0% found this document useful (0 votes)
62 views55 pages

Topic 2 Network

The document discusses how networking technologies impact everyday life and business. It covers topics like how networks connect devices globally, trends in networking like cloud computing and BYOD, and implications for communication, collaboration and more. Advancements in networking are creating a more connected world without boundaries.

Uploaded by

Anne Diano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views55 pages

Topic 2 Network

The document discusses how networking technologies impact everyday life and business. It covers topics like how networks connect devices globally, trends in networking like cloud computing and BYOD, and implications for communication, collaboration and more. Advancements in networking are creating a more connected world without boundaries.

Uploaded by

Anne Diano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Instructor: Jason S.

Aguilar
 1.1 Globally Connected
• Explain how multiple networks are used in every day life.

 1.2 LANs, WANs, and the Internet


• Explain how topologies and devices are connected in a small to medium-sized business network.

 1.3 The Network as a Platform


• Explain the basic characteristics of a network that supports communication in a small to
medium-sized business.

 1.4 The Changing Network Environment


• Explain trends in networking that will affect the use of networks in small to medium-sized
businesses.
 Welcome to a world where we are more powerful together, than we ever could be
apart.
 Welcome to the human network.
 We live in a world we barely imagined 20 years ago.
 What wouldn’t we have without the Internet?
 What will be possible in the future using the network as the platform?
 Advancements in networking technologies are helping create a world without boundaries.
 The immediate nature of communications over the Internet encourages global communities.
 Cisco refers to the impact of the Internet and networks on people the “human network”.
 Do you remember sitting in a classroom, like this?
 You don't have to be in school anymore to take a class. You don't have to be in a classroom to have a
teacher.
 The globalization of the Internet
has empowered individuals to
create information that can be
accessed globally.
 Forms of communication:
 Texting
 Social Media
 Collaboration Tools
 Blogs
 Wikis
 Podcasting
 Data networks have evolved into
helping support the way we work.
 Online learning opportunities decrease
costly and time consuming travel.
 Employee training is becoming more
cost effective.
 We listen to music, watch movies,
read books, and download material
for future offline access.
 Networks allow online gaming in
ways that were not possible 20 years
ago.
 Offline activities have also been
enhanced by networks including
global communities for a wide range
of hobbies and interests.
 How do you play on the Internet?
 Small Home Networks – connect a few
computers to each other and the Internet
 Small Office/Home Office – enables
computer within a home or remote office
to connect to a corporate network
 Medium to Large Networks – many
locations with hundreds or thousands of
interconnected computers
 World Wide Networks – connects
hundreds of millions of computers world-
wide – such as the Internet
 Every computer connected to a network
is called a host or end device.
 Servers are computers that provide
information to end devices on the network.
For example, email servers, web servers, or
file server
 Clients are computers that send requests to
the servers to retrieve information such as a
web page from a web server or email from an
email server.
 Client and server software usually run on separate computers.
 However, in small businesses or homes, it is typical for a client to also function as the server.
These networks are called peer-to-peer networks.
 Peer-to-peer networking advantages: easy to set up, less complex, and lower cost.
 Disadvantages: no centralized administration, not as secure, not scalable, and slower
performance.
 A network can be as simple as a single cable
connecting two computers or as complex as a
collection of networks that span the globe.
 Network infrastructure contains three broad
categories of network components:
 Devices
 Media
 Services
 End Devices
 An end device is where a
message originates from or
where it is received.
 Data originates with an end
device, flows through the
network, and arrives at an end
device
 An intermediary device interconnects end devices in a network.
 Switches are used to connect multiple
devices together on the same network. In a
properly designed network, LAN switches are
responsible for directing and controlling the
data flow at the access layer to networked
resources.
Router is a device that works on Layer 3 of OSI Model
(Network Layer), You can make communication in
between different networks by connecting them with a
router.
 Communication across a network is
carried through a medium which allows a
message to travel from source to
destination.
 Networks typically use three types of
media:
 Metallic wires within cables, such as
copper
 Glass, such as fiber optic cables
 Wireless transmission
 Network diagrams, often called topology
diagrams, use symbols to represent devices
within the network.
 In addition to the device representations on
the right, it is important to remember and
understand the following terms:
 Network Interface Card (NIC)
 Physical Port
 Interface
 Note the key differences between the two topology diagrams (physical location of devices vs.
ports and network addressing schemes)
 Two most common types of networks:
 Local Area Network (LAN) – spans a small
geographic area owned or operated by an
individual or IT department.
 Wide Area Network (WAN) – spans a large
