Documente Academic
Documente Profesional
Documente Cultură
Introduction to Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Networking Today
Networks in Our Past and Daily Lives
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Providing Resources in a Network
Peer-to-Peer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
1.1.2.2 Clients and Servers
Clients are powerful. Workstations are accessing Server that have email and files
on them – local environment, a Switch. A printer stands alone, a lot of people can
share it, but it’s set up so there’s no impact on the client him/herself, makes it easy
to manage the Peer-to-peer network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN) – switch you can talk to, and, if appropriate, a
connection to the Router port. Needs an network address and must be
unique in the world, so everything can be on that network that’s
connected, every device will have their own address as off of that Network
IP address. Routers exchange information.
Wide Area Network (WAN)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
LANs and WANs
Wide Area Networks (WAN) – one function: determines the path, to send request data to, and
to make that physical switching so that a packet is designed to go thru this network, to come
out of one of these interfaces, and to the LAN directly.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Devices are all the
icons to the right.
LAN
Media that connects
them: copper wire,
fiber-optic cable,
signal thru the air,
light signals, etc.
Media is he
Transmission at
physical level that
identifies the 1s and
0s at, what gets
rolled up into bytes,
gets rolled up into
applications and
provides services.
Services are not
shown. But it could
be an SAP system,
email Server, or it
can provide a Web
interface.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
LANs, WANs, and the Internet
The Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Components of a Network
End Devices – where things terminate. In case of Broadband wireless network, your
Mobile, ipod, Samsung tablet and such. Distinguished from Intermediary devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Components of a Network
Network Infrastructure Devices
END DEVICES – send and receive data, that makes sense, to End User.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Components of a Network
Network Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Components of a Network
Network Representations
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Components of a Network
Topology Diagrams
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
LANs, WANs, and the Internet
Intranet (vehicle) and Extranet (customer)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
1.3 The Network as a Platform
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Converged Networks
The Converging Network (carry Data services, i.e: voice, video)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic
characteristics that the underlying architectures need to address in order to
meet user expectations:
Fault Tolerance – never want to have a single component system, don’t want to have another
component do its job, you’re only as robust as your weakest point. At Data Center, doubles of Storage,
there’s always another device that can take over the job. If you don’t have another path though to get that
backup device to take over, then the system won’t work anyway, if for example don’t have another set of
fiber cables going to a different street; hence No fault tolerance. Question is of how important is it to have
extra paths/ addresses covered, the costs. If Circuit Switching gets broken, no Fault Tolerance there.
Scalability – you grow your network. Physical topology where you can built devices on,
need a map system too, a Logical topology, to provide a logical path, for the determination of
path switching. When you build a big network, you can make it bigger!
Quality of Service (QoS) – what gets more bandwidth in your system; is it video, is it
data, any kind of media; voice: you can miss some syllables, still know what is said.
Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Reliable Network
Fault Tolerance (not much) in Circuit Switched Network –
one straight line for synchrozination
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Reliable Network
Packet-Switched Networks (TCP Segments) – In the Data Network, you don’t have to send
everything one after the other. If you’re going from here (ccsu, i.e.) want to go to Stamford, or send some Info, you
can go back and forth between the two; if one of them gets clogged up; go on the other Hwy until the other one
clears up and have a sensitivity to that. Put Segment numbers to that on the transmitted data, so when it gets to
the end, Packet 2 can possibly get there before Packet 1, because Packet 2 went on a faster path. TCP was able
to reorder the segments, deliver it to the application in the order that it was transmitted – that’s Packet Switching, a
great leap-forward in Data communications. All paths, message can arrive at any point – TCP/IP.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Reliable Network
Providing QoS
Examples of priority decisions for an organization might include:
Time-sensitive communication - increase priority for services like
telephony or video distribution.
Non time-sensitive communication - decrease priority for web page
retrieval or email.
High importance to organization - increase priority for production control
or business transaction data.
Undesirable communication - decrease priority or block unwanted activity,
like peer-to-peer file sharing or live entertainment.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Network Trends
Data Centers
A (Level 1) data center is a facility used to house computer systems and
associated components including:
CHARACTERISTICS
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server farms or
server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire suppression)
Security devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Future of Networking
Network Security – all security breaches are usually Network breaches.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Network Security – anyone considering IT industry, give Security career a lot of
consideration, in terms of a career, because there so much to do and so few
people that are doing it!
Security Threats - #1 threat to CEOs everywhere is
security on their Network.
The most common external threats to networks include:
Viruses, worms, and Trojan horses – malware that sits there, tries to weazle into
your device, to steal stuff or bring it down.
Spyware and adware – see what you’re doing and redirect you at times, to buy stuff or
whatever on your device.
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service (DoS) attacks – TCP guarantees a delivery; has sequence and
acknowledgement checks, so you can see that what you sent is what you receive, important since you don’t
want a contamination of data. You can ask for conversation with another device, and that device will
acknowledge that. You don’t save any information, you just open up all these phone calls with nobody’s on
them. It creates so many requests of a computer, I use services on a pc that can’t handle it, so it locks up –
that’s the design of DoS, to deny you service by making requests that are break the rules, that cause a lot of
traffic, that is just going nowhere. Like traffic, can move but nothing can happen.
Data interception and theft
Identity theft
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware - software
Firewall filtering – built on top of Access Control Lists, can be appliances that can do same type of
filtering through ports on Routers.
Virtual Private Networks (VPNs) – IBM uses AT&T Software, to create a robust, a
tunnel that goes through the Internet, that supplies security, so Hackers can’t hack into VPN.
(2 most important above)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26