Module 1 (Reviewer)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

MODULE 1

Network: consists of two or more computers that are linked in order to share
resources exchange files, or allow electronic communications.

Hosts:
 All computers that are connected to a network and participate directly in
network communication.
 specifically refers to devices on the network that are assigned a number for
communication purposes
 Can be called end devices. Some hosts are also called clients.

Internet Protocol (IP) address: host and the network to which the host is attached.

Servers:
 Are computers with software that allow them to provide information, like email
or web pages, to other end devices on the network.
 Each service requires separate server software. E.g. A
 server requires web server software to provide web services to the
network

Clients:
 are a type of host
 have software for requesting and displaying the information obtained from the
server
 An example of client software is a web browser, like Chrome or FireFox

Common types of server software


Email:
 clients use mail client software such as Microsoft Outlook, to access email on
the server
Web:
 Clients use browser software, such as Windows Internet Explorer, to access
web pages on the server
File:
 Stores corporate and user files in a central location
 The client devices access these files with client software such as the Windows
File Explorer
MODULE 1
Peer-to-Peer Network:
 Some computers often serve as both servers and clients

End Device:
 each end device on a network has an address
 is either the source or destination of a message transmitted over the network.

Intermediary Device:
 connect the individual end devices to the network
 They can connect multiple individual networks to form an internetwork
 provide conectivity and ensure that data flows across the network
MODULE 1

Network Media:
 Communication transmits across a network on media.
 The media provides the channel over which the message travels from source
to destination.
Modern networks primarily use three types of media to interconnect devices, as
shown in the figure:
 Metal wires within cables - Data is encoded into electrical impulses.
 Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded
into pulses of light.
 Wireless transmission - Data is encoded via modulation of specific
frequencies of electromagnetic waves.

Network Representations and Topologies


End devices:
 Desktop Computer
 Laptop
 Printer
 IP Phone
 Wireless Tablet
 TelePresence Endpoint

Intermediary Devices:
 Wireless Router
 LAN Switch
 Router
 Firewall Appliance
 Multilayer Switch

Network Media:
 Wireless Media
 LAN Media
 WAN Media
MODULE 1
Network Media:
 Topology diagrams are mandatory documentation for anyone working with a
network
 They provide a visual map of how the network is connected.

In addition to these representations, specialized terminology is used to describe how


each of these devices and media connect to each other:
 Network Interface Card (NIC) - physically connects the end device to the
network.
 Physical Port - A connector or outlet on a networking device where the
media connects to an end device or another networking device.
 Interface - Specialized ports on a networking device that connect to
individual networks. Because routers connect networks, the ports on a
router are referred to as network interfaces.

2 Types of Topology Diagram


Physical Topology:
 illustrate the physical location of intermediary devices and cable
installation
Logical Topology:
 illustrate devices, ports, and the addressing scheme of the network

Network in all sizes


Simple home networks let you share resources, such as printers, documents,
pictures, and music, among a few local end devices.
Small office and home office (SOHO) networks allow people to work from home,
or a remote office.
Businesses and large organizations use networks to provide consolidation,
storage, and access to information on network servers.
MODULE 1

LANs: network infrastructure that spans a small geographical area. LANs have
specific characteristics:
 LANs interconnect end devices in a limited area such as a home, school,
office building, or campus.
 A LAN is usually administered by a single organization or individual.
Administrative control is enforced at the network level and governs the
security and access control policies.
 LANs provide high-speed bandwidth to internal end devices and
intermediary devices, as shown in the figure.

WANs: is a network infrastructure that spans a wide geographical area. WANs are
typically managed by service providers (SPs) or Internet Service Providers (ISPs).
WANs have specific characteristics:
 WANs interconnect LANs over wide geographical areas such as between
cities, states, provinces, countries, or continents.
 WANs are usually administered by multiple service providers.
 WANs typically provide slower-speed links between LANs.

