Thursday, December 29, 2016

Lab - Configuring a Switch Management Address

In this lab, you will complete the following objectives:

  • Part 1: Configure a Basic Network Device


  • Part 2: Verify and Test Network Connectivity


Lab - Configuring a Switch Management Address

Lab - Building a Simple Network

In this lab, you will complete the following objectives:

  • Part 1: Set Up the Network Topology (Ethernet only)


  • Part 2: Configure PC Hosts


  • Part 3: Configure and Verify Basic Switch Settings


Lab - Building a Simple Network

Wednesday, December 28, 2016

Packet Tracer - Implementing Basic Connectivity

In this activity, you will first perform basic switch configurations. Then you will implement basic connectivity by configuring IP addressing on switches and PCs. When the IP addressing configuration is complete, you will use various show commands to verify configurations and use the ping command to verify basic connectivity between devices.

Packet Tracer - Implementing Basic Connectivity Instructions

Packet Tracer - Implementing Basic Connectivity – PKA

Syntax Checker - Configuring a Switch Virtual Interface

Use the Syntax Checker in the figure to practice configuring a switch virtual interface.

Switch Virtual Interface Configuration

To access the switch remotely, an IP address and a subnet mask must be configured on the SVI. To configure an SVI on a switch, use the interface vlan 1 global configuration command. Vlan 1 is not an actual physical interface but a virtual one. Next assign an IPv4 address using the ip address ip-address subnet-mask interface configuration command. Finally, enable the virtual interface using the no shutdown interface configuration command.

After these commands are configured, the switch has all the IPv4 elements ready for communication over the network.

Click Play in the figure to view a video demonstration of how to configure a switch virtual interface.

Click here to read the transcript of this video.

Monday, December 26, 2016

Packet Tracer - Configuring Initial Switch Settings

In this activity, you will perform basic switch configurations. You will secure access to the command-line interface (CLI) and console ports using encrypted and plain text passwords. You will learn how to configure messages for users logging into the switch. These banners are also used to warn unauthorized users that access is prohibited.

Packet Tracer - Configuring Initial Switch Settings Instructions

Packet Tracer - Configuring Initial Switch Settings - PKA

Capture Configuration to a Text File

Configuration files can also be saved and archived to a text document. This sequence of steps ensures that a working copy of the configuration file is available for editing or reuse later.

For example, assume that a switch has been configured, and the running configuration has been saved on the device.

  • Open a terminal emulation software such as PuTTY or Tera Term (Figure 1) connected to a switch.


  • Enable logging in the terminal software, such as PuTTY or Tera Term, and assign a name and file location to save the log file. Figure 2 displays that All session output will be captured to the file specified (i.e., MySwitchLogs).


  • Execute the show running-config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file.


  • Disable logging in the terminal software. Figure 3 shows how to disable logging by choosing the None session logging option.


The text file created can be used as a record of how the device is currently implemented. The file could require editing before being used to restore a saved configuration to a device.

To restore a configuration file to a device:

  • Enter global configuration mode on the device.


  • Copy and paste the text file into the terminal window connected to the switch.


The text in the file will be applied as commands in the CLI and become the running configuration on the device. This is a convenient method of manually configuring a device.

Saturday, December 24, 2016

Save the Running Configuration File

There are two system files that store the device configuration:

  • startup-config - The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot. NVRAM does not lose its contents when the device is powered off.


  • running-config - The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.


As shown in the figure, use the show running-config privileged EXEC mode command to view the running configuration file. To view the startup configuration file, use the show startup-config privileged EXEC command.

If power to the device is lost or if the device is restarted, all configuration changes will be lost unless they have been saved. To save changes made to the running configuration to the startup configuration file use the copy running-config startup-config privileged EXEC mode command.

Banner Messages

Although requiring passwords is one way to keep unauthorized personnel out of a network, it is vital to provide a method for declaring that only authorized personnel should attempt to gain entry into the device. To do this, add a banner to the device output. Banners can be an important part of the legal process in the event that someone is prosecuted for breaking into a device. Some legal systems do not allow prosecution, or even the monitoring of users, unless a notification is visible.

