoding that must occur is different for each type of media.

Electrical impulses
with specific
patterns

Pulses of light in the


infrared or visible
ranges

Patterns of electromagnetic
waves

38
Network
connections

1- Wired 2- Wireless.

Medium & Cables Copper cables “ Earth's atmosphere, or


coaxial cable or space “No cables”
unshielded twisted
pair –UTP- cable.
Glass or Plastic
Optical fiber

Signals Electrical. Radio frequencies


Light.

39
How to choose Network Media ?

 Based on the maximum distance.

 Based on the environment “ Fiber– no interference compared to wireless”

 Based on the bandwidth – speed - and the amount of data to be transmitted


within a specific period. “ Video is better to be sent by fiber”

 Based on the cost. “ Fiber is more expensive”

40
Network
Representations

 Network Interface Card (NIC) or LAN adapter : Is the card through which hosts are
connected to the network . The media connecting the PC to the networking device plugs
directly into the NIC.

 Ports and interfaces (used interchangeably)

• Physical Port : A connector or outlet on a networking device where the media


is connected to a host or other networking device.
• Interface - Specialized ports on an internetworking device that connect to
individual networks. Ex. Router Ports . 41
Source Address Destination Address
209.67.102.55 107.16.4.21

 Each host is identified by two addresses.

• IP (Internet Protocol) address and a MAC address (later).

 The address of the destination host is used to specify where the message should
be sent.
42
Physical Topology

 Physical topology diagrams - Identify the physical location of intermediary


devices, configured ports, and cable installation.

43
Logical Topology

 Logical topology diagrams - Identify devices functions, ports, and IP


addressing scheme.

44
Types of Networks
 Network infrastructures can vary
greatly in terms of:
 Size of the area covered

 Number of users connected

 Number and types of services

available
 Area of responsibility

45
Types of Networks
 Local Area Network (LAN) – A network that spans a single geographical area,
it is also administered by a single organization or entity , providing services and
applications to the members of a common organizational structure at a very high
speed or bandwidth . i.e. single business, campus or region.

 Wide Area Network (WAN)- Individual organizations usually lease connections


through a telecommunications service provider (TSP) network to connect their
geographically separated LANs or to connect to the WAN.

• Usually administered by multiple ISPs.


• Typically slower speed links than LANs because of service costs.

 T1, DS3, OC3


 PPP, HDLC , ATM
 Frame Relay, ISDN,
POTS
46
Types of Networks
 Metropolitan Area Network (MAN) : Bigger than the LAN and smaller than the
WAN. Typically operated by a single entity such as a large organization “ City”.

 Storage Area Network (SAN) - Support data storage servers, retrieval, and
replication. Multiple disk arrays (called blocks), and Fiber Channel interconnection
technology.
 Wireless LAN (WLAN) - Similar to a LAN but wirelessly interconnects users and
end points in a small geographical area.

47
The Internet
 The Internet is a worldwide collection of interconnected networks
(internetworks or internet for short).

 Internet - A global mesh of interconnected private and public networks .


It is connecting ISPs to other ISPs.( Not owned by a single institution, thus
requires standards to control it .
• Internet Engineering Task Force (IETF), Internet Corporation for Assigned
Names and Numbers (ICANN), Institute of electrical and electronics engineering
(IEEE) are all organizations that help building standards.

 ISPs (Internet Service Providers)

• Often also Telecommunication SPs (TSP).


• Connect their customers to the Internet.

48
Intranets and Extranets

49
Intranets and Extranets
 Intranet is a term often used to refer to a private
connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the
organization's members, employees, or others with
authorization.
 An organization may use an extranet to provide secure and
safe access to individuals who work for a different
organization, but require access to the organization’s data.
Examples of extranets include:
• A company that is providing access to outside suppliers and
contractors.
• A hospital that is providing a booking system to doctors so they can
make appointments for their patients.
• A local office of education that is providing budget and personnel
information to the schools in its district.

50
Internet Access Technologies
 There are many different ways to connect users and organizations
to the Internet.
 Home users, teleworkers (remote workers), and small offices
typically require a connection to an Internet Service Provider (ISP)
to access the Internet. Connection options vary greatly between
ISP and geographical location. However, popular choices include
broadband cable, broadband digital subscriber line (DSL), wireless
WANs, and mobile services.
 Organizations typically require access to other corporate sites and
the Internet. Fast connections are required to support business
services including IP phones, video conferencing, and data center
storage.
 Business-class interconnections are usually provided by service
providers (SP). Popular business-class services include business
DSL, leased lines, and Metro Ethernet.

