1 - Networking Today

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Networking Today

Common Types of Networks

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Common Types of Networks
LANs and WANs
Network infrastructures vary greatly in
terms of:
• Size of the area covered
• Number of users connected
• Number and types of services
available
• Area of responsibility

Two most common types of networks:


• Local Area Network (LAN)
• Wide Area Network (WAN).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Common Types of Networks
LANs and WANs (cont.)
A LAN is a network infrastructure that spans A WAN is a network infrastructure that spans
a small geographical area. a wide geographical area.

LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between LANs.
devices.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Common Types of Networks
The Internet
The internet is a worldwide collection of
interconnected LANs and WANs.
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual
or group. The following groups were
developed to help maintain structure on
the internet:
• IETF
• ICANN
• IAB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Reliable Networks

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Reliable Network
Network Architecture
Network Architecture refers to the
technologies that support the infrastructure
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Reliable Network
Fault Tolerance
A fault tolerant network limits the impact of
a failure by limiting the number of affected
devices. Multiple paths are required for
fault tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated
circuits.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Reliable Network
Scalability

A scalable network can expand


quickly and easily to support
new users and applications
without impacting the
performance of services to
existing users.
Network designers follow
accepted standards and
protocols in order to make the
networks scalable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Reliable Network
Quality of Service
Voice and live video transmissions
require higher expectations for those
services being delivered.

Have you ever watched a live video with


constant breaks and pauses? This is
caused when there is a higher demand
for bandwidth than available – and QoS
isn’t configured.

• Quality of Service (QoS) is the primary


mechanism used to ensure reliable
delivery of content for all users.

• With a QoS policy in place, the router


can more easily manage the flow of
data and voice traffic.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Reliable Network There are two main types of network
Network Security security that must be addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to
the devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended
recipients can read the data
• Integrity – assurance that the data has
not be altered with during transmission
• Availability – assurance of timely and
reliable access to data for authorized
users
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Network Security
Security Threats • Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service that
is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques in
order to secure data and mitigate
threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Security
External Threats:
Security Threats (Cont.)
• Viruses, worms, and Trojan
horses
• Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft

Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Security
Security Solutions (Cont.)

Larger networks have additional security


requirements:
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems (IPS)
• Virtual private networks (VPN)
The study of network security starts with a clear
understanding of the underlying switching and
routing infrastructure.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

You might also like