M2 L1

Module 1: Networking Today

Introduction to Networks v7.0 (ITN)

Module Objectives
  • Module Title: Networking Today
    Module Objective: Explain the advances in modern technologies.

  • Topic Objectives:

    • Networks Affect our Lives: Explain how networks affect our daily lives.

    • Network Components: Explain how host and network devices are used.

    • Network Representations and Topologies: Explain network representations and how they are used in network topologies.

    • Common Types of Networks: Compare the characteristics of common types of networks.

    • Internet Connections: Explain how LANs and WANs interconnect to the internet.

    • Reliable Networks: Describe the four basic requirements of a reliable network.

    • Network Trends: Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact.

    • Network Security: Identify some basic security threats and solutions for all networks.

    • The IT Professional: Explain employment opportunities in the networking field.


1.1 Networks Affect Our Lives

  • Importance of Communication:

    • Communication is vital, nearly as essential as air, water, food, and shelter.

    • In the modern world, networks connect individuals more than ever, facilitating interactions and access to information.


1.2 Network Components

Host Roles
  • Hosts/End Devices:

    • Definition: Every computer on a network is called a host or end device.

    • Servers:

    • Provide information to end devices.

      • Types of Servers:

      • Email Servers: Run email software; clients use software to access emails.

      • Web Servers: Run web software; clients access web pages using browsers.

      • File Servers: Store files for access by client devices.

Peer-to-Peer Networks
  • Definition: A device can be both a client and a server in a peer-to-peer network, which is only recommended for small networks.

  • Advantages:

    • Easy to set up

    • Lower cost

  • Disadvantages:

    • No centralized administration

    • Not scalable

    • Slower performance

  • Common Uses: Simple tasks like file transfers and sharing printers.

End Devices
  • Definition: An end device is the origin or destination point of a message.

  • Operation: Data flows from an end device through the network and back to another end device.

Intermediary Network Devices
  • Definition: Intermediary devices connect end devices.

  • Examples:

    • Switches, wireless access points, routers, and firewalls.

  • Roles:

    • Manage data flow

    • Regenerate/retransmit data

    • Maintain routing and error notification.

Network Media
  • Medium for Communication: Allows messages to travel from source to destination.

  • Types of Media:

    • Metal Wires: Uses electrical impulses.

    • Fiber-Optic Cables: Uses pulses of light.

    • Wireless Transmission: Uses electromagnetic waves.

Understanding Check Questions
  • Q1: Name for all computers in a network that communicate? A: Hosts

  • Q2: Media used when data is encoded as pulses of light? A: Fiber-optic cable

  • Q3: Which are intermediary devices? A: Switches & Routers


1.3 Network Representations and Topologies

Network Representations
  • Network Diagrams: Use symbols to represent devices within the network.

  • Symbols Include:

    • Network Interface Card (NIC)

    • Physical Port

  • Port and Interface: Often used interchangeably.

Topology Diagrams
  • Physical Topology Diagrams: Show the actual location of devices and the cabling layout.

  • Logical Topology Diagrams: Illustrate devices, ports, and addressing schemes.

Understanding Check Questions
  • Q1: What shows connections of end devices to intermediary devices? A: Logical topology

  • Q2: What shows the actual location of devices? A: Physical topology


1.4 Common Types of Networks

Overview of Networks
  • Small Home Networks: Connect a few computers to each other and the Internet.

  • Small Office/Home Office (SOHO): Connects remote offices to corporate networks.

  • Medium to Large Networks: Many interconnected computers across various locations.

  • World Wide Networks: Such as the internet, connecting millions of computers globally.

LANs and WANs
  • Local Area Network (LAN): Spans a small geographic area, administered by a single organization.

  • Wide Area Network (WAN): Spans a large geographic area and typically requires one or more service providers.

Key Differences:
  • LANs: High-speed bandwidth, limited area, managed internally.

  • WANs: Slower speed links, broader coverage, typically managed by service providers.

The Internet
  • Definition: A worldwide collection of interconnected LANs and WANs.

  • Connection Mechanism: LANs connect through WANs, employing various media types (copper, fiber optics, wireless).

  • Governance Groups: Include IETF, ICANN, and IAB to maintain structure.

Intranets and Extranets
  • Intranet: A private network accessible only within the organization.

  • Extranet: Provides secure access to outside users needing organizational data.

Understanding Check Questions
  • Q1: Which type of network provides access in small areas? A: LAN

  • Q2: Which network provides secure access for external users? A: Extranet


1.5 Internet Connections

Internet Access Technologies
  • Methods for Internet Connection:

    • Home/Small Office Options: Broadband cable, DSL, wireless WANs, mobile services.

    • Enterprise Needs: Require faster connections for IP phones, video conferencing.

Home Internet Connections
  • Connection Types:

    • Cable: High bandwidth, always on, provided by cable TV services.

    • DSL: Runs over telephone lines, also high bandwidth.

    • Cellular: Uses cell networks for internet access.

    • Satellite: Suitable for rural areas lacking ISPs.

    • Dial-up: Low-cost, low bandwidth option using modems.

