Podcast
Questions and Answers
What is the primary goal of network security focused on ensuring that only authorized users can access data?
What is the primary goal of network security focused on ensuring that only authorized users can access data?
Which of the following items is considered part of network infrastructure security?
Which of the following items is considered part of network infrastructure security?
Which aspect of network security assures that data has not been altered during transmission?
Which aspect of network security assures that data has not been altered during transmission?
What does BYOD stand for in the context of network trends?
What does BYOD stand for in the context of network trends?
Signup and view all the answers
Which of the following is NOT a benefit associated with BYOD?
Which of the following is NOT a benefit associated with BYOD?
Signup and view all the answers
What is one of the main benefits of online collaboration tools like Cisco WebEx?
What is one of the main benefits of online collaboration tools like Cisco WebEx?
Signup and view all the answers
What is one of the critical aspects of ensuring data availability in network security?
What is one of the critical aspects of ensuring data availability in network security?
Signup and view all the answers
Which type of security focuses on protecting the information transmitted over the network?
Which type of security focuses on protecting the information transmitted over the network?
Signup and view all the answers
What is the primary purpose of the Internet Engineering Task Force (IETF)?
What is the primary purpose of the Internet Engineering Task Force (IETF)?
Signup and view all the answers
Which of the following correctly describes a characteristic of the internet?
Which of the following correctly describes a characteristic of the internet?
Signup and view all the answers
What distinguishes an intranet from an extranet?
What distinguishes an intranet from an extranet?
Signup and view all the answers
Which internet connection type utilizes fiber optic cables as a primary medium?
Which internet connection type utilizes fiber optic cables as a primary medium?
Signup and view all the answers
What major benefit does satellite internet provide?
What major benefit does satellite internet provide?
Signup and view all the answers
Which of the following internet connection types is best described as low bandwidth and inexpensive?
Which of the following internet connection types is best described as low bandwidth and inexpensive?
Signup and view all the answers
Which organization is responsible for managing the domain name system?
Which organization is responsible for managing the domain name system?
Signup and view all the answers
What is a defining feature of a wide area network (WAN) compared to a local area network (LAN)?
What is a defining feature of a wide area network (WAN) compared to a local area network (LAN)?
Signup and view all the answers
What is the primary purpose of installing antivirus and antispyware software on end devices?
What is the primary purpose of installing antivirus and antispyware software on end devices?
Signup and view all the answers
Which security measure is commonly used in larger networks to control traffic flow?
Which security measure is commonly used in larger networks to control traffic flow?
Signup and view all the answers
What certification verifies foundational networking technologies and ensures relevance in next-generation technologies?
What certification verifies foundational networking technologies and ensures relevance in next-generation technologies?
Signup and view all the answers
Which of the following is NOT listed as a component required for larger network security?
Which of the following is NOT listed as a component required for larger network security?
Signup and view all the answers
Which technology is primarily focused on securing data transmission over unsecured networks?
Which technology is primarily focused on securing data transmission over unsecured networks?
Signup and view all the answers
Which tool can be used to find employment opportunities related to networking?
Which tool can be used to find employment opportunities related to networking?
Signup and view all the answers
What does the new CCNA focus primarily on?
What does the new CCNA focus primarily on?
Signup and view all the answers
What is the function of a dedicated firewall system in a larger network?
What is the function of a dedicated firewall system in a larger network?
Signup and view all the answers
What type of connection is described as reserved circuits within the service provider’s network for connecting distant offices?
What type of connection is described as reserved circuits within the service provider’s network for connecting distant offices?
Signup and view all the answers
Which network characteristic is focused on ensuring minimal impact from failures?
Which network characteristic is focused on ensuring minimal impact from failures?
Signup and view all the answers
In a converged network, what three services are typically carried on one link?
In a converged network, what three services are typically carried on one link?
Signup and view all the answers
Which characteristic of network architecture involves adjusting to increasing numbers of users and devices?
Which characteristic of network architecture involves adjusting to increasing numbers of users and devices?
Signup and view all the answers
What is the role of Quality of Service (QoS) in network architecture?
What is the role of Quality of Service (QoS) in network architecture?
Signup and view all the answers
Which connection type extends local area network (LAN) access into the wide area network (WAN)?
Which connection type extends local area network (LAN) access into the wide area network (WAN)?
Signup and view all the answers
What type of service can provide connectivity when traditional wired solutions are not available?
What type of service can provide connectivity when traditional wired solutions are not available?
Signup and view all the answers
Which characteristic does NOT pertain to user expectations in network architecture?
Which characteristic does NOT pertain to user expectations in network architecture?
Signup and view all the answers
What is the primary function of an intermediary network device?
What is the primary function of an intermediary network device?
Signup and view all the answers
Which of the following is NOT a characteristic of a Peer-to-Peer network?
Which of the following is NOT a characteristic of a Peer-to-Peer network?
Signup and view all the answers
What type of medium uses electrical impulses to communicate across a network?
What type of medium uses electrical impulses to communicate across a network?
Signup and view all the answers
Which advantage is NOT associated with Peer-to-Peer networks?
Which advantage is NOT associated with Peer-to-Peer networks?
