For this class, we will be using Packet Tracer version 8.0
This is necessary for the 'Packet Tracer Physical Mode (PTPM) labs
All Networking
cisco Academy
Cisco Packet Tracer 8.0
Download and Install Packet Tracer
(5:22)
Getting Started in Packet Tracer
(13:16)
Networks
Connect Us
No Boundaries
Host Roles
Every computer on a network is called a host or end device
Servers are computers that provide information to end devices
Clients are computers that send requests to the servers to retrieve information
Peer-to-Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network
Advantages: Easy to set up, Less complex, Lower cost, Used for simple tasks: transferring files and sharing printers
Disadvantages: No centralized administration, Not as secure, Not scalable, Slower performance
End Devices
Where a message originates from or where it is received
Intermediary Network Devices
Interconnect end devices
Regenerate and retransmit data signals
Maintain information about what pathways exist in the network
Notify other devices of errors and communication failures
Network Media
Metal wires within cables (uses electrical impulses)
Glass or plastic fibers within cables (fiber-optic cable, uses pulses of light)
Wireless transmission (uses modulation of specific frequencies of electromagnetic waves)
Network Representations
Network diagrams, often called topology diagrams, use symbols to represent devices within the network
Network Interface Card (NIC)
Physical Port
Interface
Topology Diagrams
Physical topology diagrams illustrate the physical location of intermediary devices and cable installation
Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network
Networks of Many Sizes
Small Home Networks
Small Office/Home Office (SOHO)
Medium to Large Networks
World Wide Networks
LANs and WANs
LAN: Network infrastructure that spans a small geographical area, interconnect end devices in a limited area, administered by a single organization or individual, provide high-speed bandwidth to internal devices
WAN: Network infrastructure that spans a wide geographical area, interconnect LANs over wide geographical areas, typically administered by one or more service providers, typically provide slower speed links between LANs
The Internet
Worldwide collection of interconnected LANs and WANs
Not owned by any individual or group
IETF, ICANN, IAB help maintain structure
Intranets and Extranets
Intranet: Private collection of LANs and WANs internal to an organization, meant to be accessible only to the organizations members or others with authorization
Extranet: Provides secure access to an organization's network for individuals who work for a different organization that need access to their data
Internet Access Technologies
Broadband cable
Broadband digital subscriber line (DSL)
Wireless WANs
Mobile services
Business-class interconnections: business DSL, leased lines, Metro Ethernet
Home and Small Office Internet Connections
Cable
DSL
Cellular
Satellite
Dial-up telephone
Businesses Internet Connections
Dedicated Leased Line
Metro Ethernet
Business DSL
Satellite
The Converging Network
Before: Separately cabled for telephone, video, and data, each using different technologies and standards
Now: Converged data networks carry multiple services on one link including data, voice, and video, using the same set of rules and standards
Reliable Networks
Network Architecture
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
Fault Tolerance
Limits the impact of a failure by limiting the number of affected devices
Provides redundancy by implementing a packet switched network
Scalability
A scalable network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users
Quality of Service
Voice and live video transmissions require higher expectations for those services being delivered
Circuit-switched networks
Establish dedicated circuits
IP
Allows for redundant connections and alternative paths if a device or link fails, providing an unaffected user experience
Redundant connections allow for alternative paths if a device or a link fails. The user experience is unaffected.
Scalable network
Can expand quickly and easily to support new users and applications without impacting the performance of services to existing users
Network designers follow accepted standards and protocols in order to make the networks scalable.
Quality of Service (QoS)
The primary mechanism used to ensure reliable delivery of content for all users
With a QoS policy in place, the router can more easily manage the flow of data and voice traffic.
Quality of Service, managed by the router, ensures that priorities are matched with the type of communication and its importance to the organization.
Web pages can usually receive a lower priority. A Voice over IP (VoIP) Call will need priority to maintain a smooth, uninterrupted user experience.
Network infrastructure security
Preventing unauthorized access to the devices
Information Security
Protection of the information or data transmitted over the network
Three goals of network security
Confidentiality - only intended recipients can read the data
Integrity - assurance that the data has not be altered with during transmission
Availability - assurance of timely and reliable access to data for authorized users
The role of the network must adjust and continually transform in order to be able to keep up with new technologies and end user devices as they constantly come to the market.
New networking trends that effect organizations and consumers
Bring Your Own Device (BYOD)
Online collaboration
Video communications
Cloud computing
Bring Your Own Device (BYOD)
Allows users to use their own devices giving them more opportunities and greater flexibility