geographic area typically involving a
telecommunications service provider.
 Other types of networks:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
 Three characteristics of LANs:
 Spans a small geographic area
such as a home, school, office
building, or campus.
 Usually administered by a single
organization or individual.
 Provides high speed bandwidth to
end and intermediary devices
within the network.
 Three characteristics of WANs:
 WANs interconnect LANs over wide geographical areas such as between cities, states, or countries.
 Usually administered by multiple service providers.
 WANs typically provide slower speed links between LANs.
 The Internet is a worldwide collection of
interconnected LANs and WANs.
 LANs are connected to each other using
WANs.
 WANs are then connected to each other
using copper wires, fiber optic cables,
and wireless transmissions.
 The Internet is not owned by any
individual or group, however, the
following groups were developed to help
maintain structure:
 IETF
 ICANN
 IAB
 Unlike the Internet, an intranet is a
private collection of LANs and WANs
internal to an organization that is meant
to be accessible only to the organizations
members or others with authorization.
 An organization might use an extranet to
provide secure access to their network for
individuals who work for a different
organization that need access to their
data on their network.
 Bring Your Own Device (BYOD) is a
major global trend that allows users to
use their own devices giving them
more opportunities and greater
flexibility.
 BYOD allows end users to have the
freedom to use personal tools to
access information and communicate
using their:
 Laptops
 Netbooks
 Tablets
 Smartphones
 E-readers
 Individuals want to collaborate and
work with others over the network on
joint projects.
 Collaboration tools including Cisco
WebEx (shown in the figure) gives
users a way to instantly connect,
interact and achieve their objectives.
 Collaboration is a very high priority for
businesses and in education.
 Cisco TelePresence powers the new way of working where everyone, everywhere, can be more
productive through face to face collaboration.
 Around the world each day, we transform organizations by transforming our customer experiences.
 Cloud computing is a global trend that allows
us to store personal files or backup our data
on servers over the Internet.
 Applications such as word processing and
photo editing can also be accessed using the
Cloud.
 Cloud computing also allows businesses to
extend their capabilities on demand and
delivered automatically to any device
anywhere in the world.
 Cloud computing is made possible by data
centers. Smaller companies that can’t afford
their own data centers, lease server and
storage services from larger data center
organizations in the Cloud.
 Four types of Clouds:
 Public Clouds
 Services and applications are made available to
the general public through a pay-per-use model or
for free.
 Private Clouds
 Applications and services are intended for a
specific organization or entity such as the
government.
 Hybrid Clouds
 Made up of two or more Cloud types – for example,
part custom and part public. Each part remains a
distinctive object but both are connected using the
same architecture.
 Custom Clouds
 Smart home technology is a growing trend
that allows technology to be integrated
into every-day appliances which allows
them to interconnect with other devices.
 Ovens might know what time to cook a
meal for you by communicating with your
calendar on what time you are scheduled
to be home.
 Powerline networking can allow devices to
connect to a LAN where data network
cables or wireless communications are not
a viable option.
 Using a standard powerline adapter,
devices can connect to the LAN wherever
there is an electrical outlet by sending
data on certain frequencies.
 In addition to DSL and cable, wireless is
another option used to connect homes
and small businesses to the Internet.
 More commonly found in rural
environments, a Wireless Internet Service
Provider (WISP) is an ISP that connects
subscribers to designated access points
or hotspots.
 Wireless broadband is another solution
for the home and small businesses.
 Uses the same cellular technology used by
a smart phone.
 An antenna is installed outside the house
providing wireless or wired connectivity for
devices in the home.
 A hacker set up an open “rogue” wireless hotspot posing as a legitimate wireless
network.
 A customer logged onto her bank’s website.
 The hacker hijacked her session.
 The hacker gained access to her bank accounts.
 An employee receive an email from his CEO, containing an attached PDF.
 Ransomware is installed on the employee’s computer.
 Ransomware gathers and encrypts
corporate data.
 The attackers hold the company’s data
for ransom until they are paid.
 Stuxnet Worm
 Infiltrated Windows operating systems.
 Targeted Step 7 software that controls programmable logic controllers (PLCs) to damage the centrifuges in
nuclear facilities.
 Transmitted from the infected USB drives into the PLCs eventually damaging many cetrifuges.
 Known as script kiddies.
 Have little or no skill.
 Use existing tools or instructions found on the
Internet to launch attacks.
 Protest against organizations or governments
 Post articles and videos.
 Leak information.
 Disrupt web services with DDoS attacks.
 Much hacking activity is motivated by
financial gain.
 Cybercriminals want to generate cash
flow
 Bank accounts
 Personal data
 Anything else they can leverage
 Nation states are also interested in
using cyberspace
 Hacking other countries
 Interfering with internal politics
 Industrial espionage
 Gain significant advantage in
international trade
 The Internet of Things (IoT)
 Connected things to improve quality of life.
 Example: fitness trackers

