Вы находитесь на странице: 1из 70

Chapter 1:

Exploring the Network

Principles of Networking

Chapter 1: Objectives
Students will be able to:
Explain how multiple networks are used in
everyday life.
Explain the topologies and devices used in a small
to medium-sized business network.
Explain the basic characteristics of a network that
supports communication in a small to mediumsized business.
Explain trends in networking that will affect the use
of networks in small to medium-sized businesses.

Chapter 1

1.1
1.2
1.3
1.4
1.5

Globally Connected
LANs, WANs, and the Internet
The Network as a Platform
The Changing Network Environment
Summary

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

1. Introduction to Network

1. Introduction to Network
A communication network is a set of
Devices (routers, switches, modem, base station,
access point, etc.),
Links (wired: fiber, copper; wireless),
Algorithms, and
Protocols

by which end-user equipment attached to the


network can exchange meaningful information

1. Introduction to Network
Communication: transfer of information between
entities
Information: data plus meaning
Role of Computers in Communication
As users - main sources and sinks for info and data
As providers - used to implement switching nodes,
controllers, concentrators, protocol translators, etc

1. Introduction to Network
Data Representation
1. Text [represent as bit pattern sequence of bits( 0s or 1s)]
ASCII by ANSI (7 bits)
Extended ASCII (8 bits extra 0 at left)
Unicode (16 bits)
ISO (32 bits)

2. Numbers
3. Images composed of a matrix of pixels (picture elements)
small dots
Size of pixel depends on resolution

4. Audio sound
5. Video continuous images

. Introduction to Network

1. Introduction to Network

1. Introduction to Network

1. Introduction to Network
Networks of Many Sizes

1. Introduction to Network
Components of a Network

There are three categories of network components:


Devices
Media
Services

1. Introduction to Network
Network Infrastructure Devices

Examples of intermediary network devices are:


Network Access Devices (switches, and wireless
access points)
Internetworking Devices (routers)
Security Devices (firewalls)

1. Introduction to Network
End Devices

Some examples of end devices are:


Computers (work stations, laptops, file servers, web
servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and
barcode scanners)

1. Introduction to Network
Network Representations

1. Introduction to Network
Network Media

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for
communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

2. Network Platform for communications


Networks in Our Past and Daily Lives

2. Network Platform for communications


Networking impacts in our daily lives

Networks Support the Way We Learn


Networks Support the Way We Communicate
Networks Support the Way We Work
Networks Support the Way We Play

2. Network Platform for communications


Distributed Processing

Definition a task is divided among multiple


computers, each will have their own system
processing, and at the end result will be
delivered/compile to each other, so that is where
we need a NETWORK.
One workstation is a subset to another
workstation.

2. Network Platform for communications


Network Criteria

Performance
i.e:- transmit time, response time
Evaluated by metrics: throughput and delay

Reliability
i.e:- frequency of failure, time to recover failure and
network robustness in catastrophe (devastation)

Security
Examples:
protect data from unauthorized access (hackers)
Protect data from damage and development
Implement policies and procedure for data recovery

2. Network Platform for communications


Clients and Servers

2. Network Platform for communications


Peer-to-Peer

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

3. Network Topology
Categories of Topology

Topology
Mesh

Star

Bus

Ring

3. Network Topology
Mesh Topology

3. Network Topology
Star Topology

3. Network Topology
Bus Topology

3. Network Topology
Bus Topology

Advantage:Ease of installation
Cheapest topology to implement
Failure of one station does not affect others
Less expensive due to less footage of cabling
and no network hubs
Good for smaller networks not requiring
higher speeds

3. Network Topology
Bus Topology

Disadvantage: Difficult reconnection and fault isolation


Not meant to be used as a stand-alone solution in a large
building
Limited in size and speed
Difficult to troubleshoot
Difficult to administer/troubleshoot
A cable break can disable the entire network; no
redundancy
Maintenance costs may be higher in the long run
Performance degrades as additional computers are added

3. Network Topology
Ring Topology

3. Network Topology
Ring Topology

Advantage: Ease to install and reconfigure


Can create much larger network using Token
Ring
Growth of system has minimal impact on
performance
All stations have equal access

3. Network Topology
Ring Topology

Disadvantage: Moves, adds and changes of devices can affect the


network
Network adapter cards and Multi Access Unit
(MAU)'s are much more
expensive than Ethernet cards and hubs
Much slower than an Ethernet network under
normal load
Failure of one computer may impact others
Complex

3. Network Topology
Topology Diagrams
Physical Topology
The shape of the cabling layout
used to link devices of the
network.
the layout of cabling, the
locations of nodes, and the
interconnections between the
nodes and the cabling.
determined by the capabilities
of the network access devices
and media, the level of control
or fault tolerance desired, and
the cost associated with
cabling or telecommunications
circuits.

