0% found this document useful (0 votes)
46 views

CHAPTER 1 - EXPLORE THE NETWORK - Ext

Uploaded by

Azizah Md Aziz
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

CHAPTER 1 - EXPLORE THE NETWORK - Ext

Uploaded by

Azizah Md Aziz
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 58

Explore The

Network
DFC20143 : Introduction To Network.
1.1 EXPLAIN LANs WANs AND THE INTERNET
COMPUTER NETWORKS
• Computer network is a group of computers and other devices(such as printer)
that are connected by some type of transmission media(cable/wireless).
• Two computers to thousands of computers connected across the world via the
Internet.
• Networks may link mainframe computers, desktop computers, printers, fax
machines, and phone systems.
• Networks allow multiple users to share devices and resources such as :
• printers
• faxes
• program and files
ADVANTAGES OF
NETWORKING
• Data and information sharing
• Hardware sharing
• Effective communication
• Internet access sharing
• Cost Efficiency
• Store data Centrally
COMMON NETWORK
ELEMENT
• Client - A computer on the network that requests resources or services from
another computer on a network.
• Server - A computer on the network that manages shared resources.
• Workstation - A personal computer ,which may or may not be connected to a
network.
• Network Interface Card - A device inside a computer that connects a computer to
the network media.
• Network Operating System(NOS) - The software that runs on a server and
enable a computer to control network access and manage resources.
• Node - A device such as, client, server, or other network equipment that is
identified by a unique network address.
COMMON NETWORK
ELEMENT
• Connectivity Device - A specialized device that allows multiple networks or
multiple parts of one network to connect and exchange data.
• Backbone - The backbone of a network that combines smaller network into a
large network.
• Segment - It is a physical partitioning of network. Usually, a segment is
composed of a group of nodes that use the same communications channel for
all their traffic.
• Topology - The physical layout of a computer network. Network topology can
be a ring, bus or star formation, or hybrid combinations.
• Transmission Media - Media that carrying the network signal (cable/chanel)
NETWORKING TECHNOLOGIES
CHANGING THE HOME ENVIRONMENT

TECHNOLOGY TRENDS IN
THE HOME
• Newest home trends include Cloud

‘smart home technology’


• Smart home technology is
technology that is integrated into
every-day appliances allowing
them to interconnect with other
devices, making them more
‘smart’ or automated
NETWORKING TECHNOLOGIES
CHANGING THE HOME ENVIRONMENT
POWERLINE
NETWORKING
• uses existing electrical wiring to
connect devices
• concept of “no new wires” means the
ability to connect a device to the
network wherever there is an
electrical outlet
• useful when wireless access points
cannot be used or cannot reach all
the devices in the home.
NETWORKING TECHNOLOGIES
CHANGING THE HOME ENVIRONMENT

WIRELESS BROADBAND
SERVICE
• Wireless Internet Service
Provider (WISP)
• commonly found in rural
environments where DSL or
cable services are not
available.
• Wireless Broadband Service
PROVIDING RESOURCES IN
NETWORK
• Peer to Peer
• Client/Server
Peer to Peer
• Peer to Peer(P2P) network is created when two or
more computer are connected and share resources
without going through separate server computer.
• The simplest peer-to-peer network consists of two
directly connected computers using a wired or
wireless connection.
• Multiple PCs can also be connected to create a larger
peer-to-peer network but this requires a network
device, such as a hub, to interconnect the computers.
Client / Server Network
• Use a central computer(server) to facilitate
communication and resource sharing between other
computers(client) on the network.
• It is a network where the servers provide services to
different clients.
• A centralized server provides client authentication
services.
• Servers play a key role in managing several
applications like access to shared files, printers, and
CATEGORIES OF NETWORK
There are four main categories of networks:
• Local Area Network (LAN) – is a relatively small network of computers,
printers, and other devices in single building or floor.
• Personal Area Network(PAN) - is a computer network organized around
an individual person.
• Metropolitan Area Network (MAN) – is a high-speed internetwork of
LANs across a metropolitan area.
• Wide Area Network (WAN) – traditionally connects LANs using the
PSTN(Public Switched Telephone Network) or more commonly the Internet.
To provide connectivity over a large geographic area.
Local Area Network
LAN characteristics:
• Group of interconnected computers within a small area. (room,
building, campus)
• Two or more pc's can from a LAN to share files, folders,
printers, applications and other devices.
• Coaxial or CAT 5 cables are normally used for connections.
• Due to short distances, errors and noise are minimum.
• Data transfer rate is 10 to 100 mbps.
• Example: A computer lab in a school.
Personal Area Network

