network fundamentals chapter 1 modified by profs. chen and cappellino

36
Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Post on 21-Dec-2015

227 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Network FundamentalsChapter 1Modified by Profs. Chen and Cappellino

Page 2: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Objectives In this chapter, you will learn to:

Describe how networks impact our daily lives. Describe the role of data networking in the human

network. Identify the key components of any data network. Identify the opportunities and challenges posed by

converged networks. Describe the characteristics of network

architectures: fault tolerance, scalability, quality of service and security.

Install and use IRC clients and a Wiki server.

Page 3: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Networks supporting the way we live

____________________________ continues to increase in importance

Methods that we use to share ideas and information are constantly changing and evolving.

Early data networks were limited to exchanging character-based information between connected computer systems.

Current networks have evolved to carry _________ _______________________________ between many different types of devices.

Communications between networks almost ____________

Page 4: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

The Global Community Technology has helped bring about

significant change How? Examples:

_______________ communities used for exchange of ideas and information

potential to increase productivity Internet can be used to:

Run businesses, Inform of/Address emergencies Support education, science, and government etc

Page 5: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Popular Communication Tools _____________________ _____________________

Weblogs are web pages that are easy to update and edit by anyone

Allows people to express there opinions ______________________

Wikis are web pages that groups of people can edit and view together. Whereas a blog is more of an personal journal.

Example: Wikipedia _______________________

Podcasting is an audio-based medium The audio file is placed on a website where others can download it and

play the recording ______________________

Collaboration tools give people -from all locations -the opportunity to work together on shared documents.

Page 6: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Networks Supporting the way we learn Courses delivered using network or

Internet resources are often called _________________ experiences, or ______________.

The Cisco Networking Academy Program, is an example of a global online learning experience.

E-learning, in the business world, increasing in acceptance as a means to provide efficient and cost-effective employee training

What are some benefits of e-learning?

Page 7: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Networks Supporting the way we work Initially, data networks were used by businesses to

manage to company’s ___________ info Today, networks provide a greater __________

between related functions and between different organizations

______________: ________________ in use by just ________ company

enables the company to communicate with employees ______________ in branch locations.

_________, or extended internetworks: to _______ ______________ (ie: suppliers, vendors, and customers) limited and “need to know only” _________ to corporate data

Page 8: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

What is communication? Establishing the Rules Before beginning to communicate with each other,

we establish rules _______________________________________ ___________________________

Among the protocols that govern successful human communication are:

An __________ sender and receiver___________________ method of communicating (face-to-face, telephone, letter, photograph)

_________________ and grammar________________________ of deliveryConfirmation or ________________ requirements

The same basic techniques govern network communications

Page 9: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Quality of communications There are different factors governing the success of

communication through a network External Factors

_______________Complexity of network The _____________________ between the sender and the recipient The number of times the message has to be ___________________ The number of other messages being transmitted simultaneously on

the communication network The _______________________ for successful communication

Internal factors affecting the successful communication across the network include:

The size of the message Large messages may be interrupted or delayed at different points within the

network. The importance of the message

A message with a low importance or priority could be dropped if the network becomes overloaded.

NOTE: _____________________________ used to refer web pages, e-mail and other forms of communications

Page 10: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Communicating over networks Successful communication relies on a web of

interconnected networks. All networks have four basic elements in common:

______________ agreements or protocols to govern how the messages are sent, directed, received and interpreted

The ___________ or units of information that travel from one device to another

_________________ such as the cabling- that can transport the messages from one device to another

_________________ on the network that exchange messages with each other

The _____________ of the various elements of the network enables equipment and devices ______________________________________

Page 11: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Elements of a network

In this course, we will learn about a variety of messages, devices, media, and services that allow the communication of those messages.

We will also learn about the __________________, that tie these network elements together.

Page 12: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Elements of a network cont. Icons are commonly used to

represent networking devices.

Shown are some common devices which often originate messages that comprise our communication.

Exs: computers, servers, IP phones.

On local area networks these devices are typically connected by LAN media (wired or wireless).

Page 13: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Elements of a network cont. Shown are some of the most

common intermediate devices, used to direct and manage messages across the network. __________ - the most common

device for interconnecting local area networks

_________ - provides security to networks

_________________ - helps direct messages as they travel across a network

________________ - a specific type of router often found in home networks

_____________ - used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand

_________________ - one form of WAN interconnection, represented by the lightning bolt-shaped line

Could be represented by any color

Page 14: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Elements of a network cont.

Network connections can be wired or wireless.

Wired connections: __________________________________

telephone wire, coaxial cable, or most commonly- _________________________ ______________________________

Carries _________________ signals Medium- _______________________

Thin strands of _____________________ Carries _______________ signals

Wireless connections Medium- Earth's atmosphere, or

space Signals are microwaves.

Page 15: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Elements of a network See chart for service used in

network communication Also listed are the protocols

those services use The industry standard network

protocol suite (set of protocols) used in networking today is:

_____________ (Transmission Control Protocol/Internet Protocol).

_____________ protocol of the Internet

specify the formatting, addressing and routing mechanisms that ensure our messages are delivered to the correct recipient.

