ITEP 207 Networking 1 - Module 1
Document Details
Uploaded by SnazzyBoltzmann7523
Laguna State Polytechnic University
Tags
Related
- Networking Fundamentals PDF
- Chapter 7 Networking Connecting Computing Devices PDF
- Netcentric Fundamentals (ITT501) Chapter 1 PDF
- AI Introduction to Computer Networks Fall 2024-2025 Lecture Notes PDF
- Network Fundamentals - Chapter 1 PDF
- Cours1 PDF - Principes des réseaux informatiques - Novembre 2024
Summary
This presentation covers the foundational concepts of computer networking, including network components, media, internet connections, and network security. The content is from Module 1 of the ITEP 207 Networking 1 course, focusing on topics essential to understanding how networks function and are structured.
Full Transcript
ITEP 207 NETWORKING 1 MODULE 1 1.1 Networks Affect Our Lives Networks Connect Us Networks Connect Us Communication is almost as important to us as our reliance on air, water, food, and shelter. In today’s world, through the use of networks, we are connected like never before. ...
ITEP 207 NETWORKING 1 MODULE 1 1.1 Networks Affect Our Lives Networks Connect Us Networks Connect Us Communication is almost as important to us as our reliance on air, water, food, and shelter. In today’s world, through the use of networks, we are connected like never before. No Boundaries No Boundaries World Without Boundaries – A concept where physical, cultural, and technological barriers are minimized, allowing seamless global interaction, communication, and collaboration. Global Communities – Groups of people connected across different countries and cultures, united by shared interests, goals, or digital platforms, fostering international cooperation and understanding. Human Network – An interconnected system of individuals who share information, resources, and relationships, enabling knowledge exchange and collective growth beyond geographical limitations. 1.2 Network Components Network Components – Host Roles Every computer on a network is called a host or end device. Network Components – Host Roles Servers are computers that provide information to other end devices Network Components – Host Roles Clients are computers that send requests to the servers to retrieve information web page from a web server email from an email server Network Components – Peer-to- Peer Network Components – Peer-to- Peer In Peer-to-Peer Network, it is possible to have a device be a client and a server. Network Components – End Devices Network Components – End Devices An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end device. Network Components – Intermediary Devices Network Components – Intermediary Devices Management of data as it flows through a network is also the role of an intermediary device, including: Regenerate and retransmit data signals. Maintain information about what pathways exist in the network. Notify other devices of errors and communication failures. Network Components – Network Media Communication across a network is carried through a medium which allows a message to travel from source to destination. Network Components – Network Media COPPER CABLES Network Components – Network Media The left side of the image displays twisted pair copper cables, commonly used in Ethernet networking.The right side shows network cables with RJ45 connectors, which are used to connect devices like computers, routers, and switches. Role of Copper Cables in Networking: Twisted Pair Cables (e.g., Cat5e, Cat6) – Used for LAN connections. Coaxial Cables – Used in older networks and cable internet. Ethernet Cables with RJ45 Connectors – Standard Network Components – Network Media FIBER-OPTIC CABLES Network Components – Network Media Fiber Optic Cables are another type of network media used for high-speed data transmission. Unlike copper cables, which use electrical signals, fiber optics use light pulses to transfer data over long distances with minimal interference. Network Components – Network Media Key Features of Fiber Optic Cables: Higher Bandwidth – Supports much faster data transfer speeds than copper cables. Longer Distance – Can transmit data over kilometers without signal degradation. Less Interference – Immune to electromagnetic interference (EMI) and crosstalk. More Secure – Harder to tap into compared to copper cables. Network Components – Network Media Types of Fiber Optic Cables: Single-Mode Fiber (SMF) – Used for long-distance communication, such as in ISPs and telecom networks. Multi-Mode Fiber (MMF) – Used for shorter distances, like in local networks (LANs) and data centers. Network Components – Network Media WIRELESS NETWORK MEDIA Network Components – Network Media Wireless networks use radio waves, microwaves, or infrared signals instead of physical cables to transmit data. Common examples include: Wi-Fi (802.11 Standards) – Used for local wireless networking (e.g., home and office Wi-Fi). Bluetooth – Short-range wireless communication for devices like smartphones and headphones. Cellular Networks (3G, 4G, 5G) – Used for mobile internet connectivity. Satellite Communication – Enables global coverage for internet and broadcasting. Network Components – Network Media 1.3 Network Representations and Topologies Network Representations and Topologies Network Representations and Topologies Network diagrams, often called topology diagrams, use symbols to represent devices within the network. Network Representations and Topologies Physical topology diagrams illustrate the physical location of intermediary devices and cable installation. Network Representations and Topologies Network Representations and Topologies Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network. Network Representations and Topologies Network Representations and Topologies Important terms to know include: Network Interface Card (NIC) Physical Port Interface 1.4 Common Types of Networks Common Types of Networks - Networks of Many Sizes Common Types of Networks - Networks of Many Sizes Common Types of Networks - LANs and WANs Network infrastructures vary greatly in terms of: Size of the area covered Number of users connected Number and types of services available Common Types of Networks - LANs and WANs Two most common types of networks: Local Area Network (LAN) Wide Area Network (WAN) Common Types of Networks - LANs and WANs A LAN is a network infrastructure that spans a small geographical area. Common Types of Networks - LANs and WANs A WAN is a network infrastructure that spans a wide geographical area. Common Types of Networks - LANs and WANs Common Types of Networks - LANs and WANs Common Types of Networks - The Internet The internet is a worldwide collection of interconnected LANs and WANs. The internet is not owned by any individual or group. Common Types of Networks - The Internet The following groups were developed to help maintain structure on the internet: IETF ICANN IAB Common Types of Networks - Intranets and Extranets An intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization. Common Types of Networks - Intranets and Extranets An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network. Common Types of Networks - Intranets and Extranets 1.5 Internet Connections Internet Connections – Home and Small Office Internet Connections Internet Connections – Home and Small Office Internet Connections Internet Connections – Home and Small Office Internet Connections Internet Connections – Home and Small Office Internet Connections Internet Connections – The Converging Network Before converged networks, an organization would have been separately cabled for telephone, video, and data. Each of these networks would use different technologies to carry the signal. Each of these technologies would use a different set of rules and standards. Internet Connections – The Converging Network Internet Connections – The Converging Network Converged networks can deliver data, voice, and video over the same network infrastructure. The network infrastructure uses the same set of rules and standards. Internet Connections – The Converging Network 1.6 Reliable Networks Reliable Network – Network Architecture Network Architecture refers to the technologies that support the infrastructure that moves data across the network There are four basic characteristics that the underlying architectures need to address to meet user expectations: Reliable Network – Network Architecture Reliable Network – Fault Tolerance A fault tolerant network limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance. Reliable Network – Fault Tolerance Reliable Network – Fault Tolerance Reliable networks provide redundancy by implementing a packet switched network: Packet switching splits traffic into packets that are routed over a network. Each packet could theoretically take a different path to the destination. Reliable Network – Scalability A scalable network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users. Reliable Network – Scalability Reliable Network – Quality of Service Quality of Service (QoS) is the primary mechanism used to ensure reliable delivery of content for all users. With a QoS policy in place, the router can more easily manage the flow of data and voice traffic. Reliable Network – Quality of Service Reliable Network – Network Security There are two main types of network security that must be addressed: Network infrastructure security Physical security of network devices Preventing unauthorized access Reliable Network – Network Security There are two main types of network security that must be addressed: Information Security Protection of the information or data transmitted over the network Reliable Network – Network Security Three goals of network security: Confidentiality – only intended recipients can read the data Integrity – assurance that the data has not be altered with during transmission Availability – assurance of timely and reliable access to data for authorized users 1.7 Network Trends Network Trends – Recent Trends Several new networking trends that effect organizations and consumers: Bring Your Own Device (BYOD) Online collaboration/ Video communications Cloud computing Network Trends – Bring Your Own Device Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater flexibility. BYOD means any device, with any ownership, used anywhere. Network Trends – Online Collaboration/ Video Communication Network Trends – Online Collaboration/ Video Communication Collaboration is a very high priority for businesses and in education. Collaboration tools including Cisco WebEx gives users a way to instantly connect and interact. Network Trends – Online Collaboration/ Video Communication Video calls are made to anyone, regardless of where they are located. Video conferencing is a powerful tool for communicating with others. Video is becoming a critical requirement for effective collaboration. Network Trends – Cloud Computing Cloud computing allows us to store personal files or backup our data on servers over the internet. Applications can also be accessed using the Cloud. Allows businesses to deliver to any device anywhere in the world. Cloud computing is made possible by data centers. Network Trends – Cloud Computing Four types of Clouds: Public Clouds Available to the general public through a pay-per- use model or for free. Network Trends – Cloud Computing Four types of Clouds: Private Clouds Intended for a specific organization or entity Network Trends – Cloud Computing Four types of Clouds: Hybrid Clouds Made up of two or more Cloud types Network Trends – Cloud Computing Four types of Clouds: Hybrid Clouds Made up of two or more Cloud types Custom Clouds Built to meet the needs of a specific industry Network Trends – Technology Trends in the Home Smart home technology Network Trends – Technology Trends in the Home Power-line networking Network Trends – Technology Trends in the Home Wireless Broadband 1.8 Network Security Network Security – Security Threats Network security is an integral part of networking regardless of the size of the network. Securing a network involves many protocols, technologies, devices, tools, and techniques in order to secure data and mitigate threats. Network Security – Security Threats Threat vectors might be external or internal. Network Security – Security Threats External Threats: Viruses, worms, and Trojan horses Spyware and adware Denial of service attacks Data interception and theft Identity theft Network Security – Security Threats Internal Threats: lost or stolen devices accidental misuse by employees malicious employees Network Security – Security Solutions Security must be implemented in multiple layers using more than one security solution. The study of network security starts with a clear understanding of the underlying switching and routing infrastructure. Network Security – Security Solutions Network Security – Security Solutions Network security components for home or small office network: Antivirus and antispyware software should be installed on end devices. Firewall filtering used to block unauthorized access to the network. Network Security – Security Solutions Larger networks have additional security requirements: Dedicated firewall system Access control lists (ACL) Intrusion prevention systems (IPS) Virtual private networks (VPN) Network Security – Security Solutions Larger networks have additional security requirements: Dedicated firewall system Access control lists (ACL) Intrusion prevention systems (IPS) Virtual private networks (VPN) Network Security – Security Solutions Larger networks have additional security requirements: Dedicated firewall system Access control lists (ACL) Intrusion prevention systems (IPS) Virtual private networks (VPN) Network Security – Security Solutions Larger networks have additional security requirements: Dedicated firewall system Access control lists (ACL) Intrusion prevention systems (IPS) Virtual private networks (VPN) END OF PRESENTATION