LANs use WAN services to interconnect.


 Some LANs are connected through a WAN connection.
 WANs are then connected to each other.
 The red WAN connection lines represent all the varieties of ways we connect
networks.
 WANs can connect through copper wires, fiber-optic cables, and wireless
transmissions (not shown).

There are two other terms which are similar to the term internet: intranet and
extranet.
Intranet:
 is a term often used to refer to a private connection of LANs and WANs
that belongs to an organization.
 Is designed to be accessible only by the organization's members,
employees, or others with authorization.
MODULE 1
An organization may use an Extranet to provide secure and safe access to
individuals who work for a different organization but require access to the
organization’s data. Here are some examples of extranets:
 A company that is providing access to
outside suppliers and contractors
 A hospital that is providing a booking
system to doctors so they can make
appointments for their patients
 A local office of education that is
providing budget and personnel
information to the schools in its district
The figure illustrates the levels of access that
different groups have to a company intranet, a
company extranet, and the internet.

4 Basic Characteristics that Network Architects


 Fault Tolerant Network
 Scalability Network
 Quality of Service Network
 Network Security

1. Fault Tolerant Network:


 is one that limits the number of affected devices during a failure.
 It is built to allow quick recovery when such a failure occurs.
 These networks depend on multiple paths between the source and destination
of a message. If one path fails, the messages are instantly sent over a
different link. Having multiple paths to a destination is known as redundancy.

Packet Switch Network:


 is one way that reliable networks provide redundancy.
 Packet switching splits traffic into packets that are routed over a
shared network.
 A single message, such as an email or a video stream, is broken into
multiple message blocks, called packets
Each packet has the necessary addressing information of the source and
destination of the message.
MODULE 1
2. Scalable Network:
 happens when designers follow accepted standards and protocols
 expands quickly to support new users and applications.
 It does this without degrading the performance of services that existing
users are accessing.

3. Quality of Service (QoS):


 is an increasing requirement of networks today.
 type of policy, a router can manage the flow of data and voice traffic,
giving priority to voice communications if the network experiences
congestion.

Have you ever tried to watch a video with constant breaks and pauses? As
data, voice, and video content continue to converge onto the same
network, QoS becomes a primary mechanism for managing congestion and
ensuring reliable delivery of content to all users.

Network bandwidth
 is measured in the number of bits that can be transmitted per
second (bps).
 When simultaneous communications are attempted across the
network, the demand for network bandwidth can exceed its availability,
creating network congestion.

Congestion
 occurs when the demand for bandwidth exceeds the amount
available.

4. Network Security
Types of Network Security Concerns:
 network infrastructure security
 information security.

Requirements of Security:
 Confidentiality - Data confidentiality means that only the intended and
authorized recipients can access and read data.
MODULE 1
 Integrity - Data integrity assures users that the information has not been
altered in transmission, from origin to destination.
 Availability - Data availability assures users of timely and reliable access to
data services for authorized users.

Several networking trends affect organizations and consumers:


1. Bring Your Own Device (BYOD):
 The concept of any device, for any content, in any manner, is a major global
trend that requires significant changes to the way we use devices and safely
connect them to networks.
 enables end users the freedom to use personal tools to access
information and communicate across a business or campus network.
 These include laptops, notebooks, tablets, smartphones, and e-readers.
 BYOD means any device, with any ownership, used anywhere.

2. Online Collaboration:
 Individuals want to connect to the network, not only for access to data
applications, but also to collaborate with one another.

Collaboration:
 defined as “the act of working with another or others on a joint
project.”
 is a critical and strategic priority that organizations are using to
remain competitive.

3. Video Communications
 Another facet of networking that is critical to the communication and
collaboration effort.
 Video is used for communications, collaboration, and entertainment.
 Video calls are made to and from anyone with an internet connection,
regardless of location.