Signup and view all the answers
How do intermediary devices manage data flow?
How do intermediary devices manage data flow?
Signup and view all the answers
What is the main disadvantage of a Peer-to-Peer network?
What is the main disadvantage of a Peer-to-Peer network?
Signup and view all the answers
Which of the following best describes an end device in a network?
Which of the following best describes an end device in a network?
Signup and view all the answers
Which type of network medium utilizes modulation of specific frequencies?
Which type of network medium utilizes modulation of specific frequencies?
Signup and view all the answers
What is one benefit of smart home technology in relation to ovens?
What is one benefit of smart home technology in relation to ovens?
Signup and view all the answers
What characterizes a Wireless Internet Service Provider (WISP)?
What characterizes a Wireless Internet Service Provider (WISP)?
Signup and view all the answers
Which of the following is NOT considered an external threat to network security?
Which of the following is NOT considered an external threat to network security?
Signup and view all the answers
What type of attacks belong to external security threats?
What type of attacks belong to external security threats?
Signup and view all the answers
Which of the following methods best describes the recommended approach to network security?
Which of the following methods best describes the recommended approach to network security?
Signup and view all the answers
Which type of technology is comparable to wireless broadband?
Which type of technology is comparable to wireless broadband?
Signup and view all the answers
What is a common consequence of a denial of service attack?
What is a common consequence of a denial of service attack?
Signup and view all the answers
What internal threat refers to accidental issues caused by employees?
What internal threat refers to accidental issues caused by employees?
Signup and view all the answers
Study Notes
Introduction to Networking
- Introduction to networking course, CT043-3-1, Version VE1
- Topics include networks affecting daily lives, network components, representations and topologies, common network types, Internet connections, reliable networks, network trends, network security and the IT professional.
- Key terms for exams include Host/Peer to Peer, Client/server, End Devices/Intermediary Devices, Network Media, Local Area Network/Wide Area Network (LAN/WAN), Fault Tolerance, Reliability, Scalability, Quality of Service, BYOD, Online Collaboration, Cloud Computing, and Security Threats and Solutions.
Networking Today
- Networking today is a world without boundaries, with global communities and a connected human network.
Topic and Structure of the Lesson
- Networks Affect Our Lives: Networks impact daily life.
- Network Components: Hosts and network devices are used in topologies.
- Network Representations and Topologies: Network diagrams and how they are used.
- Common Types of Networks: Characteristics of different types of networks.
- Internet Connections: How LANs and WANs connect to the internet.
- Reliable Networks: Four basic requirements for a reliable network.
- Network Trends: BYOD, online collaboration, video, and cloud computing influencing network use.
- Network Security: Security threats and solutions for all networks.
- The IT Professional: Networking career opportunities.
Key Terms
- Host/Peer to Peer
- Client and server
- End Devices / Intermediary Devices
- Network Media
- Local Area Network (LAN) / Wide Area Network (WAN)
- Fault Tolerance
- Reliability
- Scalability
- Quality of Service (QoS)
- BYOD
- Online Collaboration
- Cloud Computing
- Security Threats and Solutions
Network Components: Host Roles
- Every computer on a network is a host.
- Servers provide information to end devices.
- Email servers
- Web servers
- File servers
- Clients request information from servers.
- Web Page from a web server
- Email from an email server
Network Components: Peer-to-Peer
- Devices can be both clients and servers.
- Recommended for small networks
- Advantages: Easy setup, less complex, lower cost, simple tasks.
- Disadvantages: No centralized admin, not secure, not scalable, slower performance.
Network Components: End Devices
- End devices originate and receive messages.
- Messages flow through the network to arrive at an end device.
Network Components: Intermediary Network Devices
- Intermediary devices connect end devices.
- Examples include switches, wireless access points, routers, and firewalls.
- Functions of intermediary devices include: regenerate and retransmit data signals, maintain information about paths, and notify devices of errors.
Network Components: Network Media
- Communication is carried via a medium.
- Media types are:
- Metal wires within cables: uses electrical impulses (Copper)
- Glass or plastic fibers within cables (Fiber-optic): uses pulses of light
- Wireless transmission (Wireless): uses modulation of specific frequencies (electromagnetic waves).
Network Representations and Topologies: Network Representations
- Topology diagrams represent devices in a network.
- Important terms: Network Interface Card (NIC), Physical Port, and Interface.
Network Representations and Topologies: Topology Diagrams
- Physical topology diagrams show physical location of devices.
- Logical topology diagrams illustrate devices, ports, and addressing.
Common Types of Networks
- Small Home Networks: Connect a few computers to each other and the internet.
- Small Office/Home Office (SOHO) Networks: Enable home or remote office computers to connect to a corporate network.
- Medium/Large Networks: Connect hundreds or thousands of interconnected computers.
- Wide Area Networks (WANs): Connect millions of computers worldwide (internet).
Common Types of Networks: LANs and WANs
- LANs (local area networks) and WANs (wide area networks) have varying:
- Area Covered
- Number of users connected
- Available Services
- Responsibility area
Common Types of Networks: The Internet
- A worldwide collection of interconnected LANs and WANs
- LANs connect to each other via WANs, using various communication forms.
