CN1 MODULE 1 NOTES BY KAI 🔥

Module 1: Networking Today

Introduction to Networks v7.0 (ITN)

This module presents an introduction to networking, integrating various teaching aids and resources designed to support instructors and enhance learner engagement.

Instructor Materials

Overview

The PowerPoint deck for this module is divided into two main sections:

  1. Instructor Planning Guide

  2. Instructor Class Presentation (starting from slide #12).

Additional Resources
  • For further resources, instructors can visit the Instructor Home Page and Course Resources for this course, the professional development site on netacad.com, and the official Cisco Networking Academy Facebook page.

Module Features and Expectations

Included Learning Features

This module incorporates several features to facilitate learning:

  • Animations: To introduce new skills and concepts.

  • Videos: To enhance understanding of key topics.

  • Check Your Understanding (CYU): Quizzes for gauging comprehension of the material.

  • Interactive Activities: Various formats for learners to assess their understanding.

  • Syntax Checker: Simulations to practice Cisco command line configurations.

  • PT Activity: Simulation and modeling to explore, acquire, reinforce, and expand skills.

  • Hands-On Labs: Practical labs for working with physical equipment.

  • Class Activities: Designed for facilitating learning and collaboration.

  • Module Quizzes: Self-assessments incorporating concepts learned throughout the module.

  • Module Summary: A recap of the module content.

Check Your Understanding

CYU activities allow students to quickly assess their grasp of the material, ensuring they can proceed benefitably through the module. These activities do not impact grades and are summarized in the notes section of relevant slides.

Activities Associated with This Module

A detailed list of activities associated with this module is as follows:

Page #

Activity Type

Activity Name

Optional?

1.1.2

Video

The Cisco Networking Academy Learning Experience

Recommended

1.2.6

CYU

Network Components

Recommended

1.3.3

CYU

Network Representations and Topologies

Recommended

1.4.5

CYU

Common Types of Networks

Recommended

1.5.5

Video

Download and Install Packet Tracer

Recommended

1.5.6

Video

Getting Started in Cisco Packet Tracer

Recommended

1.5.7

Packet Tracer

Network Representation

Recommended

1.6.6

CYU

Reliable Networks

Recommended

1.7.5

Video

Cisco WebEx for Huddles

Recommended

1.7.10

CYU

Network Trends

Recommended

1.8.3

CYU

Network Security

Recommended

1.9.3

Lab

Research IT and Networking Job Opportunities

Recommended

Best Practices for Instructors

Prior to teaching the module, instructors should:

  • Review all activities and assessments associated with each topic.

  • Engage students with questions to stimulate classroom discussion.

Example Discussion Questions
  • Topic 1.1: Inquire about what might be absent without the internet and future possibilities using a network.

  • Topic 1.2: Discuss the term "host" and the distinction between server-client networks and peer-to-peer networks.

    • Highlight issues in peer-to-peer networks such as unauthorized sharing and resource availability during server downtime.

  • Topic 1.3: Create demonstrations using Packet Tracer to illustrate key concepts like routers and switches, emphasizing the differences between physical and logical topologies using analogies like street maps.

  • Topic 1.4: Engage students by exploring the types of equipment found in their home networks compared to those in larger networks.

  • Topic 1.5: Discuss home internet connection methods and explore transitioning from old dial-up modems to current technologies.

  • Topic 1.6: Introduce Quality of Service (QoS) emphasizing traffic prioritization based on specific needs, such as emergency vehicles on roadways vs. general traffic.

  • Topic 1.7: Encourage student discourse on their Bring Your Own Device (BYOD) trends and how cloud technology plays a role in smart technologies.

  • Topic 1.8: Stimulate discussions on internal threats and their significance relative to external threat concerns.

  • Topic 1.9: Examine the advantages of holding a CCNA certification and its relevance in securing jobs in the networking field.

Module Objectives

The objectives of this module cover various aspects detailing how networks affect daily life and the specifics of networking technologies:

  1. Networks Affect our Lives: Describe how networks shape our day-to-day experiences.

  2. Network Components: Clarify the roles of hosts and network devices.

  3. Network Representations and Topologies: Explain and utilize different representations and topological structures in networks.

  4. Common Types of Networks: Differentiate between key network types that exist today.

  5. Internet Connections: Explore how Local Area Networks (LANs) and Wide Area Networks (WANs) connect to the internet.

  6. Reliable Networks: Discuss the essential requirements for reliable network infrastructures.

  7. Network Trends: Analyze trends such as BYOD and cloud computing and their impact on interaction.

  8. Network Security: Identify common threats and potential solutions for maintaining network security.

  9. The IT Professional: Evaluate job opportunities in networking and the skills required to succeed.

1.1 Networks Affect Our Lives

Communication is fundamental for society and is closely associated with our fundamental needs for survival. Today, networks enable unprecedented levels of connectivity.

1.2 Network Components

Each computer connected to a network is designated as a host or end device. Key roles include:

  • Servers: These computers provide information and resources to end devices, such as email servers, web servers, and file servers.

  • Clients: Devices that send requests to servers for information. For example:

    • An email client accesses messages stored on an email server.

    • A browser retrieves web pages from a web server.

Peer-to-Peer Networks

A peer-to-peer network allows devices to operate both as clients and servers. While easy to establish, it has noteworthy advantages and disadvantages:

  • Advantages:

    • Ease of setup.

    • Lower cost.

  • Disadvantages:

    • No central administration makes security challenging.

    • It is less secure and not suitable for larger setups.

End Devices and Intermediary Devices

End devices are where data originates or terminates. Intermediary devices connect end devices and manage data flow by:

  • Regenerating and retransmitting data signals.

  • Maintaining network pathways.

