Download Chapter 1 Exploring the Network

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net neutrality law wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Wireless security wikipedia , lookup

Peering wikipedia , lookup

Computer security wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Net bias wikipedia , lookup

Computer network wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Network tap wikipedia , lookup

Distributed firewall wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Transcript
Chapter 1
Intro to Routing & Switching
 Networks
have changed how we
communicate

Everyone can connect & share
 How




have networks changed the way…
You learn?
You communicate?
You play?
You work?
 Read
slides 1.1.1.1 - 1.1.1.8
 Complete
Lab - Researching Network
Collaboration Tools on 1.1.18
 You
will use the wiki to keep track of
questions you get wrong on chapter tests
 Form
6 groups
 On
poster paper, draw a picture & use key
words to describe:






Simple small home network
SOHO
Medium-large networks
World-wide network
Client/Server
Peer-to-peer
 Host

Can send & receive messages
 Server


Host with special software
Provides a service, like email or web pages

Email server/web server
 Client


Host with special software
Requests & displays info from a server

PC with web browser to display pages from web server
A
computer can be a client AND a server
 SOHO & home use P2P networks
 Simple
P2P- 2 computers connected
 Multiple
devices with network device to
connect them
 Advantages
 Disadvantages
1.2.1
 Interface
between users & the network
 Host is either source or destination
 Each host has an address to identify it
 Connect
end devices
 Work behind scenes to make data flow
 Network
Access- switches and WAPs
 Internetworking- routers
 Security- firewalls
 Knows
the path
 Finds detour when link fails
 Can prioritize data with Quality of Service
(QoS) priorities

What does this mean?
 Filter

data
Security
 Complete
the handout
 End
device
 Intermediary
 Media
END OF DAY 2
1.2.2, 1.2.3, 1.2.4
The two most common types of network
infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
 Over
a small area
 Connected
networks
 Not owned by anyone

Organizations maintain it & standards
 In
groups of 4
 How
you connect, bandwidth (s, m, f),
device needed, special info
 Cable/fiber
 DSL
 Cellular
 Satellite
 Dial-up

Dedicated leased line
Connection from ISP to
you
 T1 (1.5Mbps) & T3
(44Mbps)


Metro Ethernet


What is it?
DSL
ADSL & SDSL
 18,000ft. over copper


Satellite
Higher cost
 Slower

END OF DAY 3
1.3.1, 1.3.2
 Mapping
the Internet
 To
support all of these methods of
communication, these need to be addresses
to meet user expectations:




Fault Tolerance
Scalability
Quality of Service (QoS)
Security
 Limits
failures
 Quick recovery when failure occurs

One path fails, message takes different path
 Circuit-switched
network
 Packet-switched network
 Grow,
able to support more users & new
applications w/out major changes
 Have
you ever tried to watch a video with
constant breaks and pauses?
 Must provide predictable, measurable, and at
times, guaranteed services

Is packet-switched guaranteed?
 Can

be used on home routers
What has priority? Phone, video game, Internet?
 What
can happen if bad or no security?
 Network
infrastructure security
 Information security
 Ensure
data is kept confidential, data
integrity, data availability
 Complete
the handout
END OF DAY 4
1.4.1, 1.4.2, 1.4.3
 BYOD
 Online
collaboration
 Video communication
 Cloud computing


Access application through online subscription
Store files on network servers online


Kept in data centers (WE HAVE ONE!)
How does this help an IT department & business
 Viruses,
worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour
attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft
 Make
a poster for each, in groups
 Antivirus
 Anti-spyware
 Firewall
 In




filtering
a larger network:
Dedicated firewall system
ACLs
IPS (intrusion prevention system)
VPN
 Complete
 Take
the study guide handout
the quiz on netacad.com
 Jeopardy
review
In this chapter, you learned:
 Networks and the Internet have changed the way
we communicate, learn, work, and even play.

Networks come in all sizes. They can range from
simple networks consisting of two computers, to
networks connecting millions of devices.

The Internet is the largest network in existence.
In fact, the term Internet means a ‘network of
networks. The Internet provides the services
that enable us to connect and communicate with
our families, friends, work, and interests.

The network infrastructure is the platform that
supports the network. It provides the stable and
reliable channel over which communication can
occur. It is made up of network components
including end devices, intermediate device, and
network media.

Networks must be reliable.

Network security is an integral part of computer
networking, regardless of whether the network is
limited to a home environment with a single
connection to the Internet, or as large as a
corporation with thousands of users.
 The
network infrastructure can vary greatly
in terms of size, number of users, and
number and types of services that are
supported on it. The network infrastructure
must grow and adjust to support the way the
network is used. The routing and switching
platform is the foundation of any network
infrastructure.
Chapter 1
Intro to Routing & Switching