PAN characteristics:
• Network organized by the individual user
for its personal use.
• Range - 10 meters
• Communication among the personal
devices themselves.
Metropolitan Area Network
MAN characteristics:
• Design to extend over a large area.(city or town)
• Connecting number of LAN's to form larger network, so that
resources can be shared.
• Networks can be up to 5 to 50 km.
• Owned by organization or individual.
• Data transfer rate is low compare to LAN.
• Example: Organization with different branches located in the
city.
Wide Area Network
WAN characteristics :
• Are country and worldwide network.
• Contains multiple LAN's and MAN's.
• Distinguished in terms of geographical range.
• Uses satellites and microwave relays.
• Data transfer rate depends upon the ISP provider and varies over
the location.
• Best example is the internet.
The Internet, Intranets, and Extranets

• The Internet
• Worldwide collection of
interconnected networks to
exchange various forms of
information through a
various forms of network
medium.
• Not owned by any individual
or group
The Internet, Intranets, and Extranets
Internet Intranet Extranet
It is a Global system It is a Private It is a Private
of interconnected network specific to network that uses
computer network. an organization. public network to
share information
with suppliers and
vendors.
It is means of It is means of It is means of
sharing information sharing sensitive sharing information
throughout the information between members
world. throughout and external
organization. members.
Users can access Users should have Users should have
Internet valid valid
BASIC REQUIREMENT OF
RELIABLE NETWORK
• Fault Tolerance
• Scalability
• Quality of Service (QOS)
• Security
Fault Tolerance
• Is one that limits the impact of a
failure, so that the fewest number
of devices are affected.
• These networks depend on multiple
paths between the source and
destination of a message.
• If one path fails, the messages can
be instantly sent over a different
link. Having multiple paths to a
destination is known as
redundancy.
Scalability
• A scalable network can
expand quickly to support
new users and
applications without
impacting the
performance of the service
being delivered to existing
users.
Quality Of Service (QOS)
• Quality of service (QoS) refers to
any technology that manages
data traffic to reduce packet
loss, latency and jitter on
the network.
• QoS controls and
manages network resources by
setting priorities for specific
types of data on the network.
Security
• There are two types of network security
concerns that must be addressed: network
infrastructure security and information
security.
• Securing a network infrastructure includes the
physical securing of devices that provide
network connectivity, and preventing
unauthorized access to the management
software that resides on them
• Information security refers to protecting the
information contained within the packets
being transmitted over the network and the
• 1.2. CLASSIFY NETWORK PROTOCOLS AND
COMMUNICATION
Cisco Internetwork Operating
System
• Infrastructure network devices use a network operating
system. The network operating system used on Cisco
devices is called the Cisco Internetwork Operating
System (IOS).
• Cisco IOS is a generic term for the collection of network
operating systems used on Cisco networking devices.
• The most common method of accessing these devices is
using a CLI(Command Line Interface).
Location of the Cisco IOS
• Cisco IOS stored in Flash
• Non-volatile storage, not lost when power is lost
• Can be changed or overwritten as needed
• Can be used to store multiple versions of IOS
• IOS copied from flash to volatile RAM when the
device is powered on.
• Quantity of flash and RAM memory determines
IOS that can be used
IOS Functions
• Major functions performed or enabled by Cisco routers and switches
include:
• Providing network security
• IP addressing of virtual and physical interfaces
• Enabling interface-specific configurations to optimize connectivity
of the respective media
• Routing
• Enabling quality of service (QoS) technologies
• Supporting network management technologies
IOS Functions
• Each feature or service
has an associated
collection of
configuration commands
that allow a network
technician to implement
it.
• The services provided
by the Cisco IOS are
Accessing a Cisco IOS Device

Console Access Method


Most common methods to access the CLI:
• Console
• Telnet or SSH
• AUX port
Accessing a Cisco IOS Device

Console Access Method


Console Port
• Device is accessible even if no networking
services have been configured (out-of-
band)
• Need a special console cable
• Allows configuration commands to be
entered
• Should be configured with passwords to
prevent unauthorized access
• Device should be located in a secure room
so console port cannot be easily accessed
Accessing a Cisco IOS Device

