Every computer on a network is called a host or enddevice.
Servers are computers that provide information to end devices.
Clients are computers that send requests to the servers to retrieve information.
It is possible to have a device be a client and a server in a Peer-to-PeerNetwork. This type of network design is only recommended for very small networks.
An enddevice is where a message originates from or where it is recieved. Data originates with an end device, flows through the network, and arrives at an end device.
An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.
Management of data as it flows through network is also the role of an intermediary device.
Metalwires, Fiber-opticcable, Wirelesstransmission are examples of Media Types.
Networkdiagrams, often called topology diagrams, use symbols to represent devices within the network.
Important terms to know include:
NetworkInterfaceCard (NIC)
PhysicalPort
Interface
Physicaltopology diagrams illustrate the physical location of intermediary devices and cable installation.
Logicaltopology diagrams illustrate devices, ports, and the addressing scheme of the network.
Common Types of Networks
SmallHomeNetworks
SmallOffice/HomeOffice
MediumtoLargeNetworks
WorldWideNetworks
Two most common types of networks:
Local Area Network (LAN)
Wide Area Network (WAN)
A LAN is a network infrastucture that spans a small geographical area. Administered by a single organization or individual. Provide high-speed bandwidth to internal devices.
A WAN is a network infrastructure that spans a wide geographical are. Typically administered by one or more service providers. Typically provide slower speed links between LANs.
The Internet is a worldwide collection of interconnected LANs and WANs.
The following groups were developed to help maintain structure on the internet:
An Intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
An organization might use an Extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network.
Communication is almost important to us as our reliance on air, water, food, and shelter. In today's world, through the use of networks, we are connected like never before.
Popular services for home users and small offices include broadbrandcable, broadbanddigitalsubscriberline (DSL), wirelessWANs, and mobileservices.
Organizations need faster connections to support IP phones, video conferencing , and data center storage.
Corporate business connections may require:
higherbandwidth
dedicatedconnections
managedservices
Cellular uses a cell phone network to connect to the internet.
Dedicated Leased Line are reserved circuits within service provider's network that connect distant offices with private voice and/or data networking.
True or False. Before converged networks, an organization would have been separately cabled for telephone, video, and data. Each of these networks would use different technologies to carry the signal.
Each of these technologies would use a different set of rules and standards.
True
Converged data networks carry multiple services on one link including: data, voice, and video.
Network Architecture refers to the technologies that support the infrastructure that moves data across the network.
What are the four basic characteristics that the underlying architectures need to address to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
A fault tolerant network limits the impact of a failure by limiting the number of affected devices.
True or False. Multiple paths are required for fault tolerance.
True
Packet switching spilts traffic into packets that are routed over a network.
A scalablenetwork can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.
Quality of Service is the primary mechanism used to ensure reliable delivery of content for all users.
Two main types of network security:
Network infrastructure security - physical security of network devices. Preventing unauthorized access to the devices.
Information Security - protection of the information of data transmitted over the network.
Three goals of network security:
Confidentiality
Integrity
Availability
True or False. The role of the network must adjust and continually transform in order to be able to keep up with new technologies and end-user devices as they constantly come to the market.
True
Several new networking trends that effect organizations and consumers:
Bring Your Own Device (BOYD)
Online collaboration
Video communications
Cloud computing
Bring Your Own Device (BYOD) allows users to use their own devices giving them more opportunities and greater flexibility.