Chapter 1 CCNA1
Chapter 1 CCNA1
Introduction to Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
https://www.domo.com/learn/infographic/data-never-sleeps-11
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Some key highlights from the 2023 “Data Never Sleeps 11.0” report include:
• The AI Boom: Artificial Intelligence (AI) is making big waves in the digital
world. AI-driven platforms such as ChatGPT are reshaping the ways we work,
communicate and create, with users submitting 6,944 prompts every minute.
However, users haven’t forsaken their search engine habits, as searches on
Google total more than 6.3 million every minute (up from 5.9 million a year
ago).
• Entertainment Dominance: After a dip in engagement last year, X (formerly
Twitter) now sees 360,000 posts from users every minute, up from 347,000 in
Data Never Sleeps 10.0. Spotify users stream 24,000 hours of music, including
69,444 Taylor Swift songs. Instagram users are sending over 694,000 reels via
direct message every sixty seconds. And the world of streaming continues to
dominate, as collective viewers watch more than 40 years of streaming
content every single minute. As online platforms gain more activity and
engagement, the entertainment industry promises to never be the same.
• Transactions on a Tear: Digital spending continues its vast expansion. E-
commerce giant Amazon sees more than $455,000 in sales every minute and
on digital transaction app Venmo, users send $463,768 worth of payments
every minute, up 6% year over year. In the food sector, DoorDash diners
place orders totaling $122,785, up 60% from last year, reflecting the increased
reliance (and potentially, inflation) on food and food delivery services in this
digital age.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
https://www.domo.com/blog/data-never-sleeps-hits-double-digits/
https://www.youtube.com/watch?v=HOSGLh2mz7g
https://www.youtube.com/watch?v=oTcVRZxjjeU
https://www.youtube.com/watch?v=4I_Qjjmk0A0
https://www.youtube.com/watch?v=x3c1ih2NJEg
According to Statista, the total amount of data predicted to be
created, captured, copied and consumed globally in 2022 is 97
zettabytes, a number projected to grow to 181 zettabytes by 2025.
One zettabyte is equal to one sextillion bytes or 1021 (1,000,000,000,000,000,000,000)
bytes, or, one zettabyte is equal to a trillion gigabytes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
• Over its relatively short history,
the internet has been a catalyst
for both the rise and demise of
new companies and platforms.
• By looking at which brands have
appeared in the graphic in earlier
years, we can roughly chart the
prominence of certain tech
segments, as well as observe
brands with the most staying
power.
• Platforms like Tumblr, Flickr, and
Foursquare showed some promise,
but eventually got omitted from the
graphic as they dropped off in
relevance.
• Meanwhile, tech companies like
Facebook, Amazon, and Google
have had impressive staying power,
evolving to become some of
the biggest companies in the world.
• In the process, they’ve caught up to
longer-standing titans like Apple and
Microsoft at the top of the food
chain.
• https://www.visualcapitalist.com/from-amazon-to-
zoom-what-happens-in-an-internet-minute-in-2021/
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
https://youtu.be/p3a5-pEBB4Y
https://datareportal.com/reports/digital-2023-october-global-statshot /
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
CHAPTER 1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Dermot Clarke TU Dublin 2022
Globally Connected
No Boundaries
Communication is almost as important to us as our reliance on
air, water, food, and shelter. In today’s world, through the use
of networks, we are connected like never before.
Advancements in networking technologies are perhaps the
most significant recent changes in the world today.
They are helping to create a world in which national borders,
geographic distances, and physical limitations become less
relevant presenting ever-diminishing obstacles.
The Internet has changed the manner in which social,
commercial, political, and personal interactions occur.
The immediate nature of communications over the Internet
encourages the creation of global communities. Global
communities allow for social interaction that is independent of
location or time zone.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Dermot Clarke TU Dublin 2022
Globally Connected
Networking Today
Network has no boundary and
supports the way we:
• Learn
• Communicate
• Work
• Play
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Dermot Clarke TU Dublin 2022
Network Components
Host Roles
Every computer on a network is
called a host or an end device.
Servers are computers that Server Description
provide information to end Type
devices:
Email Email server runs email server software.