To create a banner message of the day on a network device, use the banner motd # the message of the day # global config command. The “#” in the command syntax is called the delimiting character. It is entered before and after the message. The delimiting character can be any character as long as it does not occur in the message. For this reason, symbols such as the "#" are often used. After the command is executed, the banner will be displayed on all subsequent attempts to access the device until the banner is removed.

Because banners can be seen by anyone who attempts to log in, the message must be worded very carefully. The exact content or wording of a banner depends on the local laws and corporate policies. The banner should state that only authorized personnel are allowed to access the device. Any wording that implies a login is "welcome" or "invited" is inappropriate. Further, the banner can include scheduled system shutdowns and other information that affects all network users.

Click Play in the figure to view a video demonstration of how to secure administrative access to a switch.

Click here to read the transcript of this video.

Thursday, December 22, 2016

Secure Device Access

The use of weak or easily guessed passwords continues to be a security issue in many facets of the business world. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.

Cisco IOS can be configured to use hierarchical mode passwords to allow different access privileges to a network device.

All networking devices should limit access as listed in Figure 1.

Use strong passwords that are not easily guessed. Consider the key points listed in Figure 2.

Note: Most of the labs in this course use simple passwords such as cisco or class. These passwords are considered weak and easily guessable and should be avoided in production environments. We only use these passwords for convenience in a classroom setting or to illustrate configuration examples.

Configure Hostnames

Once the naming convention has been identified, the next step is to apply the names to the devices using the CLI.

As shown in Figure 1, from the privileged EXEC mode, access the global configuration mode by entering the configure terminal command. Notice the change in the command prompt.

From global configuration mode, enter the command hostname followed by the name of the switch and press Enter. Notice the change in the command prompt name.

Note: To remove the configured hostname and return the switch to the default prompt, use the no hostname global config command.

Always make sure the documentation is updated each time a device is added or modified. Identify devices in the documentation by their location, purpose, and address.

Use the Syntax Checker in Figure 2 to practice entering a hostname on a switch.

Wednesday, December 21, 2016

Lab - Establishing a Console Session with Tera Term

In this lab, you will complete the following objectives:

  • Part 1: Access a Cisco Switch through the Serial Console Port


  • Part 2: Display and Configure Basic Device Settings


  • Part 3: (Optional) Access a Cisco Router Using a Mini-USB Console Cable


Lab - Establishing a Console Session with Tera Term

Hotkeys and Shortcuts

The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting easier, as shown in the figure.

Commands and keywords can be shortened to the minimum number of characters that identify a unique selection. For example, the configure command can be shortened to conf because configure is the only command that begins with conf. An even shorter version of con will not work because more than one command begins with con. Keywords can also be shortened.

Sunday, December 18, 2016

IOS Command Syntax

A command might require one or more arguments. To determine the keywords and arguments required for a command, refer to the command syntax. The syntax provides the pattern or format that must be used when entering a command.

As identified in the table in the figure, boldface text indicates commands and keywords that are entered as shown. Italic text indicates an argument for which the user provides the value.

For instance, the syntax for using the description command is description string. The argument is a string value provided by the user. The description command is typically used to identify the purpose of an interface. For example, entering the command, description Connects to the main headquarter office switch, describes where the other device is at the end of the connection.

The following examples demonstrate conventions used to document and use IOS commands.

  • ping ip-address - The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.


  • traceroute ip-address - The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.


The Cisco IOS Command Reference is the ultimate source of information for a particular IOS command. 

Friday, December 16, 2016

Navigate Between IOS Modes

Various commands are used to move in and out of command prompts. To move from user EXEC mode to privileged EXEC mode, use the enable command. Use the disable privileged EXEC mode command to return to user EXEC mode.

Note: Privileged EXEC mode is sometimes called enable mode.

To move in and out of global configuration mode, use the configure terminal privileged EXEC mode command. To return to the privileged EXEC mode, enter the exit global config mode command.