51
Home and Small Office Internet
Connections
 Cable - Typically offered by cable television service providers, the
Internet data signal is carried on the same cable that delivers cable
television. It provides a high bandwidth, always on, connection to the
Internet.
 DSL - Digital Subscriber Lines provide a high bandwidth, always on,
connection to the Internet. DSL runs over a telephone line. In general,
small office and home office users connect using Asymmetrical DSL
(ADSL), which means that the download speed is faster than the upload
speed.
 Cellular - Cellular Internet access uses a cell phone network to connect.
Wherever you can get a cellular signal, you can get cellular Internet
access. Performance will be limited by the capabilities of the phone and the
cell tower to which it is connected..

52
Home and Small Office Internet
Connections

 Satellite - The availability of satellite Internet access is a real


benefit in those areas that would otherwise have no Internet
connectivity at all. Satellite dishes require a clear line of sight to
the satellite.
 Dial-up Telephone - An inexpensive option that uses any
phone line and a modem. The low bandwidth provided by a dial-
up modem connection is usually not sufficient for large data
transfer, although it is useful for mobile access while traveling

53
Home and Small Office Internet
Connections

54
Connecting Businesses to the
Internet
 Dedicated Leased Line - Leased lines are actually reserved circuits within
the service provider’s network that connect geographically separated offices
for private voice and/or data networking. The circuits are typically rented at
a monthly or yearly rate. They can be expensive.
 Ethernet WAN - Ethernet WANs extend LAN access technology into the
WAN. Ethernet is a LAN technology you will learn about in a later chapter.
The benefits of Ethernet are now being extended into the WAN.
 DSL - Business DSL is available in various formats. A popular choice is
Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer
version of DSL, but provides uploads and downloads at the same speeds.
 Satellite - Similar to small office and home office users, satellite service
can provide a connection when a wired solution is not available.
 The choice of connection varies depending on geographical location and
service provider availability.

55
Connecting Businesses to the Internet

 Businesses may require higher bandwidth for business services including IP


phones, video conferencing, and data center storage. and managed
services.

56
Traditional Separate Networks
 Consider a school built thirty years ago. Back then, some classrooms were
cabled for the data network, telephone network, and video network for
televisions.

57
Converged Networks

 One networks that can send any type of


application ( Video, Voice , pictures ,
text).

 No need to have a separate network per


application.

58
Four basic characteristics for networks to meet user expectations

Fault
Tolerance

Quality
of
Scalability Architectures
Service
(QoS)

Network architecture refers to both


selecting :

(1)Technologies that support the


infrastructure .
Security
(2)Services and protocols that
move the messages across that
infrastructure.
59
1. Fault Tolerant
network

Limits the impact of a


hardware or software
failure and can
recover quickly when
such a failure occurs.

Redundant links, or paths, between the source


The Way
and destination of a message

60
2. Scalability

A scalable network
can expand quickly to
support new users
and applications
without impacting
existing users.

Hierarchical layered design for physical


The Way infrastructure “Ports” and logical addressing” .
Enables users or service providers to be inserted
without causing disruption to the network.
61
3. Quality of Service
(QoS)

Voice and live video


transmissions require
a level of consistent
quality and
uninterrupted delivery

The Way Classification Data and Assigning priorities is


important in a converged networks.

62
Methods

1- Queuing

Queue the packets in memory until resources become available to transmit


them.

BUT Queuing packets causes delay. If the number of packets to be queued


continues to increase, the memory queues fill up and packets are dropped.

So this method needs a support

63
2- Classification

Classify applications based on “QOS” requirements to time – sensitive or


important or time insensitive applications .

64
3- Assigning priorities

1- Time-sensitive communication –
Increase priority for services like telephony or video distribution.
2- High importance to organization –
Increase priority for production control or business transaction data.
3-Non time-sensitive communication –
Decrease Priority for web page retrieval or e-mail.
4- Undesirable communication –
Decrease priority or block unwanted activity, like peer-to-peer file sharing
or live entertainment.

in a manufacturing company a
control signal to an automated
piece of heavy machinery should
have the highest priority.

65
4. Security

What security suppose to do ?

1-Protecting the Network from outage.


2- Prevent unauthorized disclosure or theft of information.
3- Prevent unauthorized modification of information.
4- Prevent Denial of Service.

How we Do that ?

1- Network infrastructure 2- Content


security (Information) security.

66
1- Ensuring Confidentiality

1-Having a strong authentication system with difficult to guess passwords.


2-Encrypting content minimizes unauthorized disclosure or theft of information.

2-Maintaining Communication Integrity

1- Assurance that the information has not been altered in transmission.


2- Assurance that the identity of the sender has been validated.

