Chapter 1 Intro to Networks_July 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 55

Chapter 1:

Introduction to Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
1.1 LANs, WANs and
Internetworks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Definition of a Network
A network is a connection of two or more computers
through a media in order to share resources.

A network can be
- As small as two computers connected by a cable
or
- As large as several thousand computers connected
across the world.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
▪ Home network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
▪ Enterprise network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Wide area network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Components of a Network
There are three categories of network components:
Devices (End Devices, Network Infrastructure devices)
Media (Cable or wireless)
Services (Software run on networked devices)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Components of a Network
Devices
> End Devices,
> Network Infrastructure devices/ Intermediary devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
End Devices
➢ The network devices that people are most familiar with
➢ These devices form the interface between
users and the underlying communication network.

Examples of end devices are:


• Computers (work stations, laptops, file servers, web servers)
• Network printers
• VoIP phones
• Security cameras
• Mobile handheld devices (such as wireless barcode scanners, PDAs)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
• End devices are referred to as hosts.
• A host device is either the sender (source) or receiver
(destination)
• To uniquely identify one host from another, each host on a
network is identified by an address.
• Destination host address specifies where the message should
be sent.
• Software determines the role of a host. A host can be a
client, server or both

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Intermediary Devices
▪ Devices along the way which carries the data to the
destination
▪ Intermediary devices connect the individual end devices to
the network.
▪ They can connect multiple individual networks to form an
internetwork.
▪ These intermediary devices provide connectivity and ensure
that data flows across the network.
▪ Intermediary devices use the destination end device address,
to determine the path that messages should take through the
network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Example of intermediary devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Network Services
• Network components are used to provide services and
processes.

• These are software, that run on the networked devices.

• A network service provides information in response to a


request.

• Services include
> Network user applications people use every day, like
email hosting services and web hosting services.
> Processes that provide the functionality that directs
and moves the messages through the network.

• Processes are less obvious to us but are critical to the


operation of networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Network Services

Intermediary devices
End devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Network Media
▪ Modern networks primarily use three types of media to
interconnect devices and to provide the pathway over which
data can be transmitted.
▪ Metallic wires
within cables

▪ Glass or plastic fibers


(fiber optic cable)

▪ Wireless transmission

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Network Media
▪ The signal encoding that must occur for the message to be transmitted
is different for each media type
Media Example Encoding
Copper Twisted pair cable used as LAN media electrical impulses

Fiber-Optic Glass or plastic fibers in a vinyl coating Light pulses


for long runs in a LAN and as a trunk
Wireless Connects local users through the air Electromagnetic
waves

▪ Criteria for choosing a network media are:


- The distance the media can successfully carry a signal.
- The environment in which the media is to be installed.
- The amount of data and the speed at which it must be
transmitted.
- The cost of the media and installation

-18-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Network Representations
• Network architects and administrators must be able
to show what their networks will look like.

• They need to be able to easily see which


components connect to other components, where
they will be located, and how they will be
connected.

• Diagrams of networks often use symbols, like those


shown in the figure, to represent the different
devices and connections that make up a network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Network Representations
▪ How each of these devices and media connect to each other.
▪ Network Interface Card - A NIC, or LAN adapter, provides
the physical connection to the network at the PC or other host
device. The media plug into the NIC to connect the PC to the
network
▪ Physical Port - A connector or outlet on a networking device
where the media is connected to a host or other networking
device.
▪ Interface - Specialized ports on an internetworking device
that connect to individual networks. Because routers are used
to interconnect networks, the ports on a router are referred to
network interfaces.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Topology Diagrams
▪ Topology diagrams are mandatory documentation for anyone
working with a network.
▪ They provide a visual map of how the network is connected.
▪ There are two types of topology diagrams:
> Physical topology and
> Logical topology.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Physical Topology Diagrams
Identify the physical location of
• intermediary devices,
• configured ports,
• and cable installation.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Logical Topology Diagrams
Identify devices, ports, and IP addressing scheme.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Network of many sizes
▪ Networks come in all sizes.
They range from simple
networks consisting of two
computers, to networks
connecting millions of
devices.
▪ Simple home networks let
you share resources, such
as printers, documents,
pictures, and music, among
a few local end devices.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Network of many sizes
▪ Small office and home
office (SOHO) networks
allow people to work from
home, or a remote office.
Many self-employed
workers use these types
of networks to advertise
and sell products, order
supplies, and
communicate with
customers.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Network of many sizes
▪ Medium to large
networks, such as
those used by
corporations and
schools, can have
many locations with
hundreds or
thousands of
interconnected
hosts.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Network of many sizes
▪ The internet is the
largest network in
existence. In fact, the
term internet means a
“network of networks”.
It is a collection of
interconnected private
and public networks.
▪ The internet is a
network of networks
that connects
hundreds of millions of
computers world-wide.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
LAN and WANs
▪ Network infrastructures vary greatly in terms of:
•Size of the area covered
•Number of users connected
•Number and types of services available
•Area of responsibility
▪ The two most common types of network infrastructures are
• Local Area Networks (LANs), and
• Wide Area Networks (WANs).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
LAN and WAN
• A LAN is a network infrastructure that provides access to
users and end devices in a small geographical area
• A LAN is typically used in a department within an
enterprise, a home, or a small business network