Video conferencing is a powerful tool for communicating with others, both


locally and globally. Video has become a critical requirement for effective
collaboration as organizations extend across geographic and cultural
boundaries.
MODULE 1

4. Cloud computing
 is one of the ways that we access and store data.
 contains options such as Public, Private, Custom and Hybrid.
 Cloud computing is possible because of data centers.
 allows us to store personal files, even backup an entire drive on servers
over the internet.
 Applications such as word processing and photo editing can be accessed
using the cloud.

Network Trends
 are not only affecting the way we communicate at work and at school, but also
changing many aspects of the home.
 The newest home trends include ‘smart home technology’.

Smart home technology


 integrates into everyday appliances, which can then connect with other
devices to make the appliances more ‘smart’ or automated.
 is currently being developed for all rooms within a house.
 will become more common as home networking and high-speed internet
technology expands.
MODULE 1
 The smart phone is updated from the cloud with the status of the smart home
devices and the smart car. The user can then use the smart phone to interact
with the smart home and smart car.
Powerline networking
 is especially useful when wireless access points cannot reach all the
devices in the home.
 Powerline networking is not a substitute for dedicated cabling in data
networks. However, it is an alternative when data network cables or
wireless communications are not possible or effective.
 for home networks using existing electrical wiring to connect devices
 Using a standard powerline adapter, devices can connect to the LAN
wherever there is an electrical outlet.
 No data cables need to be installed, and there is little to no additional
electricity used. Using the same wiring that delivers electricity, powerline
networking sends information by sending data on certain frequencies.

Wireless Internet Service Provider (WISP)


 is an that connects subscribers to a designated access point or hot
spot using similar wireless technologies found in home wireless local area
networks (WLANs).
 commonly found in rural environments where DSL or cable services are not
available.

Wireless Broadband Service


Another wireless solution for the home and small businesses is wireless broadband,
as shown in the figure.

Network security
 is an integral part of computer networking, regardless of whether the network
is in a home with a single connection to the internet or is a corporation with
thousands of users.
 It must be able to secure data while still allowing for the quality of service
that users expect of the network.

Securing a network involves protocols, technologies, devices, tools, and


techniques in order to protect data and mitigate threats. Threat vectors may be
external or internal.
MODULE 1
There are several common external threats to networks:
 Viruses, worms, and Trojan horses - These contain malicious software or
code running on a user device.
 Spyware and adware - These are types of software which are installed on a
user’s device. Then secretly collects information about the user.
 Zero-day attacks - Also called zero-hour attacks, these occur on the first day
that a vulnerability becomes known.
 Threat actor attacks - A malicious person attacks user devices or network
resources.
 Denial of service attacks - These attacks slow or crash applications and
processes on a network device.
 Data interception and theft - This attack captures private information
from an organization’s network.
 Identity theft - This attack steals the login credentials of a user in order to
access private data.

These are the basic security components for a SOHO NETWORK:


Antivirus and antispyware
 These applications help to protect end devices from becoming infected
with malicious software.

Firewall filtering
 Firewall filtering blocks unauthorized access into and out of the network.
 This may include a host-based firewall system that prevents unauthorized
access to the end device, or a basic filtering service on the home router
to prevent unauthorized access from the outside world into the network.

Network security implementation for a CORPORATE NETWORK usually consists


of many components built into the network to monitor and filter traffic. Ideally, all
components work together, which minimizes maintenance and improves security.
Larger networks and corporate networks use antivirus, antispyware, and firewall
filtering.
MODULE 1
Other security requirements:
Dedicated firewall systems
 These provide more advanced firewall capabilities that can filter large
amounts of traffic with more granularity.

Access control lists (ACL)


 These further filter access and traffic forwarding based on IP addresses
and applications.

Intrusion prevention systems (IPS)


 These identify fast-spreading threats, such as zero-day or zero-hour
attacks.

Virtual private networks (VPN)


 These provide secure access into an organization for remote workers.
MODULE 1
MODULE 1

You might also like