8/14/2019 NB InstructorPPT Chapter1
1/49
2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1:
Exploring the Network
Network Basics
8/14/2019 NB InstructorPPT Chapter1
2/49
Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
Students will be able to:
Explain how networks affect the way we communicate,collaborate, and share.
Explain the basic characteristics of a network thatsupports communication in a small to medium-sizedbusiness.
Explain the topologies and devices used in a small tomedium-sized business network.
Explain trends in networking that will affect the use ofnetworks in small to medium-sized business.
8/14/2019 NB InstructorPPT Chapter1
3/49
Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.1 Communicating in a Network-Centric World
1.2 The Network as a Platform
1.3 LANs, WANs, and Internets
1.4 Expanding the Networking1.5 Summary
8/14/2019 NB InstructorPPT Chapter1
4/49
Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networks in Our Past and Daily Lives
8/14/2019 NB InstructorPPT Chapter1
5/49
Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
The Global Community
8/14/2019 NB InstructorPPT Chapter1
6/49
Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Communicate
Networks Support the Way We Learn
Networks Support the Way We Work
Networks Support the Way We Play
8/14/2019 NB InstructorPPT Chapter1
7/49Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Supporting Communication
What is Communication?
Establishing the Rules
An identified sender and receiver
Agreed upon method of communicating (face-to-face,telephone, letter, photograph)
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgement requirements
8/14/2019 NB InstructorPPT Chapter1
8/49Presentation_ID 8 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Supporting Communication
Quality of Communication
External factors affecting the success of communicationinclude:
The quality of the pathway between the sender and therecipient
The number of times the message has to change form
The number of times the message has to be redirected orreaddressed
The number of other messages being transmittedsimultaneously on the communication network
The amount of time allotted for successful communication
8/14/2019 NB InstructorPPT Chapter1
9/49Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Supporting Communication
Internal QoS Factors
Internal factors affecting successful communication across thenetwork include:
The size of the message
The complexity of the message
The importance of the message
8/14/2019 NB InstructorPPT Chapter1
10/49Presentation_ID 10 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Traditional Service Networks
8/14/2019 NB InstructorPPT Chapter1
11/49Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Planning for the Future
8/14/2019 NB InstructorPPT Chapter1
12/49Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are fourbasic characteristics that the underlying architectures need toaddress in order to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
8/14/2019 NB InstructorPPT Chapter1
13/49Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance in Circuit Switched Network
8/14/2019 NB InstructorPPT Chapter1
14/49Presentation_ID 14 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Packet-Switched Networks
8/14/2019 NB InstructorPPT Chapter1
15/49Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalability
8/14/2019 NB InstructorPPT Chapter1
16/49Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Quality of Service (QoS)
Examples of priority decisions for an organization mightinclude:
Time-sensitive communication - increase priority for serviceslike telephony or video distribution.
Non time-sensitive communication - decrease priority for webpage retrieval or email.
High importance to organization - increase priority for
production control or business transaction data. Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or liveentertainment
8/14/2019 NB InstructorPPT Chapter1
17/49Presentation_ID 17 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Network Security
8/14/2019 NB InstructorPPT Chapter1
18/49Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
End devices
Intermediary devices
Network media
8/14/2019 NB InstructorPPT Chapter1
19/49Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
End Devices
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smartphones, tablets,PDAs, and wireless debit / credit card readers and barcodescanners)
8/14/2019 NB InstructorPPT Chapter1
20/49Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless accesspoints)
Internetworking Devices (routers) Security Devices (firewalls)
8/14/2019 NB InstructorPPT Chapter1
21/49Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Media
8/14/2019 NB InstructorPPT Chapter1
22/49Presentation_ID 22 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Topology Diagrams
8/14/2019 NB InstructorPPT Chapter1
23/49Presentation_ID 23 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
8/14/2019 NB InstructorPPT Chapter1
24/49Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Local Area Networks (LAN)
8/14/2019 NB InstructorPPT Chapter1
25/49
Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Wide Area Networks (WAN)
8/14/2019 NB InstructorPPT Chapter1
26/49
Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
The Internet
8/14/2019 NB InstructorPPT Chapter1
27/49
Presentation_ID 27 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
Intranet and Extranet
8/14/2019 NB InstructorPPT Chapter1
28/49
Presentation_ID 28 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Internet Access Technologies
8/14/2019 NB InstructorPPT Chapter1
29/49
Presentation_ID 29 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Remote Users to the Internet
8/14/2019 NB InstructorPPT Chapter1
30/49
Presentation_ID 30 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Businesses to the Internet
8/14/2019 NB InstructorPPT Chapter1
31/49
Presentation_ID 31 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing
8/14/2019 NB InstructorPPT Chapter1
32/49
Presentation_ID 32 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Bring Your Own Device (BYOD)
8/14/2019 NB InstructorPPT Chapter1
33/49
Presentation_ID 33 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
BYOD Considerations
8/14/2019 NB InstructorPPT Chapter1
34/49
Presentation_ID 34 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Online Collaboration and Considerations
8/14/2019 NB InstructorPPT Chapter1
35/49
Presentation_ID 35 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Video
8/14/2019 NB InstructorPPT Chapter1
36/49
Presentation_ID 36 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Cloud Computing
There are four primary types of clouds:
Public clouds
Private clouds
Custom clouds
Hybrid clouds
8/14/2019 NB InstructorPPT Chapter1
37/49
Presentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Data Centers
A data center is a facility used to house computer systems andassociated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as serverfarms or server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, firesuppression)
Security devices
8/14/2019 NB InstructorPPT Chapter1
38/49
Presentation_ID 38 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of Networking
Network Security
8/14/2019 NB InstructorPPT Chapter1
39/49
Presentation_ID 39 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
8/14/2019 NB InstructorPPT Chapter1
40/49
Presentation_ID 40 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
8/14/2019 NB InstructorPPT Chapter1
41/49
Presentation_ID 41 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Network Architectures
8/14/2019 NB InstructorPPT Chapter1
42/49
Presentation_ID 42 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Borderless Network
8/14/2019 NB InstructorPPT Chapter1
43/49
Presentation_ID 43 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Collaboration Architecture
8/14/2019 NB InstructorPPT Chapter1
44/49
Presentation_ID 44 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Data Center Architecture
8/14/2019 NB InstructorPPT Chapter1
45/49
Presentation_ID 45 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Certified Network Associate (CCNA)
8/14/2019 NB InstructorPPT Chapter1
46/49
Presentation_ID 46 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
Networks and the Internet have changed the way wecommunicate, learn, work, and even play.
Networks come in all sizes. They can range from simplenetworks consisting of two computers, to networksconnecting millions of devices.
The Internet is the largest network in existence. In fact, theterm Internet means a network of networks. The Internet
provides the services that enable us to connect andcommunicate with our families, friends, work, and interests.
8/14/2019 NB InstructorPPT Chapter1
47/49
Presentation_ID 47 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
The network infrastructure is the platform that supports thenetwork. It provides the stable and reliable channel overwhich communication can occur. It is made up of network
components including end devices, intermediate device, andnetwork media.
Networks must be reliable.
Network security is an integral part of computer networking,regardless of whether the network is limited to a homeenvironment with a single connection to the Internet, or aslarge as a corporation with thousands of users.
8/14/2019 NB InstructorPPT Chapter1
48/49
Presentation_ID 48 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
The network infrastructure can vary greatly in terms of size,number of users, and number and types of services that aresupported on it. The network infrastructure must grow and
adjust to support the way the network is used. The routingand switching platform is the foundation of any networkinfrastructure.
8/14/2019 NB InstructorPPT Chapter1
49/49