235032 computer networks - university of phayaoict.up.ac.th/skchatri/subject14/chapter1 network...

37
© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 1 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 1 1 235032 Computer Networks School of ICT, University of Phayao Dr.Sukchatri PRASOMSUK ITE PC v4.1 Chapter 1 2 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ดร.สุขชาตรี ประสมสุข (Dr.Sukchatri PRASOMSUK) D.(Computational Linguistics), INALCO, Paris, FR M.Eng.(IT), & Grad.Dip. In Applied IS, RMIT, Melbourne, AU B.Sc.(คณิตศาสตร์ ), .รามคําแหง เคยทํางานที: DATA SOLVE Co.,Ltd. Central Trading Co.,Ltd กรมวิทยาศาสตร์บริการ กระทรวงวิทย์ฯ .หอการค้า และ .แม่ฟ้าหลวง Contact : [email protected] Notes/Slides Download: http://www.ict.up.ac.th/skchatri/ About Lecturer

Upload: others

Post on 18-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

1

© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco PublicITE PC v4.1Chapter 1 1

235032 Computer Networks

School of ICT, University of Phayao

Dr.Sukchatri PRASOMSUK

ITE PC v4.1Chapter 1 2© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public

ดร.สขุชาตร ีประสมสขุ (Dr.Sukchatri PRASOMSUK)

D.(Computational Linguistics), INALCO, Paris, FR

M.Eng.(IT), & Grad.Dip. In Applied IS, RMIT, Melbourne, AU

B.Sc.(คณติศาสตร)์, ม.รามคําแหง

เคยทํางานที ่: DATA SOLVE Co.,Ltd. Central Trading Co.,Ltd

กรมวทิยาศาสตรบ์รกิาร กระทรวงวทิยฯ์ม.หอการคา้ และ ม.แมฟ้่าหลวง

Contact : [email protected]

Notes/Slides Download:http://www.ict.up.ac.th/skchatri/

About Lecturer

Page 2: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

2

ITE PC v4.1Chapter 1 3© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public

Assesment : Class (Lec.& LAB) 10 %Lab 20 % Cisco Exam 20 %Mid-Term Exam 25%Final-Term Exam 25%

Grading :A 80 – 100B+ 75-79B 70-74C+ 65-69C 60-64D+ 55-54D 50-54F 0-49

ITE PC v4.1Chapter 1 4© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public

CCNA Certification All-in-One for Dummies, by Silviu Angelescu, Wiley Publishing Inc., 2010

Networking for Dummies, 10th edition, by Doug Lowe, Wiley Publishing Inc., 2013

Network Fundamentals, CCNA Exploration Guide, Mark A. Dye, Rick McDonald, Antoon W. Rufi, Cisco Press, 2008

Data Communications and Networikng, 6th edition, William Stalling, 2002

Network+, Computing Technology Industry Association, Syngress, Osborne, McGrawHill, 1999

Cabling : The Complete Guide to Network Wiring, 2nd Edition, David Groth, Sybex, 2001

Text Books

Page 3: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

3

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5

Exploring the Network & Hierarchical Network Design

Chapter 1

Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Objectives

After completing this chapter, students will be able to:

Explain how multiple networks are used in everyday life.

Explain the topologies and devices used in a small- to medium-sized business network.

Explain the basic characteristics of a network that supports communication in a small- to medium-sized business.

Explain trends in networking that will affect the use of networks in small to medium-sized businesses.

Page 4: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

4

Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 1

1.1 Globally Connected1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform1.4 The Changing Network Environment1.5 Hierarchical Network Design Overview

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8

Globally Connected

Page 5: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

5

Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Networking TodayNetworks in Our Past and Daily Lives

Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Networking TodayThe Global Community

Page 6: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

6

Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Interconnecting Our LivesNetworking Impacts in Our Daily Lives

Networks support the way we learn.

Networks support the way we communicate.

Networks support the way we work.

Networks support the way we play.

Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Providing Resources in a NetworkNetworks of Many Sizes

Page 7: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

7

Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Providing Resources in a NetworkClients and Servers

Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Providing Resources in a NetworkPeer-to-Peer

Page 8: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

8

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15

LANs, WANs, and the Internet

Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LANs, WANs, and InternetsComponents of a Network

There are three categories of network components:

Devices

Media

Services

Page 9: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

9

Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Components of a NetworkEnd Devices

Some examples of end devices are:

Computers (work stations, laptops, file servers, web servers)

Network printers

VoIP phones

TelePresence endpoint

Security cameras

Mobile handheld devices (such as smart phones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)

Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Components of a NetworkNetwork Infrastructure Devices

Examples of intermediary network devices are:

Network Access Devices (switches, and wireless access points)

Internetworking Devices (routers)

Security Devices (firewalls)

Page 10: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

10

Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Components of a NetworkNetwork Media

Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Components of a NetworkNetwork Representations

Page 11: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

11

Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Components of a NetworkTopology Diagrams

Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LANs and WANsTypes of Networks

The two most common types of network infrastructures are:

Local Area Network (LAN)

Wide Area Network (WAN).

Other types of networks include:

Metropolitan Area Network (MAN)

Wireless LAN (WLAN)

Storage Area Network (SAN)

Page 12: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

12

Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LANs and WANsLocal Area Networks (LAN)

Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LANs and WANsWide Area Networks (WAN)

Page 13: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

13

Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LANs, WANs, and the InternetThe Internet

Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LANs, WANs, and the Internet

Intranet and Extranet

Page 14: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

14

Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Connecting to the InternetConnecting Remote Users to the Internet

Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Connecting to the InternetConnecting Businesses to the Internet

Page 15: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

15

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29

The Network as a Platform

Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Converged NetworksThe Converging Network

Page 16: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

16

Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Converged NetworksPlanning for the Future

Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Reliable NetworkSupporting Network Architecture

As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:

Fault Tolerance

Scalability

Quality of Service (QoS)

Security

Page 17: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

17

Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Reliable NetworkFault Tolerance in Circuit Switched Network

Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Reliable NetworkPacket-Switched Networks

Page 18: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

18

Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Reliable NetworkScalable Networks

Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Reliable NetworkProviding QoS

Examples of priority decisions for an organization might include:

Time-sensitive communication - increase priority for services like telephony or video distribution.

Non time-sensitive communication - decrease priority for web page retrieval or email.

High importance to organization - increase priority for production control or business transaction data.

Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

Page 19: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

19

Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Reliable NetworkProviding Network Security

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38

The Changing Network Environment

Page 20: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

20

Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network TrendsNew trends

Some of the top trends include:

Bring Your Own Device (BYOD)

Online collaboration

Video

Cloud computing

Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network TrendsBring Your Own Device (BYOD)

The concept of any device, to any content, in anyway is a major global trend that requires significant changes to the way devices are used.

This trend is known as Bring Your Own Device (BYOD).

Page 21: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

21

Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network TrendsOnline Collaboration

Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network TrendsVideo Communication

Page 22: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

22

Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network TrendsCloud Computing

Cloud computing offers the following potential benefits:

Organizational flexibility

Agility and rapid deployment

Reduced cost of infrastructure

Refocus of IT resources

Creation of new business models

Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network TrendsData Centers

A data center is a facility used to house computer systems and associated components including:

Redundant data communications connections

High-speed virtual servers (sometimes referred to as server farms or server clusters)

Redundant storage systems (typically uses SAN technology)

Redundant or backup power supplies

Environmental controls (e.g., air conditioning, fire suppression)

Security devices

Page 23: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

23

Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Networking Technologies for the HomeTechnology Trends in the Home

Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Networking Technologies for the HomePowerline Networking

Page 24: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

24

Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Networking Technologies for the HomeWireless Broadband

Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Future of NetworkingNetwork Security

Page 25: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

25

Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network SecuritySecurity Threats

The most common external threats to networks include:

Viruses, worms, and Trojan horses

Spyware and adware

Zero-day attacks, also called zero-hour attacks

Hacker attacks

Denial of service (DoS) attacks

Data interception and theft

Identity theft

Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network SecuritySecurity Solutions

Network security components often include:

