The Network
The Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Globally Connected
Networking Today
Network has no boundary and
supports the way we:
• Learn
• Communicate
• Work
• Play
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Communicating in a Connected World
What is the Network?
Are you Online?
• For most of us, the Internet has become a large part of everyday life.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
The physical network that carries Internet traffic
between different computer systems is
the Internet backbone. In the early days of the
Internet, ARPANET served as the system's
backbone. Today, several large corporations
provide the routers and cable that make up the
Internet backbone. These companies are
upstream Internet Service Providers (ISPs).
That means that anyone who wants to access
the Internet must ultimately work with these
companies, which include:
•UUNET
•Level 3
•Verizon
•AT&T
•Qwest
•Sprint
•IBM
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
ARPANET
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Bandwidth vs Throughput
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Download time
Calculate the required time for download of data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Transmitting Data on the Network
The Bit
• Computers use binary codes to represent and interpret letters, numbers
and special characters with bits.
• Each group of eight bits, such as the representations of letters and
numbers, is known as a byte.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Communicating in a Connected World
It’s All About the Speed
Measuring Bandwidth
• Digital bandwidth is the amount of data that can flow from one place to
another in a given amount of time measured in the number of bits that
(theoretically) can be sent across the media in a second.
Measuring Throughput
• Throughput is the actual measure of the transfer of bits across the
media over a given period of time.
• Many factors influence throughput including the amount of data being
sent / received, the types of data being transmitted, and the
accumulated latency created by the number of network devices
encountered between source and destination.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Measuring Bandwidth
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Globally Connected
Providing Resources in a Network
Networks of Many Sizes
• Small Home / Office Networks
• Medium to Large Networks
• World Wide Network
Peer-to-Peer
• Computers can be both server and client at
the same time.
• What are the advantages?
• What are the disadvantages?
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Clients and Servers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Peer-to-Peer Network
What does Peer-to-Peer mean?
Network in which a host can be a client and a server for other
hosts.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
ISPs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
SEA-ME-WE 4
https://en.wikipedia.org/wiki/SEA-ME-WE_4
South East Asia–Middle East–Western Europe 4 (SEA-ME-
WE 4) is an optical fibre submarine communications cable
system that carries telecommunications ...Lit capacity: 2.3
Tbits/s/pair (two fibre pairs)
Owner(s): Consortium
Design capacity: 1.28 Tbit/s (2005); 2.8 Tbit/s ...
Construction beginning: 2004
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
SEA-ME-WE 5
https://en.wikipedia.org/wiki/SEA-ME-WE_5
South East Asia–Middle East–Western Europe 5 (SEA-ME-
WE 5) is an optical fibre submarine communications cable
system that carries telecommunications ...Design
capacity: 24 Tbit/s (3 fibre pairs)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
LANs, WANs, and the
Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Overview of Network Components
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Network devices:
•Computers
•Hubs
•Switches
•Routers
•Wireless access points
Network media:
•Twisted-pair copper cabling
•Fiber-optic cabling
•Radio waves
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Network Devices
Switches
• A switch (multiport bridge) has several ports and refers to a
table of MAC addresses to determine which port to use to
forward the frame.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Routers
• Devices that connect entire networks to each other. They use IP
addresses to forward packets to other networks.
• A router can be a computer with special network software installed
or can be a device built by network equipment manufacturers.
• Routers contain tables of IP addresses along with optimal routes
to other networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Wireless Access Points (WAP)
• Provide network access to wireless devices such as laptops and
PDAs.
• Use radio waves to communicate with radios in computers, PDAs,
and other wireless access points.
• Have limited range of coverage.
Multipurpose Devices
• Perform more than one function.
• More convenient to purchase and configure just one device.
• Combines the functions of a switch, a router and a wireless access
point into one device.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Network Media
Communication across a network is carried on a medium.
The medium provides the channel over which the message
travels from source to destination.
Interconnect devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Network Media
Metallic wires within cables - data is encoded into electrical
impulses
Glass or plastic fibers (fiber optic cable) - data is encoded as
pulses of light
Wireless transmission - data is encoded using wavelengths
from the electromagnetic spectrum
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Network Representations
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Network Interface Card –
A NIC, or LAN adapter, provides the physical connection to the
network at the PC or other end device. The media that are
connecting the PC to the networking device, plug directly into
the NIC
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Topology Diagrams
provide a visual map of how the network is connected.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Types of Networks
Network infrastructures can vary greatly in terms of:
Size of the area covered
Number of users connected
Number and types of services available
Area of responsibility
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
LANs, WANs, and the Internet
LANs and WANs
Local Area Networks
• Spans across small geographical area
• Interconnects end devices
• Administrated by a single organization
• Provide high speed bandwidth to
internal devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
LANs, WANs, and the Internet
The Internet, Intranets, and Extranets
Intranets and Extranets
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
The Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
IPv4 Addresses and
Subnet Masks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
IPv4 Addresses and Subnet Masks
Purpose of the IPv4 Address
What is an IPv4 Address?
• Is a logical network address that identifies a particular host
• Configured and is unique on the network for communications
• Is associated with a network interface card
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
IPv4 Addresses and Subnet Masks
IP Address Structure
IPv4 Addressing
• 32 binary bits
• For ease of use, the 32 bits are group into four 8-bit bytes called octets.
• The octets are represented in dotted-decimal notation.
