exploring the network
DESCRIPTION
Exploring the network. Chapter 1 Intro to Routing & Switching. Objectives. Networking in our lives. Networks have changed how we communicate Everyone can connect & share How have networks changed the way… You learn? You communicate? You play? You work?. homework. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/1.jpg)
EXPLORING THE NETWORK
Chapter 1Intro to Routing & Switching
![Page 2: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/2.jpg)
OBJECTIVES
![Page 3: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/3.jpg)
NETWORKING IN OUR LIVES Networks have changed how we
communicateEveryone can connect & share
How have networks changed the way…You learn?You communicate?You play? You work?
![Page 4: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/4.jpg)
HOMEWORK Read slides 1.1.1.1 - 1.1.1.8
Complete Lab - Researching Network Collaboration Tools on 1.1.18
You will use the wiki to keep track of questions you get wrong on chapter tests
![Page 5: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/5.jpg)
NETWORKS OF MANY SIZES Form 6 groups
On poster paper, draw a picture & use key words to describe:Simple small home networkSOHOMedium-large networksWorld-wide networkClient/ServerPeer-to-peer
![Page 6: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/6.jpg)
CLIENT-SERVER NETWORK Host
Can send & receive messages
Server Host with special software Provides a service, like email or web pages
Email server/web server
Client Host with special software Requests & displays info from a server
PC with web browser to display pages from web server
![Page 7: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/7.jpg)
CLIENT-SERVER NETWORK
![Page 8: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/8.jpg)
PEER-TO-PEER NETWORK A computer can be a client AND a server SOHO & home use P2P networks
Simple P2P- 2 computers connected
Multiple devices with network device to connect them
![Page 9: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/9.jpg)
PEER-TO-PEER NETWORK Advantages
Disadvantages
![Page 10: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/10.jpg)
REVIEW
![Page 11: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/11.jpg)
COMPONENTS OF A NETWORK
1.2.1
![Page 12: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/12.jpg)
NETWORK ICONS
![Page 13: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/13.jpg)
END DEVICES (HOSTS) Interface between users & the network Host is either source or destination Each host has an address to identify it
![Page 14: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/14.jpg)
INTERMEDIARY DEVICES Connect end devices Work behind scenes to make data flow
Network Access- switches and WAPs Internetworking- routers Security- firewalls
![Page 15: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/15.jpg)
INTERMEDIARY DEVICES Knows the path Finds detour when link fails Can prioritize data with Quality of
Service (QoS) prioritiesWhat does this mean?
Filter dataSecurity
![Page 16: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/16.jpg)
IDENTIFYING DEVICES Complete the handout
![Page 17: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/17.jpg)
VISUAL MAPS
![Page 18: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/18.jpg)
ACTIVITY End device Intermediary Media
![Page 19: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/19.jpg)
END OF DAY 2
REVIEW
![Page 20: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/20.jpg)
LANS & WANSINTERNET &
CONNECTING TO IT
1.2.2, 1.2.3, 1.2.4
![Page 21: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/21.jpg)
TYPES OF NETWORKSThe two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN).
Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN)
![Page 22: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/22.jpg)
LAN Over a small area
![Page 23: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/23.jpg)
WAN
![Page 24: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/24.jpg)
INTERNET Connected networks Not owned by anyone
Organizations maintain it & standards
![Page 25: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/25.jpg)
INTRANET & EXTRANET
![Page 26: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/26.jpg)
INTERNET CONNECTIONS- SOHO In groups of 4
How you connect, bandwidth (s, m, f), device needed, special info
Cable/fiber DSL Cellular Satellite Dial-up
![Page 27: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/27.jpg)
INTERNET CONNECTIONS- BUSINESS Dedicated leased line
Connection from ISP to you
T1 (1.5Mbps) & T3 (44Mbps)
Metro Ethernet What is it?
DSL ADSL & SDSL 18,000ft. over copper
Satellite Higher cost Slower
![Page 28: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/28.jpg)
END OF DAY 3
REVIEW
![Page 29: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/29.jpg)
CONVERGED NETWORKSRELIABLE NETWORKS
1.3.1, 1.3.2
![Page 30: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/30.jpg)
NETWORKS CONVERGE
![Page 31: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/31.jpg)
NETWORK EVOLUTION
![Page 32: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/32.jpg)
LAB 1.3.1.3 Mapping the Internet
![Page 33: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/33.jpg)
RELIABILITY To support all of these methods of
communication, these need to be addresses to meet user expectations:Fault Tolerance Scalability Quality of Service (QoS) Security
![Page 34: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/34.jpg)
FAULT TOLERANCE Limits failures Quick recovery when failure occurs
One path fails, message takes different path Circuit-switched network Packet-switched network
![Page 35: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/35.jpg)
SCALABILITY Grow, able to support more users & new
applications w/out major changes
![Page 36: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/36.jpg)
QOS Have you ever tried to watch a video
with constant breaks and pauses? Must provide predictable, measurable,
and at times, guaranteed services Is packet-switched guaranteed?
Can be used on home routersWhat has priority? Phone, video game,
Internet?
![Page 37: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/37.jpg)
SECURITY What can happen if bad or no security?
Network infrastructure security Information security
Ensure data is kept confidential, data integrity, data availability
![Page 38: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/38.jpg)
ACTIVITY Complete the handout
![Page 39: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/39.jpg)
END OF DAY 4
REVIEW
![Page 40: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/40.jpg)
NETWORK TRENDSNETWORK SECURITY
1.4.1, 1.4.2, 1.4.3
![Page 41: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/41.jpg)
NEW TRENDS AT COMPANIES BYOD Online collaboration Video communication Cloud computing
Access application through online subscription
Store files on network servers online Kept in data centers (WE HAVE ONE!)
How does this help an IT department & business
![Page 42: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/42.jpg)
EXTERNAL & INTERNAL THREATS Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-
hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft
Make a poster for each, in groups
![Page 43: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/43.jpg)
THREAT SOLUTIONS Antivirus Anti-spyware Firewall filtering
In a larger network:Dedicated firewall systemACLs IPS (intrusion prevention system)VPN
![Page 44: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/44.jpg)
ACTIVITY
![Page 45: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/45.jpg)
REVIEW & STUDY Complete the study guide handout
Take the quiz on netacad.com
Jeopardy review
![Page 46: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/46.jpg)
SUMMARYIn this chapter, you learned: Networks and the Internet have changed the way
we communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.
The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
![Page 47: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/47.jpg)
SUMMARY 2 The network infrastructure is the platform that
supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media.
Networks must be reliable.
Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
![Page 48: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/48.jpg)
SUMMARY 3 The network infrastructure can vary
greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.
![Page 49: Exploring the network](https://reader035.vdocuments.net/reader035/viewer/2022070502/56813ea4550346895da8fa70/html5/thumbnails/49.jpg)
EXPLORING THE NETWORK
Chapter 1Intro to Routing & Switching