There are many different sub-configuration modes. For example, to enter line sub-configuration mode, you use the line command followed by the management line type and number you wish to access. To exit a sub-configuration mode and return to global configuration mode, use the exit command. Notice the changes in the command prompt.

Switch(config)# line console 0
Switch(config-line)#

To move from any sub-configuration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command.

Switch(config-line)# exit
Switch(config)#

To move from any sub-configuration mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.

Switch(config-line)# end
Switch#

You can also move directly from one sub-configuration mode to another. Notice how after the network device name, the command prompt changes from (config-line)# to (config-if)#.

Switch(config-line)# interface FastEthernet 0/1
Switch(config-if)#

Click Play in the figure to view a video demonstration of how to move between various IOS CLI modes.

Click here to read the transcript of this video.

Thursday, December 15, 2016

Primary Command Modes

As a security feature, the Cisco IOS software separates management access into the following two command modes:


  • User EXEC Mode - This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol.


  • Privileged EXEC Mode - To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the # symbol.


The table in the figure summarizes the two modes and displays the default CLI prompts of a Cisco switch and router.

Terminal Emulation Programs

There are a number of excellent terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by a SSH/Telnet connection. Some of these include:

  • PuTTY (Figure 1)


  • Tera Term (Figure 2)


  • SecureCRT (Figure 3)


  • OS X Terminal


These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes.

Purpose of OS

Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to:

  • Use a mouse to make selections and run programs


  • Enter text and text-based commands


  • View output on a monitor


A CLI-based network operating system like the Cisco IOS on a switch or router enables a network technician to:

  • Use a keyboard to run CLI-based network programs


  • Use a keyboard to enter text and text-based commands


  • View output on a monitor

Cisco networking devices run particular versions of the Cisco IOS. The IOS version is dependent on the type of device being used and the required features. While all devices come with a default IOS and feature set, it is possible to upgrade the IOS version or feature set to obtain additional capabilities.
In this course, you will focus primarily on Cisco IOS Release 15.x. The figure displays a list of IOS software releases for a Cisco Catalyst 2960 Switch. 

Monday, December 5, 2016

Class Activity - It Is Just an Operating System

In this activity, imagine that you are employed as an engineer for a car manufacturing company. The company is currently working on a new car model. This model will have selected functions that can be controlled by the driver giving specific voice commands.

Design a set of commands used by this voice-activated control system, and identify how they are going to be executed. The functions of the car that can be controlled by voice commands are:

  • Lights


  • Wipers


  • Radio


  • Telephone set


  • Air conditioning


  • Ignition


Class Activity - It Is Just an Operating System Instructions

Chapter 1: Exploring the Network

Networks and the Internet have changed the way we communicate, learn, work, and even play.

Networks come in all sizes. They can range from simple networks consisting of two computers to networks connecting millions of devices.

The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks’. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.

The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate devices, and network media.

Networks must be reliable. This means the network must be fault tolerant, scalable, provide quality of service, and ensure security of the information and resources on the network. Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet or as large as a corporation with thousands of users. No single solution can protect the network from the variety of threats that exist. For this reason, security should be implemented in multiple layers, using more than one security solution.

The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.

This chapter focused on networking as a primary platform for supporting communication. The next chapter will introduce you to the Cisco Internetwork Operating System (IOS) used to enable routing and switching in a Cisco network environment.

Sunday, December 4, 2016

Class Activity – Draw Your Concept of the Internet Now

Draw Your Concept of the Internet Now

In this activity, you will use the knowledge you have acquired throughout Chapter 1, and the modeling activity document that you prepared at the beginning of this chapter. You may also refer to the other activities completed in this chapter, including Packet Tracer activities.

Draw a map of the Internet as you see it now. Use the icons presented in the chapter for media, end devices, and intermediary devices.

In your revised drawing, you may wish to include some of the following:

  • WANs


  • LANs


  • Cloud computing


  • Internet Service Providers (tiers)


Save your drawing in hard-copy format. If it is an electronic document, save it to a server location provided by your instructor. Be prepared to share and explain your revised work in class.

