235032 computer networks - university of phayaoict.up.ac.th/skchatri/subject14/chapter1 network...
TRANSCRIPT
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
1
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.1Chapter 1 1
235032 Computer Networks
School of ICT, University of Phayao
Dr.Sukchatri PRASOMSUK
ITE PC v4.1Chapter 1 2© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
ดร.สขุชาตร ีประสมสขุ (Dr.Sukchatri PRASOMSUK)
D.(Computational Linguistics), INALCO, Paris, FR
M.Eng.(IT), & Grad.Dip. In Applied IS, RMIT, Melbourne, AU
B.Sc.(คณติศาสตร)์, ม.รามคําแหง
เคยทํางานที ่: DATA SOLVE Co.,Ltd. Central Trading Co.,Ltd
กรมวทิยาศาสตรบ์รกิาร กระทรวงวทิยฯ์ม.หอการคา้ และ ม.แมฟ้่าหลวง
Contact : [email protected]
Notes/Slides Download:http://www.ict.up.ac.th/skchatri/
About Lecturer
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
2
ITE PC v4.1Chapter 1 3© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
Assesment : Class (Lec.& LAB) 10 %Lab 20 % Cisco Exam 20 %Mid-Term Exam 25%Final-Term Exam 25%
Grading :A 80 – 100B+ 75-79B 70-74C+ 65-69C 60-64D+ 55-54D 50-54F 0-49
ITE PC v4.1Chapter 1 4© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
CCNA Certification All-in-One for Dummies, by Silviu Angelescu, Wiley Publishing Inc., 2010
Networking for Dummies, 10th edition, by Doug Lowe, Wiley Publishing Inc., 2013
Network Fundamentals, CCNA Exploration Guide, Mark A. Dye, Rick McDonald, Antoon W. Rufi, Cisco Press, 2008
Data Communications and Networikng, 6th edition, William Stalling, 2002
Network+, Computing Technology Industry Association, Syngress, Osborne, McGrawHill, 1999
Cabling : The Complete Guide to Network Wiring, 2nd Edition, David Groth, Sybex, 2001
Text Books
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
3
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5
Exploring the Network & Hierarchical Network Design
Chapter 1
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Objectives
After completing this chapter, students will be able to:
Explain how multiple networks are used in everyday life.
Explain the topologies and devices used in a small- to medium-sized business network.
Explain the basic characteristics of a network that supports communication in a small- to medium-sized business.
Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
4
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.1 Globally Connected1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform1.4 The Changing Network Environment1.5 Hierarchical Network Design Overview
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8
Globally Connected
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
5
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking TodayNetworks in Our Past and Daily Lives
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking TodayThe Global Community
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
6
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting Our LivesNetworking Impacts in Our Daily Lives
Networks support the way we learn.
Networks support the way we communicate.
Networks support the way we work.
Networks support the way we play.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a NetworkNetworks of Many Sizes
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
7
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a NetworkClients and Servers
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a NetworkPeer-to-Peer
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
8
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
LANs, WANs, and the Internet
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and InternetsComponents of a Network
There are three categories of network components:
Devices
Media
Services
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
9
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkEnd Devices
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smart phones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkNetwork Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access points)
Internetworking Devices (routers)
Security Devices (firewalls)
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
10
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkNetwork Media
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkNetwork Representations
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
11
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a NetworkTopology Diagrams
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANsTypes of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
12
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANsLocal Area Networks (LAN)
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANsWide Area Networks (WAN)
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
13
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and the InternetThe Internet
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and the Internet
Intranet and Extranet
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
14
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the InternetConnecting Remote Users to the Internet
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the InternetConnecting Businesses to the Internet
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
15
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
The Network as a Platform
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged NetworksThe Converging Network
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
16
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged NetworksPlanning for the Future
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkSupporting Network Architecture
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
17
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkFault Tolerance in Circuit Switched Network
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkPacket-Switched Networks
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
18
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkScalable Networks
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkProviding QoS
Examples of priority decisions for an organization might include:
Time-sensitive communication - increase priority for services like telephony or video distribution.
Non time-sensitive communication - decrease priority for web page retrieval or email.
High importance to organization - increase priority for production control or business transaction data.
Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
19
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable NetworkProviding Network Security
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38
The Changing Network Environment
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
20
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsNew trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsBring Your Own Device (BYOD)
The concept of any device, to any content, in anyway is a major global trend that requires significant changes to the way devices are used.
This trend is known as Bring Your Own Device (BYOD).
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
21
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsOnline Collaboration
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsVideo Communication
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
22
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsCloud Computing
Cloud computing offers the following potential benefits:
Organizational flexibility
Agility and rapid deployment
Reduced cost of infrastructure
Refocus of IT resources
Creation of new business models
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network TrendsData Centers
A data center is a facility used to house computer systems and associated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server farms or server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire suppression)
Security devices
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
23
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the HomeTechnology Trends in the Home
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the HomePowerline Networking
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
24
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the HomeWireless Broadband
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of NetworkingNetwork Security
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
25
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network SecuritySecurity Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service (DoS) attacks
Data interception and theft
Identity theft
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network SecuritySecurity Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
26
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 51
Network Media
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper CablingCharacteristics of Copper Media
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
27
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper CablingCopper Media
Shielded Twisted Pair (STP) Cable
Unshielded Twisted Pair (UTP) Cable
Coaxial Cable
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper CablingUTP Cable
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
28
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper CablingSTP Cable
Foil Shields
Braided or Foil Shield
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper CablingCoaxial Cable
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
29
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper CablingCooper Media Safety
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP CablingProperties of UTP CablingUTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered that they can limit the negative effect of crosstalk by:
Cancellation
Varying the number of twists per wire pair
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
30
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP CablingUTP Cabling Standards
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP CablingUTP Connectors
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
31
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP CablingTypes of UTP Cable
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP CablingTesting UTP Cables
After installation, a UTP cable tester should be used to test for the following parameters:
Wire map
Cable length
Signal loss due to attenuation
Crosstalk
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
32
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic CablingProperties of Fiber Optic CablingFiber-optic cabling is now being used in four types of industry:
Enterprise Networks
Fiber-to-the-home (FTTH) and Access Networks
Long-Haul Networks
Submarine Networks
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic CablingFiber Media Cable Design
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
33
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic CablingTypes of Fiber Media
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic CablingNetwork Fiber Connectors
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
34
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic CablingTesting Fiber Cables
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic CablingFiber versus Copper
Implementation Issues Copper Media Fibre Optic
Bandwidth Supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps
Distance Relatively short(1 – 100 meters)
Relatively High(1 – 100,000 meters)
Immunity To EMI And RFI Low High(Completely immune)
Immunity To Electrical Hazards Low High(Completely immune)
Media And Connector Costs Lowest Highest
Installation Skills Required Lowest Highest
Safety Precautions Lowest Highest
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
35
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless MediaProperties of Wireless MediaWireless does have some areas of concern including:
Coverage area
Interference
Security
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
• IEEE 802.11 standards• Commonly referred to as Wi-Fi.• Uses CSMA/CA• Variations include:
• 802.11a: 54 Mbps, 5 GHz• 802.11b: 11 Mbps, 2.4 GHz• 802.11g: 54 Mbps, 2.4 GHz• 802.11n: 600 Mbps, 2.4 and 5 GHz• 802.11ac: 1 Gbps, 5 GHz• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz
• IEEE 802.15 standard• Supports speeds up to 3 Mb/s• Provides device pairing over distances from 1 to 100
meters.
• IEEE 802.16 standard• Provides speeds up to 1 Gbps• Uses a point-to-multipoint topology to provide
wireless broadband access.
Wireless MediaTypes of Wireless Media
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
36
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless MediaWireless LAN
Cisco Linksys EA6500 802.11ac Wireless Router
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media802.11 Wi-Fi Standards
Standard Maximum Speed Frequency Backwards
Compatible
802.11a 54 Mbps 5 GHz No
802.11b 11 Mbps 2.4 GHz No
802.11g 54 Mbps 2.4 GHz 802.11b
802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g
802.11ac 1.3 Gbps(1300 Mbps)
2.4 GHz and 5.5 GHz 802.11b/g/n
802.11ad 7 Gbps(7000 Mbps)
2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac
© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr
37
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the NetworkingSummary
In this chapter, you learned:
Networks and the Internet have changed the way we communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.
The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate devices, and network media.
Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the NetworkingSummary (cont.)
In this chapter, you learned:
Networks must be reliable.
Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.