• email servers Clients use client software to access email.
Clients are computers that send File File server stores corporate and user files.
The client devices access these files.
requests to the servers to
retrieve information:
• web page from a web
server
• email from an email server
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Dermot Clarke TU Dublin 2022
Components of a Network
End Devices
An end device is where a message originates from or where it is
received. Data originates with an end device, flows through the
network, and arrives at an end device.
Some examples of end devices are:
• Computers (work stations, laptops, file servers, web servers)
• Network printers
• VoIP phones
• Telepresence endpoint
• Security cameras
• Mobile handheld devices (such as smartphones, tablets, PDAs, and
wireless debit / credit card readers and barcode scanners)
End devices are referred to as hosts.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Dermot Clarke TU Dublin 2022
Components of a Network
Network Infrastructure (Intermediary) Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access
points)
Internetworking Devices (routers)
Security Devices (firewalls)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Dermot Clarke TU Dublin 2022
Components of a Network
Network Media Different types of network
Communication across a
media have different
network is carried through a
medium which allows a features and benefits.
• The distance the media
message to travel from source
can successfully carry a
to destination. signal.
• The environment in
which the media is to be
installed.
• The amount of data and
the speed at which it
must be transmitted.
• The cost of the media
and installation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Dermot Clarke TU Dublin 2022
Components of a Network
Network Representations
• Network diagrams,
often called topology
diagrams, use
symbols to represent
devices within the
network.
• Important terms to
know include:
• Network
Interface Card
(NIC)
• Physical Port
• Interface
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Dermot Clarke TU Dublin 2022
Components of a Network
Topology Diagrams
• Physical topology diagrams - Identify
the physical location of intermediary
devices and cable installation.
• Logical topology diagrams -
Identify devices, ports, and
addressing scheme.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Dermot Clarke TU Dublin 2022
Globally Connected
Providing Resources in a Network
Networks of Many Sizes
Small Home / Office Networks
Medium to Large Networks
World Wide Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Dermot Clarke TU Dublin 2022
Many homes and small offices are more commonly being connected directly with fiber
optic cables. This enables an ISP to provide higher bandwidth speeds and support
more services such as Internet, phone, and TV.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Dermot Clarke TU Dublin 2022
Converged Networks
Multiple services-multiple networks
Traditional telephone, radio, television, and
computer data networks each have their own
individual networks, every one of these services
required a different technology to carry its
particular communication signal.
Converged networks
Technology advances are enabling us to
consolidate these disparate networks onto one
platform - a platform defined as a converged
network.
The flow of voice, video, and data traveling
over the same network eliminates the need to
create and maintain separate networks.
On a converged network there are still many
points of contact and many specialized
devices - for example, personal computers,
phones, TVs, personal assistants, and retail
point-of-sale registers - but only one common
network infrastructure.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Dermot Clarke TU Dublin 2022
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
1.Fault Tolerance
2.Scalability
3.Quality of Service (QoS)
4.Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Dermot Clarke TU Dublin 2022
Reliable Network
Fault Tolerance:
The expectation is that the
Internet is always available.
Limits the impact of a
failure, so that the fewest
devices are affected.
Example multiple paths
between the source and
destination of a message. If
one path fails, the
messages can be instantly
sent over a different link.
Having multiple paths to a
destination is known as
redundancy.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Dermot Clarke TU Dublin 2022
Reliable Network
Fault Tolerance:
Another way reliable networks is
by implementing a packet-
switched network.
Packet switching splits traffic into
packets that are routed over a
shared network. A single
message, such as an email or a
video stream, is broken up into
multiple message blocks, called
packets.
The routers within the network
switch the packets based on the
condition of the network at that
moment. This means that all the
packets in a single message could
take very different paths to the
destination.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Dermot Clarke TU Dublin 2022
Reliable Network
Scalable Networks
A scalable network can expand quickly to support new users
and applications without impacting the performance of the
service being delivered to existing users.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Dermot Clarke TU Dublin 2022
Reliable Network
Providing (QoS)
Networks must provide secure, predictable, measurable, and, at
times, guaranteed services.
The packet-switched network architecture does not guarantee
that all packets that comprise a message will arrive on time, in
their correct in order, or even that they will arrive at all.