Class Activity - Draw Your Concept of the Internet Now Instructions

Thursday, December 1, 2016

CCNA

As the use of these integrated, expanding networks increase, so does the need for training for individuals who implement and manage network solutions. This training must begin with the routing and switching foundation. Achieving Cisco Certified Network Associate (CCNA) certification is the first step in helping an individual prepare for a career in networking.

CCNA certification validates an individual’s ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum also includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This CCNA curriculum includes the use of various protocols, such as: IP, Open Shortest Path First (OSPF), Serial Line Interface Protocol, Frame Relay, VLANs, Ethernet, access control lists (ACLs) and others.

This course helps set the stage for networking concepts and basic routing and switching configurations and is a start on your path towards CCNA certification.

Wednesday, November 30, 2016

Activity - Network Security Terminology


Security Solutions

No single solution can protect the network from the variety of threats that exist. For this reason, security should be implemented in multiple layers, using more than one security solution. If one security component fails to identify and protect the network, others still stand.

A home network security implementation is usually rather basic. It is generally implemented on the connecting end devices, as well as at the point of connection to the Internet, and can even rely on contracted services from the ISP.

In contrast, the network security implementation for a corporate network usually consists of many components built into the network to monitor and filter traffic. Ideally, all components work together, which minimizes maintenance and improves security.

Network security components for a home or small office network should include, at a minimum:

  • Antivirus and antispyware – These are used to protect end devices from becoming infected with malicious software.


  • Firewall filtering – This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.


In addition to the above, larger networks and corporate networks often have other security requirements:

  • Dedicated firewall systems – These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.


  • Access control lists (ACL) – These are used to further filter access and traffic forwarding.


  • Intrusion prevention systems (IPS) – These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.


  • Virtual private networks (VPN) – These are used to provide secure access to remote workers.


Network security requirements must take into account the network environment, as well as the various applications, and computing requirements. Both home environments and businesses must be able to secure their data while still allowing for the quality of service that is expected of each technology. Additionally, the security solution implemented must be adaptable to the growing and changing trends of the network.

The study of network security threats and mitigation techniques starts with a clear understanding of the underlying switching and routing infrastructure used to organize network services.

Security Threats

Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet or as large as a corporation with thousands of users. The network security that is implemented must take into account the environment, as well as the tools and requirements of the network. It must be able to secure data while still allowing for the quality of service that is expected of the network.

Securing a network involves protocols, technologies, devices, tools, and techniques to secure data and mitigate threats. Threat vectors may be external or internal. Many external network security threats today are spread over the Internet.

The most common external threats to networks include:

  • Viruses, worms, and Trojan horses - malicious software and arbitrary code running on a user device


  • Spyware and adware - software installed on a user device that secretly collects information about the user


  • Zero-day attacks, also called zero-hour attacks - an attack that occurs on the first day that a vulnerability becomes known


  • Hacker attacks - an attack by a knowledgeable person to user devices or network resources


  • Denial of service attacks - attacks designed to slow or crash applications and processes on a network device


  • Data interception and theft - an attack to capture private information from an organization’s network


  • Identity theft - an attack to steal the login credentials of a user in order to access private data


It is equally important to consider internal threats. There have been many studies that show that the most common data breaches happen because of internal users of the network. This can be attributed to lost or stolen devices, accidental misuse by employees, and in the business environment, even malicious employees. With the evolving BYOD strategies, corporate data is much more vulnerable. Therefore, when developing a security policy, it is important to address both external and internal security threats.

Wireless Broadband

Connecting to the Internet is vital in smart home technology. DSL and cable are common technologies used to connect homes and small businesses to the Internet. However, wireless may be another option in many areas.

Wireless Internet Service Provider (WISP)

Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs). WISPs are more commonly found in rural environments where DSL or cable services are not available.

Although a separate transmission tower may be installed for the antenna, it is common that the antenna is attached to an existing elevated structure, such as a water tower or a radio tower. A small dish or antenna is installed on the subscriber’s roof in range of the WISP transmitter. The subscriber’s access unit is connected to the wired network inside the home. From the perspective of the home user, the setup is not much different than DSL or cable service. The main difference is that the connection from the home to the ISP is wireless instead of a physical cable.