• A WAN is a network infrastructure that provides access to


other networks over a wide geographical area, which is
typically owned and managed by a larger corporation or a
telecommunications service provider. The figure shows
LANs connected to a WAN.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Local Area Networks (LAN)
A LAN is a network infrastructure
that

➢ Interconnect end devices in a


small geographical area
Examples : a home, school, office
building, or campus.

➢ Owned by a single organization


or individual.

➢ provide high-speed bandwidth

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Wide Area Networks (WAN)
A WAN is a network infrastructure that

➢ spans a wide geographical area.


Example cities, states, provinces, countries, or continents

➢ WANs are typically managed by multiple service providers


(SPs) or Internet Service Providers (ISPs).

➢ WANs typically provide slower speed links between LANs.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
▪ Metropolitan Area Network (MAN) - A network
infrastructure that spans a physical area larger than a LAN
but smaller than a WAN (e.g., a city). MANs are typically
operated by a single entity such as a large organization.
▪ Wireless LAN (WLAN) - Similar to a LAN but wirelessly
interconnects users and end points in a small geographical
area.
▪ Storage Area Network (SAN) - A network infrastructure
designed to support file servers and provide data storage,
retrieval, and replication. It involves high-end servers,
multiple disk arrays (called blocks), and Fibre Channel
interconnection technology.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
The Internet
▪ The Internet is a worldwide collection of interconnected
networks (internetworks or internet for short), cooperating with
each other to exchange information using common standards.
▪ Through telephone wires, fiber optic cables, wireless
transmissions, and satellite links, Internet users can exchange
information in a variety of forms.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Intranet and Extranet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Intranet
▪ Intranet is a term often used to refer to a private connection
of LANs and WANs that belongs to an organization, and is
designed to be accessible only by the organization's
members, employees, or others with authorization.
▪ Intranets are basically an internet which is usually only
accessible from within the organization.
Intranet – only
accessible by
employees
- From within the
company
- From home or
outside the company

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Extranet
▪ An organization may use an extranet to provide secure and
safe access to individuals who work for a different
organizations, but require company data. Examples of
extranets include:
▪ A company providing access to outside suppliers/contractors.
▪ A hospital providing a booking system to doctors so they can
make appointments for their patients.
▪ A local office of education providing budget and personnel
information to the schools in its district.

Extranet – allow
third party to
access

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
1.2 The Network as a Platform

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Traditional Separate network

▪ Traditionally different network is needed for each function


the data network, telephone network, and video network for
televisions.
▪ These separate networks could not communicate with each other.
▪ Each network used different technologies to carry the
communication signal.
▪ Each network had its own set of rules and standards to ensure
successful communication.
▪ Multiple services ran on multiple networks.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Traditional Separate network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
The Converged Network
▪ Today, the separate data, telephone, and video networks
converge.
▪ Unlike separate dedicated networks, converged networks are
capable of delivering data, voice, and video between many
different types of devices over the same network infrastructure.
▪ This network infrastructure uses the same set of rules,
agreements, and implementation standards.
▪ Converged data networks carry multiple services on one network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
The Converging Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
1.3 Trends of Computer Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
New trends

Some of the top trends include:


▪ Bring Your Own Device (BYOD)
▪ Online collaboration
▪ Video communications
▪ Cloud computing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Bring Your Own Device (BYOD)
• BYOD enables end users the freedom
to use personal tools to access
information and communicate across
a business or campus network.

• Employee provide the devices to


connect to the network.

• These include laptops, notebooks,


tablets, smart phones, and e-readers.

• BYOD means any device, with any


ownership, used anywhere.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Online collaboration
• Collaboration is defined as “the act of working with another or
others on a joint project.”
• Collaboration tools, give employees, students, teachers, customers,
and partners a way to instantly connect, interact, and achieve their
objectives
• Students need to collaborate to assist each other in learning, to
develop the team skills used in the workforce, and to work
together on team-based projects.
• Examples : google classroom, google meet, cisco Webex, zoom

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Cloud Computing
Definition –
• Storage of data in the internet,
• Services or applications that are housed in the internet

Cloud computing offers the


following potential benefits:
▪ Organizational flexibility
▪ Agility and rapid deployment
▪ Reduced cost of infrastructure
▪ Refocus of IT resources
▪ Creation of new business
models

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55

You might also like