Antivirus and antispyware

Firewall filtering

Dedicated firewall systems

Access control lists (ACL)

Intrusion prevention systems (IPS)

Virtual Private Networks (VPNs)

Page 26: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

26

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 51

Network Media

Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper CablingCharacteristics of Copper Media

Page 27: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

27

Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper CablingCopper Media

Shielded Twisted Pair (STP) Cable

Unshielded Twisted Pair (UTP) Cable

Coaxial Cable

Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper CablingUTP Cable

Page 28: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

28

Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper CablingSTP Cable

Foil Shields

Braided or Foil Shield

Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper CablingCoaxial Cable

Page 29: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

29

Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper CablingCooper Media Safety

Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP CablingProperties of UTP CablingUTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered that they can limit the negative effect of crosstalk by:

Cancellation

Varying the number of twists per wire pair

Page 30: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

30

Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP CablingUTP Cabling Standards

Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP CablingUTP Connectors

Page 31: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

31

Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP CablingTypes of UTP Cable

Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP CablingTesting UTP Cables

After installation, a UTP cable tester should be used to test for the following parameters:

Wire map

Cable length

Signal loss due to attenuation

Crosstalk

Page 32: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

32

Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic CablingProperties of Fiber Optic CablingFiber-optic cabling is now being used in four types of industry:

Enterprise Networks

Fiber-to-the-home (FTTH) and Access Networks

Long-Haul Networks

Submarine Networks

Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic CablingFiber Media Cable Design

Page 33: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

33

Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic CablingTypes of Fiber Media

Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic CablingNetwork Fiber Connectors

Page 34: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

34

Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic CablingTesting Fiber Cables

Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic CablingFiber versus Copper

Implementation Issues Copper Media Fibre Optic

Bandwidth Supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps

Distance Relatively short(1 – 100 meters)

Relatively High(1 – 100,000 meters)

Immunity To EMI And RFI Low High(Completely immune)

Immunity To Electrical Hazards Low High(Completely immune)

Media And Connector Costs Lowest Highest

Installation Skills Required Lowest Highest

Safety Precautions Lowest Highest

Page 35: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

35

Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Wireless MediaProperties of Wireless MediaWireless does have some areas of concern including:

Coverage area

Interference

Security

Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

• IEEE 802.11 standards• Commonly referred to as Wi-Fi.• Uses CSMA/CA• Variations include:

• 802.11a: 54 Mbps, 5 GHz• 802.11b: 11 Mbps, 2.4 GHz• 802.11g: 54 Mbps, 2.4 GHz• 802.11n: 600 Mbps, 2.4 and 5 GHz• 802.11ac: 1 Gbps, 5 GHz• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz

• IEEE 802.15 standard• Supports speeds up to 3 Mb/s• Provides device pairing over distances from 1 to 100

meters.

• IEEE 802.16 standard• Provides speeds up to 1 Gbps• Uses a point-to-multipoint topology to provide

wireless broadband access.

Wireless MediaTypes of Wireless Media

Page 36: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

36

Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Wireless MediaWireless LAN

Cisco Linksys EA6500 802.11ac Wireless Router

Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Wireless Media802.11 Wi-Fi Standards

Standard Maximum Speed Frequency Backwards

Compatible

802.11a 54 Mbps 5 GHz No

802.11b 11 Mbps 2.4 GHz No

802.11g 54 Mbps 2.4 GHz 802.11b

802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g

802.11ac 1.3 Gbps(1300 Mbps)

2.4 GHz and 5.5 GHz 802.11b/g/n

802.11ad 7 Gbps(7000 Mbps)

2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac

Page 37: 235032 Computer Networks - University of Phayaoict.up.ac.th/skchatri/subject14/Chapter1 Network Overview.pdf© 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr 2

© 2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr

37

Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Exploring the NetworkingSummary

In this chapter, you learned:

Networks and the Internet have changed the way we communicate, learn, work, and even play.

Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.

The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.

The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate devices, and network media.

Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Exploring the NetworkingSummary (cont.)

In this chapter, you learned:

Networks must be reliable.

Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.

The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.