3. Network Topology
Topology Diagrams
Logical Topology
is the way that the signals act on the
network media, or the way that the
data passes through the network from
one device to the next without regard
to the physical interconnection of the
devices.
is not necessarily the same as its
physical topology.
For example, the original
twisted pair Ethernet using
repeater hubs was a logical bus
topology with a physical star topology
layout. Token Ring is a logical ring
topology, but is wired a physical star
from the Media Access Unit.

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

4. LANs, MANs, WANs and Internet


Types of Networks

The two most common types of network


infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)

4. LANs, MANs, WANs and Internet


LAN

4. LANs, MANs, WANs and Internet


WAN

4. LANs, MANs, WANs and Internet


The Internet

The Internet

Intranet and Extranet

Connecting to the Internet

Connecting Remote Users to the Internet

Connecting to the Internet

Connecting Businesses to the Internet

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

Converged Networks

The Converging Network

Converged Networks

Planning for the Future

Reliable Network

Supporting Network Architecture


As networks evolve, we are discovering that there
are four basic characteristics that the underlying
architectures need to address in order to meet user
expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security

Reliable Network

Fault Tolerance in Circuit Switched Network

Reliable Network

Packet-Switched Networks

Reliable Network

Scalable Networks

Reliable Network

Providing (QoS)
Examples of priority decisions for an organization might
include:
Time-sensitive communication - increase priority for
services like telephony or video distribution.
Non time-sensitive communication - decrease priority
for web page retrieval or email.
High importance to organization - increase priority for
production control or business transaction data.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment

Reliable Network

Providing Network Security

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

Network Trends

New trends
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video
Cloud computing

Network Trends

Bring Your Own Device (BYOD)

Network Trends

Online Collaboration

Network Trends

Video Communication

Network Trends

Cloud Computing
There are four primary types of clouds:
Public clouds
Private clouds
Custom clouds
Hybrid clouds

Network Trends

Data Centers
A data center is a facility used to house computer systems
and associated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as
server farms or server clusters)
Redundant storage systems (typically uses SAN
technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire
suppression)
Security devices

Networking Technologies for the Home

Technology Trends in the Home

Networking Technologies for the Home

Powerline Networking

Networking Technologies for the Home

Wireless Broadband

Exploring the Network


1.
2.
3.
4.
5.
6.
7.

Introduction to Network
Network Platform for communications
Network Topology
LANs, MANs, WANs and Internet
Converged Network
Network Trends
Network Security

Future of Networking

Network Security

Network Security

Security Threats
The most common external threats to networks
include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft

Network Security

Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)

Exploring the Networking

Summary
In this chapter, you learned:
Networks and the Internet have changed the way we
communicate, learn, work, and even play.
Networks come in all sizes. They can range from simple
networks consisting of two computers, to networks
connecting millions of devices.
The Internet is the largest network in existence. In fact,
the term Internet means a network of networks. The
Internet provides the services that enable us to connect
and communicate with our families, friends, work, and
interests.

Exploring the Networking

Summary
In this chapter, you learned:
The network infrastructure is the platform that supports the
network. It provides the stable and reliable channel over
which communication can occur. It is made up of network
components including end devices, intermediate device, and
network media.
Networks must be reliable.
Network security is an integral part of computer networking,
regardless of whether the network is limited to a home
environment with a single connection to the Internet, or as
large as a corporation with thousands of users.

Exploring the Networking

Summary
In this chapter, you learned:
The network infrastructure can vary greatly in
terms of size, number of users, and number and
types of services that are supported on it. The
network infrastructure must grow and adjust to
support the way the network is used. The routing
and switching platform is the foundation of any
network infrastructure.

Вам также может понравиться