Console Access Method


Telnet
• Method for remotely accessing the Aux Port
CLI over a network • Out-of-band connection
• Require active networking services • Uses telephone line
• Can be used like console
and one active interface that is port
configured
Secure Shell (SSH)
• Remote login similar to Telnet, but
utilizes more security
• Stronger password authentication
• Uses encryption when transporting
data
Accessing a Cisco IOS Device

Console Access Method


Software available for
connecting to a
networking device:
• PuTTY
• Tera Term
• SecureCRT
• HyperTerminal
• OS X Terminal
Navigating the IOS

Cisco IOS Modes of


Operation
• The CLI uses a hierarchical structure for the modes.
• In hierarchical order from most basic to most specialized,
the major modes are:
• User executive (User EXEC) mode
• Privileged executive (Privileged EXEC) mode
• Global configuration mode
• Other specific configuration modes, such as interface
configuration mode
Navigating the IOS

IOS Modes of
Operation
Navigating the IOS

IOS Modes of Operation


• The two primary modes of operation : user EXEC mode
and privileged EXEC mode.
• As a security feature, the Cisco IOS software separates
the EXEC sessions into two levels of access.
Navigating the IOS

IOS Modes of Operation


User EXEC Mode
• The user EXEC mode has limited capabilities but is useful for some
basic operations.
• This mode is the first mode encountered upon entrance into the
CLI of an IOS device.
• The user EXEC level does not allow the execution of any
commands that might change the configuration of the device.
• The user EXEC mode is identified by the CLI prompt that ends
with the > symbol :
Navigating the IOS

IOS Modes of Operation


Privileged EXEC Mode
• The execution of configuration and management commands
requires that the network administrator use the privileged EXEC
mode or a more specific mode in the hierarchy.
• The privileged EXEC mode can be identified by the prompt
ending with the # symbol.
Switch#
• Global configuration mode and all other more specific
configuration modes can only be reached from the privileged
EXEC mode.
Navigating the IOS

IOS Modes of Operation


Global Configuration Mode
• The primary configuration mode is called global configuration or global
config.
• From global configuration mode, CLI configuration changes are made that
affect the operation of the device as a whole.
• The following CLI command is used to take the device from privileged EXEC
mode to the global configuration mode and to allow entry of configuration
commands from a terminal:
Switch# configure terminal
• After the command is executed, the prompt changes to show that the switch
is in global configuration mode.
Switch(config)#
Navigating the IOS

IOS Modes of Operation


Specific Configuration
Modes
• Specific service or interface
configurations :
• Interface mode - to
configure one of the
network interfaces
(Fa0/0, S0/0/0)
• Line mode - to configure
one of the physical or
virtual lines (console,
Navigating the IOS

IOS Modes of Operation

Moving Between the User


EXEC and Privileged EXEC
Modes

The enable and disable commands are used to


change the CLI between the user EXEC mode and
the privileged EXEC mode, respectively.
Navigating the IOS

IOS Modes of Operation


Moving from and to Global
Configuration Mode and Submode
• To move from the global configuration
mode to the privileged EXEC mode,
you enter the command exit.
• To move from any submode of the
global configuration mode to the mode
one step above it in the hierarchy of
modes, enter the exit command.
Navigating the IOS

IOS Modes of Operation


Moving from and to
Global Configuration
Mode and Submode
• To move from any submode
of the privileged EXEC
mode to the privileged
EXEC mode, enter
the end command or enter
the key
Navigating the IOS

IOS Modes of Operation


Moving from and to Global
Configuration Mode and
Submode
• To move from any submode of
the global configuration mode
to another “immediate”
submode of the global
configuration mode, simply
enter the corresponding
command that is normally
entered from global
• INTERPRETE REFERENCE MODEL
OF OSI AND TCP/IP
Rules that are necessary to
successfully communicate
• Source And Sender
Message sources are people, or electronic devices, that
need to send a
message to other individuals or devices
• Destination or receiver
The destination receives the message and interprets it
• Channel or media
Consists of the media that provides the pathway over which
the message can travel from source to destination
Network Protocols
• A set of rules that govern the communications
between computer on a network
• These rules include guidelines that regulate the
following characteristics of a network: access method,
allowed physical topologies, types of cabling and
speed of data transfer.
• Without a set of rules, computers would not have the
capability of "talking" to each other across the
Internet. Certain protocols help computers identify
TCP/IP and OSI Model
TCP/IP provides end-to-end
connectivity specifying how
data should be formatted,
addressed,
transmitted, routed and
received at the destination.

You might also like