- Internet structures are maintained by various groups collectively.
- IETF (Internet Engineering Task Force)
- ICANN (Internet Corporation for Assigned Names and Numbers)
- IAB (Internet Architecture Board)
Common Types of Networks: Intranets and Extranets
- Intranets are private networks with restricted access for organization members or authorized users.
- Extranets extend intranet access to individuals outside the organization, for authorized individuals.
Internet Connections: Home and Small Office Connections
- DSL: High bandwidth always-on connection over telephone
- Cable: High bandwidth always-on connection from cable television providers
- Cellular: Internet access via cellular network (e.g., smart phones).
- Satellite: Major benefit to rural areas using satellites for internet access.
- Dial-up telephone: Inexpensive, low bandwidth option using a modem
Internet Connections: Business Connections
- Dedicated Leased Lines: Reserved circuits in service providers' networks connecting distant offices for voice and data.
- Ethernet WAN: Extending LAN access technologies to WANs.
- DSL Business: Various formats including Symmetric Digital Subscriber Lines (SDSL)
- Satellite Broadband: Provides connections when other methods are unavailable.
Internet Connections: The Converging Network
- Converged data networks carry multiple services (data, voice, video) over one link.
- Networks use the same set of rules and standards.
Reliable Networks: Network Architecture
- Network architecture refers to technologies that support infrastructure and data transmission across a network.
- Reliable Networks are needed to meet user expectations:
- Fault Tolerance: Limit impact of a failure by providing multiple pathways for data transmission, avoiding single points of failure.
- Scalability: Allowing network to easily expand with new users and applications without performance impact for existing users.
- Quality of Service (QoS): Ensures reliable delivery of content (e.g., voice and video) by prioritizing delivery based on importance to the users.
- Security: Protecting the network from unauthorized access, safeguarding data and preventing loss, modification, or interference.
Reliable Networks: Fault Tolerance
- Fault tolerant networks limit failure impact by limiting affected devices, using multiple paths.
- Packet switching in a network divides traffic into packets with routing over various paths.
Reliable Networks: Scalability
- Scalable networks allow for quick and easy expansion of new users and services without impacting performance.
- Networks meet expectations because designers follow accepted standards and protocols.
Reliable Networks: Quality of Service (QoS)
- QoS is a mechanism to ensure reliable delivery of content (data, voice, video).
- Prioritizing delivery based on use.
Reliable Networks: Network Security
- Network infrastructure and devices must be physically secure.
- Threats include: external threats such as viruses, worms, Trojans, spyware, Zero days attacks, denial-of-service attacks, and data interception/theft. Internal treats include lost devices, accidental misuse by employees, and malicious employees.
- Security solutions: Multiple layers using various solutions: Antivirus software, antispyware software, Firewall filtering to block unauthorized access in home or small office networks. Larger networks need specialized hardware and software like dedicated firewall systems, Intrusion prevention systems (IPS), Access control lists (ACL), and Virtual private networks (VPNs).
Network Trends: Bring Your Own Device (BYOD)
- Users use their personal devices for greater flexibility and opportunities.
- Allowing personal devices may bring more opportunities to access information.
- Popular devices include: laptops, netbooks, tablets, smartphones, and e-readers.
Network Trends: Online Collaboration
- Collaborate and work with others on joint projects using collaboration tools like Cisco Webex.
- Collaboration tools like Cisco Webex teams provide functionality like instant messaging, posting images and videos, and sharing links.
- Collaboration is crucial in businesses and education for improved workflow.
Network Trends: Video Communication
- Video calls connect users regardless of location.
- Video conferencing is crucial for effective collaboration.
- Cisco Telepresence powers effective communication among users in diverse locations..
Network Trends: Cloud Computing
- Cloud computing allows users to store personal files and back up data on internet servers.
- Cloud applications are accessible from any device and anywhere.
- Smaller companies can lease server and storage services from larger providers.
- Cloud computing is supported by data centers facilitating various applications, making it accessible.
- Various types of clouds include public, private, hybrid, and custom clouds.
Network Trends: Technology Trends in the Home
- Smart home technology integrates appliances by allowing connections across the devices.
- Examples of integration include appliances that communicate with calendar schedules for cooking timings.
Network Trends: Wireless Broadband
- Another option to connect homes & small businesses using wireless internet services such as WISP for rural users.
- Other tools are cellular technology and related applications by using the same technology for smart phones.
The IT Professional: Networking Jobs
- Job opportunities for networking professionals are found at several locations provided for students, and Cisco Networking Academy students and alumni.
Chapter Summary
- Explains the everyday use of various networks.
- Describes the topologies and devices used in small to medium-sized business networks.
- Examines the fundamental characteristics of a network in small to medium-sized businesses.
- Explains the emerging trends in networking that affect their use in small to medium-sized businesses.
Q&A
What To Expect Next Week
- IPv4 Addressing.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the fundamentals of networking in today's digital world. This course covers essential topics such as network components, types, and security issues that affect daily life and the IT profession. Understanding these concepts is crucial for anyone interested in networking and information technology.