Binary to Decimal
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
IPv4 Addresses and Subnet Masks
Parts of an IP Address
Networks and Hosts
• Logical 32-bit IPv4 address is hierarchical and is made up of two parts
o Network
o Host
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Types of IPv4 Addresses
Public and Private IP Addresses
• Private Addresses - IETF reserved some Internet address space for
private networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Types of IPv4 Addresses
Unicast, Broadcast and Multicast Addresses
A Message for Me
• Unique destination MAC
and IP addresses
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Types of IPv4 Addresses
Unicast, Broadcast and Multicast Addresses (Cont.)
Just for this Group
• A single packet is sent to a selected set of hosts in the multicast group
• Reserved IPv4 address
o Reserved multicast range: 224.0.0.0 to 239.255.255.255
o Reserved multicast range on local network: 224.0.0.0 to
224.0.0.255
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
How IPv4 Addresses are Obtained
Static and Dynamic Address Assignment
Assigning Addresses
• Can be done statically or
dynamically
• Assign an IPv4 address, subnet
mask, default gateway and other
necessary info for network
communications
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
LANs, WANs, and the Internet
Internet Connections
Internet Access Technologies
• Internet Service Provider (ISP)
• Broadband cable
• Broadband Digital Subscriber Line (DSL)
• Wireless WANs
• Mobile Services
• Business DSL
• Leased Lines
• Metro Ethernet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Home and Small Office Internet Connections
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Cable - Typically offered by cable television service providers, the Internet
data signal is carried on the same cable that delivers cable television
DSL - Digital Subscriber Lines provide a high bandwidth, always on,
connection to the Internet. DSL runs over a telephone line. In general,
small office and home office users connect using Asymmetrical DSL
(ADSL), which means that the download speed is faster than the upload
speed.
Cellular - Cellular Internet access uses a cell phone network to connect.
Wherever you can get a cellular signal, you can get cellular Internet
access.
Satellite - The availability of satellite Internet access is a real benefit in
those areas that would otherwise have no Internet connectivity at all.
Dial-up Telephone - An inexpensive option that uses any phone line and
a modem. The low bandwidth provided by a dial-up modem connection is
usually not sufficient for large data transfer,
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Businesses Internet Connections
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Dedicated Leased Line - Leased lines are actually reserved
circuits within the service provider’s network that connect
geographically separated offices for private voice and/or data
networking. The circuits are typically rented at a monthly or
yearly rate. They can be expensive.
Ethernet WAN - Ethernet WANs extend LAN access
technology into the WAN. Ethernet is a LAN technology you
will learn about in a later chapter. The benefits of Ethernet
are now being extended into the WAN.
DSL - Business DSL is available in various formats. A
popular choice is Symmetric Digital Subscriber Lines (SDSL)
which is similar to the consumer version of DSL, but provides
uploads and downloads at the same speeds.
Satellite - Similar to small office and home office users,
satellite service can provide a connection when a wired
solution is not available.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
The Network as a Platform
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
The Network as a Platform
Converged Networks
Traditional Separate Networks
• Each network with its own rules and
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Computer to Network Connection
Wireless and Wired Router Configurations
To connect to a network, attach
a straight-through Ethernet cable
to the NIC port.
The other end connects to a
router or to a
telecommunications port that is
wired so that data will reach the
router.
For wireless connections,
configure the router with the
following:
Network Mode (set the 802.11
standard)
Network Name (SSID)
Channel (important when there are
multiple APs in the network)
Wireless Security (should be WPA2)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Computer to Network Connection
Network Sharing
All Windows computers on a network must be
part of either a domain or a workgroup.
Before computers can share resources, they
must share the same domain name or
workgroup name.
Mapping a local drive is a useful way to
access a single file, specific folders, or an
entire drive between different operating
systems over a network.
Determine which resources will be shared
over the network and the type of permissions
users will have to the resources.
Read - user can view data in files and run programs
Change - user can add files and subfolders, change
the data in files, and delete subfolders and files
Full Control - user can change permissions of files and
folders
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Network Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Am I at Risk?
Hackers and Intruders
What Do They Want?
When the hacker gains access to the network, four types of threat may arise:
Information theft, Identity theft, Data loss / manipulation, and Disruption of
service
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Am I at Risk?
Social Engineering Attacks
Social Engineering
• In the context of computer and network security, social engineering
refers to a collection of techniques used to deceive internal users into
performing specific actions or revealing confidential information.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Methods of Attack
Denial of Service and Brute Force Attacks
An attacker uses a DoS attack to perform these functions:
• Flood a system or network with traffic to prevent legitimate network traffic from flowing
• Disrupt connections between a client and server to prevent access to a service
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Methods of Attack
Denial of Service and Brute Force Attacks
(Cont.)
DDoS
• DDoS is a more sophisticated and potentially damaging form of the DoS
attack. It is designed to saturate and overwhelm network links with
useless data.
Brute Force
• With brute force attacks, a fast computer is used to try to guess
passwords or to decipher an encryption code. The attacker tries a large
number of possibilities in rapid succession to gain access or crack the
code.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Methods of Attack
Other Types of Malware
Spyware
• Spyware is any program that gathers personal information from your
computer without your permission or knowledge. This information is
sent to advertisers or others on the Internet and can include passwords
and account numbers.
Adware
• Adware is a form of spyware
used to collect information
about a user based on
websites the user visits. That
information is then used for
targeted advertising.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Methods of Attack
Other Types of Malware
Botnets and Zombies
• When infected, the “zombie” computer contacts servers managed by the
botnet creator. These servers act as a command and control (C&C)
center for an entire network of compromised devices, or "botnet."
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64