Wireless Broadband Service

Another wireless solution for the home and small businesses is wireless broadband, as shown in the figure. This uses the same cellular technology used to access the Internet with a smart phone or tablet. An antenna is installed outside the house providing either wireless or wired connectivity for devices in the home. In many areas, home wireless broadband is competing directly with DSL and cable services.

Sunday, November 20, 2016

Technology Trends in the Home

Networking trends are not only affecting the way we communicate at work and at school, they are also changing just about every aspect of the home.
The newest home trends include ‘smart home technology’. Smart home technology is technology that is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated. For example, imagine being able to prepare a dish and place it in the oven for cooking prior to leaving the house for the day. Imagine if the oven was ‘aware’ of the dish it was cooking and was connected to your ‘calendar of events’ so that it could determine what time you should be available to eat, and adjust start times and length of cooking accordingly. It could even adjust cooking times and temperatures based on changes in schedule. Additionally, a smartphone or tablet connection allows the user the ability to connect to the oven directly, to make any desired adjustments. When the dish is “available”, the oven sends an alert message to a specified end user device that the dish is done and warming.
This scenario is not long off. In fact, smart home technology is currently being developed for all rooms within a house. Smart home technology will become more of a reality as home networking and high-speed Internet technology becomes more widespread. New home networking technologies are being developed daily to meet these types of growing technology needs.

Cloud Computing

Cloud computing is another global trend changing the way we access and store data. Cloud computing allows us to store personal files, even backup our entire hard disk drive on servers over the Internet. Applications such as word processing and photo editing can be accessed using the Cloud.
For businesses, Cloud computing extends IT's capabilities without requiring investment in new infrastructure, training new personnel, or licensing new software. These services are available on demand and delivered economically to any device anywhere in the world without compromising security or function.
There are four primary types of Clouds, as shown in the figure: Public Clouds, Private Clouds, Hybrid Clouds, and Custom Clouds. Click each Cloud to learn more.
Cloud computing is possible because of data centers. A data center is a facility used to house computer systems and associated components. A data center can occupy one room of a building, one or more floors, or an entire building. Data centers are typically very expensive to build and maintain. For this reason, only large organizations use privately built data centers to house their data and provide services to users. Smaller organizations that cannot afford to maintain their own private data center can reduce the overall cost of ownership by leasing server and storage services from a larger data center organization in the Cloud.

Video Communication

Another trend in networking that is critical to the communication and collaboration effort is video. Video is being used for communications, collaboration, and entertainment. Video calls can be made to and from anywhere with an Internet connection.
Video conferencing is a powerful tool for communicating with others at a distance, both locally and globally. Video is becoming a critical requirement for effective collaboration as organizations extend across geographic and cultural boundaries. Click Play in the figure to view how TelePresence can be incorporated into everyday life and business.
Click here to read the transcript of this video.

Online Collaboration

Individuals want to connect to the network, not only for access to data applications, but also to collaborate with one another. Collaboration is defined as “the act of working with another or others on a joint project.” Collaboration tools, like Cisco WebEx shown in the figure, give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.
For businesses, collaboration is a critical and strategic priority that organizations are using to remain competitive. Collaboration is also a priority in education. Students need to collaborate to assist each other in learning, to develop team skills used in the work force, and to work together on team-based projects.

Bring Your Own Device

The concept of any device, to any content, in any manner, is a major global trend that requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD).
BYOD is about end users having the freedom to use personal tools to access information and communicate across a business or campus network. With the growth of consumer devices, and the related drop in cost, employees and students can be expected to have some of the most advanced computing and networking tools for personal use. These personal tools include laptops, netbooks, tablets, smartphones, and e-readers. These can be devices purchased by the company or school, purchased by the individual, or both.
BYOD means any device, with any ownership, used anywhere. For example, in the past, a student who needed to access the campus network or the Internet had to use one of the school’s computers. These devices were typically limited and seen as tools only for work done in the classroom or in the library. Extended connectivity through mobile and remote access to the campus network gives students tremendous flexibility and more learning opportunities for the student.
.