Examples of priority decisions for an organization might include:
Time-sensitive communication - increase priority for services like
telephony or video distribution.
Non time-sensitive communication - decrease priority for web page
retrieval or email.
High importance to organization - increase priority for production control
or business transaction data.
Undesirable communication - decrease priority or block unwanted activity,
like peer-to-peer file sharing or live entertainment
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Dermot Clarke TU Dublin 2022
Reliable Network
Quality of Service
Voice and live video
transmissions require higher
expectations for those services
being delivered.
Have you ever watched a live
video with constant breaks and
pauses? This is caused when
there is a higher demand for
bandwidth than available – and
QoS isn’t configured.
• Quality of Service (QoS) is the
primary mechanism used to
ensure reliable delivery of
content for all users.
• With a QoS policy in place, the
router can more easily manage
the flow of data and voice
traffic.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Dermot Clarke TU Dublin 2022
Reliable Network
Network Security There are two main types of
network security that must be
addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the
devices
• Information Security
• Protection of the information or data
transmitted over the network
CIA
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Dermot Clarke TU Dublin 2022
Network Security
Security Threats
•Network security is an integral
part of networking regardless of
the size of the network.
•The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service
that is expected of the network.
•Securing a network involves
many protocols, technologies,
devices, tools, and techniques
in order to secure data and
mitigate threats.
•Threat vectors might be
external or internal.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Dermot Clarke TU Dublin 2022
Network Security
Security Threats (Cont.)
• External Threats:
• Viruses, worms, and Trojan horses
• Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
• Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Dermot Clarke TU Dublin 2022
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Dermot Clarke TU Dublin 2022
Network Security
Security Solutions (Cont.)
• Larger networks have additional
security requirements:
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems
(IPS)
• Virtual private networks (VPN)
• The study of network security starts
with a clear understanding of the
underlying switching and routing
infrastructure.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Dermot Clarke TU Dublin 2022
Network Trends
New trends
The role of the network must adjust and continually transform in
order to be able to keep up with new technologies and end user
devices as they constantly come to the market.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Dermot Clarke TU Dublin 2022
Network Trends
Bring Your Own Device
Bring Your Own Device (BYOD) allows
users to use their own devices giving
them more opportunities and greater
flexibility.
BYOD allows end users to have the
freedom to use personal tools to access
information and communicate using
their:
• Laptops
• Netbooks
• Tablets
• Smartphones
• E-readers
BYOD means any device, with any
ownership, used anywhere.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Dermot Clarke TU Dublin 2022
Network Trends
Online Collaboration
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Dermot Clarke TU Dublin 2022
Network Trends
Online Collaboration
Individuals want to connect to the network, not only for access
to data applications, but also to collaborate with one another.
Collaboration is defined as “the act of working with another or
others on a joint project.” Collaboration tools, give employees,
students, teachers, customers, and partners a way to instantly
connect, interact, and achieve their objectives. Example Cisco
Webex Teams, Slack, Google Docs, Microsoft Teams.
For businesses, collaboration is a critical and strategic priority
that organizations are using to remain competitive.
Collaboration is also a priority in education. Students need to
collaborate to assist each other in learning, to develop team
skills used in the work force, and to work together on team-
based projects.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Dermot Clarke TU Dublin 2022
Network Trends
Video Communication
Another trend in networking that is critical to the
communication and collaboration effort is video. Video is
being used for communications, collaboration, and
entertainment. Video calls can be made to and from
anywhere with an Internet connection.
Video conferencing is a powerful tool for communicating with
others at a distance, both locally and globally.
Video is becoming a critical requirement for effective
collaboration as organizations extend across geographic and
cultural boundaries.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Dermot Clarke TU Dublin 2022
Network Trends
Cloud Computing
Cloud computing allows us to store personal files or backup our
data on servers over the internet.
• Applications can also be accessed using the Cloud.
• Allows businesses to deliver to any device anywhere in the world.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Dermot Clarke TU Dublin 2022
Network Trends
Technology Trends in the Home
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Dermot Clarke TU Dublin 2022
Network Trends
Powerline Networking