You are on page 1of 52

Chapter 1:

Exploring the Network

Introduction to Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Objectives
After completing this chapter, students will be able to:
 Explain how multiple networks are used in everyday life.
 Explain the topologies and devices used in a small- to
medium – sized business network.
 Explain the basic characteristics of a network that supports
communications in a small- to medium-sized business.
 Explain trends in networking that affect the use of networks in
small to medium-sized business

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Networking Today
Networks in Our Past and Daily Lives

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Networking Today
The Global Community

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Learn

 Networks Support the Way We Communicate

 Networks Support the Way We Work

 Networks Support the Way We Play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Providing Resources in a Network
Networks of Many Sizes

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Providing Resources in a Network
Clients and Servers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Providing Resources in a Network
Peer-to-Peer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Components of a Network
End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access
points)
 Internetworking Devices (routers)
 Security Devices (firewalls)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Components of a Network
Network Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Components of a Network
Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Components of a Network
Topology Diagrams

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
LANs and WANs
Types of Networks
The three most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
 Internet

Other types of networks include:


 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
LANs and WANs
Local Area Networks (LAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
LANs and WANs
Wide Area Networks (WAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
LANs, WANs, and Internets
The Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
SAN

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
MAN Bưu Điện Thànhh Phố Hồ Chí Minh

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LANs, WANs, and Internets
Internet Access Technologies

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Connecting to the Internet
Connecting Remote Users to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Connecting to the Internet
Connecting Businesses to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Converged Networks
Planning for the Future

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Network Trends
New trends
Some of the top trends include:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Network Trends
Bring Your Own Device (BYOD)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Network Trends
Online Collaboration

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Network Trends
Video Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Network Trends
Cloud Computing
There are four primary types of clouds:
 Public clouds
 Private clouds
 Custom clouds
 Hybrid clouds

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Network Trends
As a service

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Network Trends
Cloud Computing
There are four primary types of clouds:
 Public clouds
 Private clouds
 Custom clouds
 Hybrid clouds

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Networking Technologies for the Home
Technology Trends in the Home

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Networking Technologies for the Home
Powerline Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Networking Technologies for the Home
Wireless Broadband

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Future of Networking
Network Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Question & Answers
A company is contemplating whether to use a client/server
or a peer-to-peer network. What are three characteristics
of a peer-to-peer network? (Choose better security)
A. easy to create*
B. better device performance when acting as both client and
server
C. lacks centralized administration *
D. less cost to implement*
E. scalable
F. three.)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Question & Answers
Which device performs the function of determining the
path that messages should take through internetworks?
A. a firewall
B. a router*
C. a web server
D. a DSL modem

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Question & Answers
Which two statements describe intermediary devices?
(Choose two.)Intermediary devices generate data content.
A. Intermediary devices alter data content.
B. Intermediary devices direct the path of the data. *
C. Intermediary devices connect individual hosts to the
network.*
D. Intermediary devices initiate the encapsulation process.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Quiz
Which area of the network would a college IT staff most
likely have to redesign as a direct result of many students
bringing their own tablets and smartphones to school to
access school resources?extranet
A. intranet
B. wired LAN
C. wireless LAN*
D. wireless WAN

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Quiz
What type of network must a home user access in order to
do online shopping?
A. an intranet
B. the Internet*
C. an extranet
D. a local area network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Quiz
What type of network must a home user access in order to
do online shopping?
A. an intranet
B. the Internet*
C. an extranet
D. a local area network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Quiz
What type of network traffic requires QoS?
A. email
B. on-line purchasing
C. video conferencing*
D. wiki

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Quiz
A network administrator is implementing a policy that
requires strong, complex passwords. Which data
protection goal does this policy support?
A. data integrity
B. data quality
C. data confidentiality*
D. data redundancy

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Quiz
What is the Internet?
A. It is a network based on Ethernet technology.
B. It provides network access for mobile devices.
C. It provides connections through interconnected global
networks.*
D. It is a private network for an organization with LAN and
WAN connections.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52

You might also like