 How secure are these devices?


 Firmware
 Security flaws
 Updatable with patch

 DDoS attack against domain name provider,


Dyn
 Took down many websites.
 Compromised webcams, DVRs, routers, and
other
IoT devices formed a botnet.
 The hacker controlled botnet created the DDoS
attack that disabled essential Internet services.
 Personally identifiable information (PII) is any information that can
be used to positively identify an individual.
 Examples of PII include: Name, Social security number, Birthdate,
Credit card numbers, Bank account numbers, Government-issued ID,
Address information (street, email, phone numbers)
 This information is sold on the dark web.
 Create fake accounts, such as credit cards and short-term loans.

 Protected Health Information (PHI) – A subset of PII:


 Creates and maintains electronic medical records (EMRs)
 Regulated by Health Insurance Portability and Accountability Act
(HIPAA)
 Could result in lost competitive advantage.
 Corporate espionage in cyberspace.
 Loss of trust that comes when a company is
unable to protect its customers’ personal data.
 In 2016, a hacker published PII of 20,000 U.S.
FBI employees and 9,000 U.S. DHS employees.
 Stuxnet worm was designed to impede Iran’s
progress in enriching uranium
 Example of network attack motivated by national
security concerns
 Cyberwarfare is a serious possibility.
 The Internet has become essential as a medium
for commercial and financial activities.
 Disruption can devastate a nation’s economy and
the safety of its citizens.
 Security Operations Centers (SOCs)
provide a broad range of services:
 Monitoring
 Management
 Comprehensive threat solutions
 Hosted security

 SOCs can be:


 In-house, owned and operated by a
business.
 Elements can be contracted out to security
vendors.
 The major elements of a SOC:
 People
 Processes
 Technology
 The SANS Institute (www.sans.org)
classifies the roles people play in a SOC
into four job titles:
 Tier 1 Alert Analyst
 Tier 2 Incident Responder
 Tier 3 Subject Matter Expert
(SME)/Hunter
 SOC Manager

 Can you guess the responsibilities for


each of the job titles?
 Tier 1 Alert Analyst begins with
monitoring security alert queues.
 Tier 1 Alert Analyst verifies if an alert
triggered in the ticketing software
represents a true security incident.
 The incident can be forwarded to
investigators, or resolved as a false
alarm.
 Security Information and Event
Management (SIEM) systems:
 Collect and filter data.
 Detect and classify threats.
 Analyze and investigate threats.
 Implement preventive measures.
 Address future threats.
 Organizations may implement an enterprise-level
SOC.
 The SOC can be :
 A complete in-house solution
 Outsourced at least part of the SOC operations to
a security solutions provider.
 Most enterprise networks must be up and running at all times.
 Preferred uptime is often measured in the number of down minutes in a
year. A “five nines” uptime means that the network is up 99.999% of the
time (or down for no more
than 5 minutes a year).
 Trade off between strong security and permitting business functions.

You might also like