Page 16: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Elements of a network Summary: excellent example in curriculum 1.3.2 page 5

Page 17: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Converged Networks Separate types of networks of the past:

Traditional _______________ (POTS), _________, ____________________, and __________________ networks

In the past, each used there own medium, their own protocols, standards and technology to carry signals

Converged network- a network that _______ _________________________________________________________________

___________________ of the above networks Eliminates the need to create and maintain separate networks.

Still contains many specialized devices

Page 18: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Converged Network Graphic

• The fast pace at which the development of converged network applications is occurring can be attributed to the _________________ ________________

Page 19: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Network Architecture

Network Architecture refers to the ___________________________________ _______________________________

consider- function of the network? anticipated needs/growth of the network? etc

Four important characteristics needed in every network- see the following four slides …

Page 20: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

____________________ A fault tolerant network is one

that ___________________ ________________________ Must recover quickly when such

a failure occurs. These networks depend on

redundant links, or paths, between the source and destination of a message.

Curcuit Switching vs Packet Switch? Which is more fault tolerant (more to come…)

Page 21: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

________________________ A scalable network can

____________________ ______ and applications ___________ _____________________ of the service being delivered to existing users. The operation at each layer in the

network hierarchy enables users or service providers to be inserted without causing disruption to the entire network.

Page 22: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

______________________

New (__________________) applications available to users over internetworks create higher expectations for the quality of the services. ___________________

transmissions require a higher level of consistent quality then traditional applications (of just data)

Page 23: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

________________________ As Internet grew the need

for security grew as wellThe security and privacy of data is necessary to exchange _______________________ ____________________.

Many tools and procedures are being implemented to combat inherent security flaws in the network architecture.

In the early days of the internet, security was not a concern

Page 24: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

The following slides consider the four important characteristics

With respect to the INTERNET…

Page 25: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Circuit Switched Connection-oriented Networks Process used by _______- traditional

phone Phone switching locations between

source and destination are identified. A ____________________________

through the various switching locations to use for the duration of the telephone call.

If any ________________________, the _____________________.

To reconnect, a new call must be made, and the process repeated

Once a circuit is established, even if no communication is occurring between the persons on either end of the call, the ___________________ _________________________________________________ the call.

Page 26: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Packet Switched Connectionless Networks

Messages can be broken into _______ Individual blocks containing addressing

information indicating both the origination point (source) and the final destination.

Each packet sent _______________ ______________________________ ____________, and can be reassembled at destination.

No reserved circuit is built between sender and receiver.

At each location (hop), a __________ __________ as to which path to use to forward the packet towards its final destination.

Page 27: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Which network architecture seems more fault tolerant:

Circuit Switched Networkor

Packet Switched Networkand why?

Page 28: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Scalable Network Architecture The Internet-a ___________________________

__________________________________ Has a ______________________ for addressing,

for naming and for connectivity of services. As a result, network traffic that is destined for local or regional services does not need to traverse to a central point for distribution.

Common services can be duplicated in different regions, thereby __________________________ _________________________ networks.

No single organization regulates the InternetOperators of the many individual networks that provide Internet connectivity follow _________ (aka ________) _______________________.

Page 29: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Excellent info.- see graphics on 1.4.3

Page 30: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Providing Quality of service Networks must provide _____________

___________, and, at times, __________ __________________

The packet-switched network architecture –while fault tolerant- ______________________

Networks need mechanisms to manage congested network traffic.

Congestion is caused when the ____________ __________________________________________________________________

Bandwidth is __________ and not always able to be increased

Page 31: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Providing Quality of service In order to maintain high QoS, it is sometimes

necessary to ____________ which types of data packets must be delivered at the expense of other types of packets.

_____________________ __________________________________________ ________________________

For example, communication that is time-sensitive or important would be classified higher than communication that can wait or is of lesser importance.

__________________________The characteristics of the information being communicated also affect its management.

Information might have to be queued for a period of time or dropped

The _______________________________ on the type of company

Page 32: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Examples of priority decisions :Time-sensitive communication - increase priority for services like ______________________.

Non time-sensitive communication - decrease priority for _______________________.

High importance to organization - increase priority for production control or __________ __________________________________

Undesirable communication - decrease priority or block unwanted activity, like ___________ ___________________________________

Page 33: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Providing Network Security Consequences of a network security breach could include:

______________________ resulting in loss of business ___________________________ of personal or business info/data Results:

Company intellectual property/ contract details ___________ Customer’s ____________________________, ____________________________________ in the business

There are two types of network security concerns: ________ ____________________________________.

Securing a network infrastructure: includes _________________ of _____________________________________________ to them.

Content security: refers to _______________________________ ________________ being __________________________ and the _________________________________________________.

Page 34: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Providing Network Security Provide Network Security in the following three ways: _________________________

Allowing only the intended and authorized recipients to read the data.

Having a strong system for ______________________, enforcing password complexity and policies

Where appropriate, _______________________ ensures confidentiality

_____________________________________Having the assurance that the ____________________ ___________________, from source (origin) to destination.

Done by use of digital signatures, hashing algorithms and checksum mechanisms

Page 35: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Providing Network Security ________________________

Having the ____________________________ __________ to data services for _____________.

Resources can be unavailable during a Denial of Service (DoS) attack

Help ensure availability using Network ________________ devices Desktop and server ________________ can ensure

system reliability as well as availabilityBuilding ______________________________, with few single points of failure, can reduce the impact of these threats.

This may not be practical

Page 36: Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino

Where is it all going?

There are three major trends that are contributing to the future shape of complex information networks:

Increasing number of mobile users Proliferation of network capable devices

cell phones/blackberry type devices, PDAs, notebook/ ipad type devices

Expanding range of services

Biggest challenge- keeping pace with changes and demands