Business Internet Connections
  • Enterprise Requirements: Higher bandwidth, dedicated connections.

  • Types of Enterprise Connections:

    • Dedicated Leased Lines: Reserved circuits for private networking.

    • Ethernet WAN: Extends LAN access technology into WANs.

The Converging Network
  • Old Method: Separate networks for telephone, video, and data, using distinct technologies.

  • New Method: Converged networks carry multiple services over one link (data, voice, video) using the same infrastructure.


1.6 Reliable Networks

Network Architecture
  • Definition: Technologies supporting data movement across networks; must address user expectations.

  • Basic Requirements:

    • Fault Tolerance: Minimizes impact of failures.

    • Scalability: Allows for quick expansion without performance loss.

    • Quality of Service (QoS): Ensures reliable delivery of content.

    • Security: Protects data integrity and access.

Fault Tolerance
  • Definition: Limits the impact of failures through redundancy.

  • Implementation: Packet-switching allows packets to take multiple paths to their destination, unlike circuit-switching which uses dedicated circuits.

Scalability
  • Definition: Ability to expand easily to accommodate new users without diminishing service.

  • Design Principles: Follow established standards and protocols to ensure scalability.

Quality of Service (QoS)
  • Importance: Essential for applications requiring high performance like live video and voice.

  • Mechanism: QoS policies allow routers to manage data flow effectively, prioritizing voice during congestion.

Network Security
  • Types:

    • Infrastructure Security: Protect network devices physically and logically.

    • Information Security: Protect data integrity during transmission.

  • Goals:

    • Confidentiality: Ensures only intended recipients can access data.

    • Integrity: Ensures data is unaltered during transit.

    • Availability: Provides timely access to data for authorized users.

Understanding Check Questions
  • Q1: Which characteristic is achieved by following accepted standards? A: Scalability

  • Q2: What are the three goals of network security? A: Confidentiality, Integrity, Availability

  • Q3: What allows a router to manage data flow and prioritize voice? A: QoS

  • Q4: Multiple paths to a destination is known as what? A: Fault tolerance


1.7 Network Trends

Recent Trends in Networking
  • Adaptation Needs: Networks must continuously evolve to support new technologies and devices entering the market.

  • Examples of Trends:

    • Bring Your Own Device (BYOD)

    • Online Collaboration

    • Video Communications

    • Cloud Computing

Bring Your Own Device (BYOD)
  • Definition: Users allowed to use personal devices for work, enhancing flexibility and opportunities.

  • Device Types:

    • Laptops, tablets, smartphones, etc.

Online Collaboration
  • Importance: Enables users to work together on projects via collaboration tools like Cisco WebEx.

  • Features of Cisco WebEx Teams:

    • Instant messaging, image sharing, video links, etc.

Video Communications
  • Capabilities: Allows video calls irrespective of location, becoming essential for collaboration.

  • Example: Cisco TelePresence.

Cloud Computing
  • Functionality: Enables storage and access of files via the internet, allowing businesses global delivery capabilities.

  • Support: Made possible by data centers which allow smaller companies to lease resources.

  • Cloud Types:

    • Public Clouds: Open access, pay-per-use.

    • Private Clouds: Exclusive to specific organizations.

    • Hybrid Clouds: Combined custom and public elements.

    • Custom Clouds: Tailored to particular industries.

Technology Trends in the Home
  • Smart Home Integration: Appliances integrating technology for interconnectivity and automation (e.g., smart ovens).

Powerline Networking
  • Definition: Allows devices to connect to LAN via electrical outlets using standard adapters.

  • Use Cases: Beneficial where traditional wireless access fails.

Wireless Broadband
  • WISP: Connects homes in rural areas to the internet using wireless technology.

  • Installation: Requires an antenna for connectivity.


1.8 Network Security

Security Threats
  • Importance: Security is critical across all network sizes.

  • Environment Considerations: Security should effectively protect data while maintaining quality of service.

External Threats Include:
  • Viruses, worms, Trojan horses

  • Spyware and adware

  • Zero-day attacks

  • Denial of service attacks

  • Data interception and theft

  • Identity theft

Internal Threats Include:
  • Lost or stolen devices

  • Accidental misuse by employees

  • Malicious actions from employees

Security Solutions
  • Layered Security Approach: Requires multiple security strategies for efficacy.

  • Home/SOHO Requirements: Endpoint antivirus, antispyware, and firewall filtering.

  • Larger Networks Additional Needs: Dedicated firewalls, Access Control Lists (ACL), Intrusion Prevention Systems (IPS), Virtual Private Networks (VPN).


1.9 The IT Professional

Cisco Certified Network Associate (CCNA)
  • CCNA Certification: Validates foundational knowledge of networking technologies and ensures relevance amid advancing technologies.

  • New CCNA Focus Areas:

    • IP foundation and security

    • Wireless, Virtualization, Automation, Network Programmability.

  • DevNet Certifications: Validate software development skills across associate, specialist, and professional levels.

Networking Job Opportunities
  • Resource: www.netacad.com/vocations

  • Talent Bridge Matching Engine: A tool to locate jobs with Cisco and partners for students and alumni.