New Trends

As new technologies and end user devices come to market, businesses and consumers must continue to adjust to this ever-changing environment. The role of the network is transforming to enable the connections between people, devices, and information. There are several new networking trends that will effect organizations and consumers. Some of the top trends include:

  • Bring Your Own Device (BYOD)

  • Online collaboration

  • Video communications

  • Cloud computing

Activity - Reliable Networks


Security

The network infrastructure, services, and the data contained on network-attached devices are crucial personal and business assets. There are two types of network security concerns that must be addressed: network infrastructure security and information security.
Securing a network infrastructure includes the physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them, as shown in Figure 1.
Information security refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices. In order to achieve the goals of network security, there are three primary requirements, as shown in Figure 2:

  • Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data.

  • Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination.

  • Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.
To learn more about security as a requirement for reliable networks, refer to the Appendix for this chapter.

Quality of Service

Quality of Service (QoS) is also an ever increasing requirement of networks today. New applications available to users over internetworks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services. Have you ever tried to watch a video with constant breaks and pauses? As data, voice, and video content continue to converge onto the same network, QoS becomes a primary mechanism for managing congestion and ensuring reliable delivery of content to all users.
Congestion occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps). When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.
When the volume of traffic is greater than what can be transported across the network, devices queue, or hold, the packets in memory until resources become available to transmit them. In the figure, one user is requesting a web page and another is on a phone call. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.
To learn more about QoS as a requirement for reliable networks, refer to the Appendix for this chapter.

Scalability

A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The figure shows how a new network can be easily added to an existing network. In addition, networks are scalable because the designers follow accepted standards and protocols. This allows software and hardware vendors to focus on improving products and services without worrying about designing a new set of rules for operating within the network.
To learn more about scalability as a requirement for reliable networks, refer to the Appendix for this chapter.

Fault Tolerance

The expectation is that the Internet is always available to the millions of users who rely on it. This requires a network architecture that is built to be fault tolerant. A fault tolerant network is one that limits the impact of a failure, so that the fewest number of devices are affected. It is also built in a way that allows quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages can be instantly sent over a different link. Having multiple paths to a destination is known as redundancy.
One way reliable networks provide redundancy is by implementing a packet-switched network. Packet switching splits traffic into packets that are routed over a shared network. A single message, such as an email or a video stream, is broken into multiple message blocks, called packets. Each packet has the necessary addressing information of the source and destination of the message. The routers within the network switch the packets based on the condition of the network at that moment. This means that all the packets in a single message could take very different paths to the destination. In the figure, the user is not aware and is unaffected by the router dynamically changing the route when a link fails.
This is not the case in circuit-switched networks traditionally used for voice communications. A circuit-switched network is one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
To learn more about packet-switched and circuit-switched networks, refer to the Appendix for this chapter.

Network Architecture

Networks must support a wide range of applications and services, as well as operate over many different types of cables and devices, which make up the physical infrastructure. The term network architecture, in this context, refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:

  • Fault Tolerance

  • Scalability

  • Quality of Service (QoS)

  • Security

Lab – Researching Converged Network Services

In this lab, you will complete the following objectives:

  • Part 1: Survey Your Understanding of Convergence

  • Part 2: Research ISPs Offering Converged Services

  • Part 3: Research Local ISPs Offering Converged Services

  • Part 4: Select Best Local ISP Converged Service

  • Part 5: Research Local Company or Public Institution Using Convergence Technologies
Lab - Researching Converged Network Services
.

The Converging Network

Today, the separate data, telephone, and video networks are converging. Unlike dedicated networks, converged networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure, as shown in the figure. This network infrastructure uses the same set of rules, agreements, and implementation standards.

Traditional Separate Networks

Consider a school built thirty years ago. Back then, some classrooms were cabled for the data network, telephone network, and video network for televisions. These separate networks could not communicate with each other, as shown in the figure. Each network used different technologies to carry the communication signal. Each network had its own set of rules and standards to ensure successful communication.