The use of
1- Digital signatures.
2- Hashing algorithms.
3- Checksum mechanisms.

67
3- Ensuring Availability

Availability means having the assurance of timely and reliable access to data
services for authorized users.

Threats

Resources can be unavailable during a Denial of Service (DoS) attack or due


to the spread of a computer virus.

The Way

1- Network firewall devices.


2- Desktop ,server anti-virus software.

68
External Threats

 The most common external threats to networks include:


• Viruses, worms, and Trojan horses - malicious software and arbitrary
code running on a user device
• Spyware and adware - software installed on a user device that secretly
collects information about the user
• Zero-day attacks, also called zero-hour attacks - an attack that occurs
on the first day that a vulnerability becomes known
• Hacker attacks - an attack by a knowledgeable person to user devices or
network resources
• Denial of service attacks - attacks designed to slow or crash
applications and processes on a network device
• Data interception and theft - an attack to capture private
information from an organization’s network
• Identity theft - an attack to steal the login credentials of a user in order
to access private data.
69
Internal Threats

 The most common data breaches happen because of internal users of the
network.
 Due to:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
 With the evolving BYOD strategies, corporate data is much more vulnerable.
 Therefore, when developing a security policy, it is important to address both
external and internal security threats..

70
Security Solutions
 Network security components for a home or small office network should
include:

• Antivirus and antispyware - to protect user devices from malicious


software
• Firewall filtering - to block unauthorized access to the network.

 In addition to the above, larger networks and corporate networks often have
other security requirements:

• Dedicated firewall systems - to provide more advanced firewall


capability that can filter large amounts of traffic with more granularity
• Access control lists (ACL) - to further filter access and traffic forwarding
• Intrusion prevention systems (IPS) - to identify fast-spreading threats,
such as zero-day or zero-hour attacks
• Virtual private networks (VPN) - to provide secure access to remote
workers.

71
The Architecture of the Internet

 A good example of scalability is the Tier architecture of the Internet.

Tier 1: ISPs provide national for


and
Tier 3:2:Provide
Pay Tier 1 providers
service to end users and
international
connectivity connections.
and provide (Verizon,
regional
are usually connected through Tier 2
Sprint,
service. AT&T, NTT, cable systems,
providers.
etc.)

Internet
Backbone

72
The Architecture of the Internet
 Additional providers can be added relatively easily with no disruption of current
services. THAT is scalability!

Internet
Backbone

73
74
Network Trends

 BYOD is about end users


having the freedom to use
personal tools to access
information and
communicate across a
business or campus network.

75
Network Trends
 Online Collaboration
Individuals want to connect to
the network, not only for access
to data applications, but also to
collaborate with one another.
Collaboration is defined as “the
act of working with another or
others on a joint project.”
Collaboration tools, like Cisco
WebEx, give employees,
students, teachers, customers,
and partners a way to instantly
connect, interact, and achieve
their objectives.
 For businesses, collaboration is a
critical and strategic priority that
organizations are using to remain
competitive.

76
Network Trends
 Video Communication
• Video is being used for communications, collaboration, and
entertainment. Video calls can be made to and from anywhere
with an Internet connection.
• Video conferencing is a powerful tool for communicating with
others at a distance, both locally and globally. Video is
becoming a critical requirement for effective collaboration as
organizations extend across geographic and cultural
boundaries.

77
Network Trends

 Cloud Computing - Cloud computing is another global trend changing the way
we access and store data. Cloud computing allows us to store personal files,
even backup our entire hard disk drive on servers over the Internet.
Applications such as word processing and photo editing can be accessed using
the Cloud.
 For businesses, Cloud computing extends IT's capabilities without requiring
investment in new infrastructure, training new personnel, or licensing new
software. These services are available on demand and delivered economically
to any device anywhere in the world without compromising security or function.

78
Network Trends

 Cloud Computing - There are four primary types of Clouds, as shown in the
figure: Public Clouds, Private Clouds, Hybrid Clouds, and Custom Clouds.

 Cloud computing is possible because of data centers.


 A data center is a facility used to house computer systems and associated
components.
 A data center can occupy one room of a building, one or more floors, or an
entire building.
 Data centers are typically very expensive to build and maintain.
 For this reason, only large organizations use privately built data centers to
house their data and provide services to users.
 Smaller organizations that cannot afford to maintain their own private data
center can reduce the overall cost of ownership by leasing server and storage
services from a larger data center organization in the Cloud.

79
types of Clouds

80
types of Clouds

81
types of Clouds

82
types of Clouds

83
Send internet over electric wires when no other
Network Technology at Home wired or wireless coverage possible

Control all home appliances


via your mobile phone

84

You might also like