  • Notifying devices of errors.

Network Media

Data transmission occurs through various media, including:

  • Metal wires (copper): Using electrical impulses.

  • Fiber optics: Employing light pulses for transmitting data.

  • Wireless: Utilizing electromagnetic wave frequencies for communication.

1.3 Network Representations and Topologies

Network Representations

Topology diagrams, or network diagrams, symbolize devices in a network and must cover:

  • Network Interface Card (NIC)

  • Physical Port

  • Interface (note: "port" and "interface" are often interchangeable)

Topological Diagrams

Physical topology diagrams illustrate actual device locations and cabling. In contrast, logical topology diagrams represent device functions and addressing schemes.

1.4 Common Types of Networks

Network Sizes

Networks vary in size, including:

  • Small Home Networks: Connecting a few computers.

  • Small Office/Home Office (SOHO): Linking home or remote offices to corporate networks.

  • Medium to Large Networks: Spanning multiple locations with extensive interconnected devices.

  • World Wide Networks: Such as the internet, connecting numerous computers globally.

LANs and WANs

The two primary types are:

  • Local Area Network (LAN): Covers a limited geographic area.

  • Wide Area Network (WAN): Extends over broader areas.

Internet Structure

The internet is extensive, consisting of interlinked LANs and WANs, employing various technologies for connectivity. Managing agencies include IETF, ICANN, and IAB.

Intranets and Extranets

An intranet is a private network for organizational use while extranets allow secure external access to an organization’s internal data for authorized users.

1.5 Internet Connections

Numerous internet access technologies include broadband cable, DSL, cellular, and satellite, catering to various user needs and bandwidth requirements:

Home and Small Business Connections

Connection Type

Description

Cable

High-speed, always-on service from cable service providers.

DSL

High-speed internet over telephone lines, consistently on.

Cellular

Internet access via cellular networks.

Satellite

Ideal for rural areas, offering access where traditional ISPs are unavailable.

Dial-up

Inexpensive, albeit low-speed connecting method using modems.

Business Connections

Businesses require higher connectivity bandwidth and more robust service agreements than home users:

Connection Type

Description

Dedicated Leased Lines

Reserved private circuits connecting distant locations.

Ethernet WAN

Expands LAN technologies into a WAN setup.

Business DSL

Commercial DSL tailored for business needs.

Satellite

Offered where wired solutions are inadequate.

Converging Network

Organizations can now use a single network infrastructure for voice, video, and data communications, simplifying management and enhancing efficiency.

1.6 Reliable Networks

Characteristics of Network Architecture

Reliable networks need to address four primary characteristics:

  1. Fault Tolerance: Minimizing the impact of failures through redundancy and multiple pathways, utilizing packet switching for data transmission.

  2. Scalability: The ability to grow effortlessly while maintaining service quality.

  3. Quality of Service (QoS): Ensuring reliable delivery of time-sensitive data such as voice and video, managed by router configurations.

  4. Security: Protecting the network and data integrity through various security practices and protocols.

Security Goals

Network security aims for three main goals:

  • Confidentiality: Only authorized parties can access data.

  • Integrity: Ensuring data remains unchanged during transfers.

  • Availability: Guaranteeing data accessibility for authorized users at all times.

1.7 Network Trends

Impactful Trends

Networking roles continually evolve due to:

  1. Bring Your Own Device (BYOD): Users utilize personal devices for professional tasks, broadening accessible information and communication options.

  2. Online Collaboration: Tools like Cisco WebEx facilitate collaborative projects and education.

  3. Video Communications: Enhanced connectivity through video calls and conferencing.

  4. Cloud Computing: Accessing files and apps over the internet through servers, enabling flexibility for individuals and organizations.

Types of Clouds

Different types of cloud services are:

  • Public Clouds: Open to everyone with pay-per-use options.

  • Private Clouds: Restricted to an organization, enhancing privacy.

  • Hybrid Clouds: Combinations of public and private adjustments.

  • Custom Clouds: Tailored for specific needs or industries, maintaining distinct characteristics yet connected by architecture.

1.8 Network Security

Threat Assessment

Network security is crucial across all sizes of networks, identifying threats that can be external (like malware and denial of service) or internal (such as employee errors or lost devices).

Security Solutions

Implementing security requires a multi-layered approach:

  • Basic security components for small networks include antivirus software, firewalls, and monitoring tools.

  • Larger networks necessitate advanced measures such as dedicated firewalls, access control lists, intrusion prevention systems, and VPNs to protect sensitive data and configurations.

1.9 The IT Professional

CCNA Certification and Career Opportunities

The Cisco Certified Network Associate (CCNA) certifies foundational networking knowledge and skill relevance with ongoing tech advancements. The focus of the CCNA includes:

  • IP foundational knowledge

  • Security practices

  • Wireless technologies

  • Network programmability and automation

Students can explore various employment opportunities that demand Cisco certifications through platforms like www.netacad.com, using the Talent Bridge Matching Engine.

Key Takeaways

By studying this module, we recognize several vital aspects, including:

  • Understanding essential networking principles applicable to contemporary workflows.

  • Identifying various network components and infrastructures.

  • Gaining awareness of internet connection types aimed at different needs.

  • Exploring emerging technologies and security practices essential for safeguarding networks in professional environments.

New Terms and Commands

  • Peer-to-Peer File Sharing

  • Small Office/Home Office (SOHO)

  • Server

  • Client

  • End device

  • Intermediary device

  • Network Interface Card (NIC)

  • Physical Port

  • Local Area Network (LAN)

  • Wide Area Network (WAN)

  • Converged networks

  • Fault tolerant network

  • Scalable network

  • Quality of Service (QoS)

  • Bring Your Own Device (BYOD)