* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 1 Exploring the Network
Net neutrality law wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer network wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Network tap wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Chapter 1 Intro to Routing & Switching Networks have changed how we communicate Everyone can connect & share How have networks changed the way… You learn? You communicate? You play? You work? Read slides 1.1.1.1 - 1.1.1.8 Complete Lab - Researching Network Collaboration Tools on 1.1.18 You will use the wiki to keep track of questions you get wrong on chapter tests Form 6 groups On poster paper, draw a picture & use key words to describe: Simple small home network SOHO Medium-large networks World-wide network Client/Server Peer-to-peer Host Can send & receive messages Server Host with special software Provides a service, like email or web pages Email server/web server Client Host with special software Requests & displays info from a server PC with web browser to display pages from web server A computer can be a client AND a server SOHO & home use P2P networks Simple P2P- 2 computers connected Multiple devices with network device to connect them Advantages Disadvantages 1.2.1 Interface between users & the network Host is either source or destination Each host has an address to identify it Connect end devices Work behind scenes to make data flow Network Access- switches and WAPs Internetworking- routers Security- firewalls Knows the path Finds detour when link fails Can prioritize data with Quality of Service (QoS) priorities What does this mean? Filter data Security Complete the handout End device Intermediary Media END OF DAY 2 1.2.2, 1.2.3, 1.2.4 The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) Over a small area Connected networks Not owned by anyone Organizations maintain it & standards In groups of 4 How you connect, bandwidth (s, m, f), device needed, special info Cable/fiber DSL Cellular Satellite Dial-up Dedicated leased line Connection from ISP to you T1 (1.5Mbps) & T3 (44Mbps) Metro Ethernet What is it? DSL ADSL & SDSL 18,000ft. over copper Satellite Higher cost Slower END OF DAY 3 1.3.1, 1.3.2 Mapping the Internet To support all of these methods of communication, these need to be addresses to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security Limits failures Quick recovery when failure occurs One path fails, message takes different path Circuit-switched network Packet-switched network Grow, able to support more users & new applications w/out major changes Have you ever tried to watch a video with constant breaks and pauses? Must provide predictable, measurable, and at times, guaranteed services Is packet-switched guaranteed? Can be used on home routers What has priority? Phone, video game, Internet? What can happen if bad or no security? Network infrastructure security Information security Ensure data is kept confidential, data integrity, data availability Complete the handout END OF DAY 4 1.4.1, 1.4.2, 1.4.3 BYOD Online collaboration Video communication Cloud computing Access application through online subscription Store files on network servers online Kept in data centers (WE HAVE ONE!) How does this help an IT department & business Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft Make a poster for each, in groups Antivirus Anti-spyware Firewall In filtering a larger network: Dedicated firewall system ACLs IPS (intrusion prevention system) VPN Complete Take the study guide handout the quiz on netacad.com Jeopardy review In this chapter, you learned: Networks and the Internet have changed the way we communicate, learn, work, and even play. Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices. The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests. The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media. Networks must be reliable. Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users. The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure. Chapter 1 Intro to Routing & Switching