Packet Tracer - Network Representation

In this activity, you will explore how Packet Tracer serves as a modeling tool for network representations.
Packet Tracer - Network Representation Instructions
Packet Tracer - Network Representation - PKA

Packet Tracer - Help and Navigation Tips

Packet Tracer is a fun, take-home, flexible software program which will help you with your Cisco Certified Network Associate (CCNA) studies. Packet Tracer allows you to experiment with network behavior, build network models, and ask "what if" questions. In this activity, you will explore a relatively complex network that highlights a few of Packet Tracer’s features. While doing so, you will learn how to access Help and the tutorials. You will also learn how to switch between various modes and workspaces.
Packet Tracer – Help and Navigation Tips Instructions
Packet Tracer – Help and Navigation Tips - PKA

Businesses Internet Connections

Corporate connection options differ from home user options. Businesses may require higher bandwidth, dedicated bandwidth, and managed services. Connection options available differ depending on the type of service providers located nearby.
The figure illustrates common connection options for businesses:

  • Dedicated Leased Line - Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.

  • Ethernet WAN - Ethernet WANs extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later chapter. The benefits of Ethernet are now being extended into the WAN.

  • DSL - Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.

  • Satellite - Similar to small office and home office users, satellite service can provide a connection when a wired solution is not available.
The choice of connection varies depending on geographical location and service provider availability.

Home and Small Office Internet Connections

The figure illustrates common connection options for small office and home office users:

  • Cable - Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.

  • DSL - Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.

  • Cellular - Cellular Internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.

  • Satellite - The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

  • Dial-up Telephone - An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
Many homes and small offices are more commonly being connected directly with fiber optic cables. This enables an ISP to provide higher bandwidth speeds and support more services such as Internet, phone, and TV.
The choice of connection varies depending on geographical location and service provider availability.

Internet Access Technologies

There are many different ways to connect users and organizations to the Internet.
Home users, teleworkers (remote workers), and small offices typically require a connection to an Internet Service Provider (ISP) to access the Internet. Connection options vary greatly between ISP and geographical location. However, popular choices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.
Organizations typically require access to other corporate sites and the Internet. Fast connections are required to support business services including IP phones, video conferencing, and data center storage.
Business-class interconnections are usually provided by service providers (SP). Popular business-class services include business DSL, leased lines, and Metro Ethernet.

Intranets and Extranets

There are two other terms which are similar to the term Internet:

  • Intranet

  • Extranet
Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
An organization may use an extranet to provide secure and safe access to individuals who work for a different organization, but require access to the organization’s data. Examples of extranets include:

  • A company that is providing access to outside suppliers and contractors.

  • A hospital that is providing a booking system to doctors so they can make appointments for their patients.

  • A local office of education that is providing budget and personnel information to the schools in its district.

Tuesday, September 20, 2016

The Internet


The Internet is a worldwide collection of interconnected networks (internetworks or internet for short). The figure shows one way to view the Internet as a collection of interconnected LANs and WANs. Some of the LAN examples are connected to each other through a WAN connection. WANs are then connected to each other. The red WAN connection lines represent all the varieties of ways we connect networks. WANs can connect through copper wires, fiber optic cables, and wireless transmissions (not shown).
The Internet is not owned by any individual or group. Ensuring effective communication across this diverse infrastructure requires the application of consistent and commonly recognized technologies and standards as well as the cooperation of many network administration agencies. There are organizations that have been developed for the purpose of helping to maintain structure and standardization of Internet protocols and processes. These organizations include the Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others.
Note: The term internet (with a lower case “i") is used to describe multiple networks interconnected. When referring to the global system of interconnected computer networks or the World Wide Web, the term Internet (with a capital “I”) is used.

Wide Area Networks


WANs are a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SP) or Internet Service Providers (ISP).
Specific features of WANs include:

  • WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.

  • WANs are usually administered by multiple service providers.

  • WANs typically provide slower speed links between LANs.

Local Area Networks


LANs are a network infrastructure that spans a small geographical area. Specific features of LANs include:

  • LANs interconnect end devices in a limited area such as a home, school, office building, or campus.

  • A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level.

  • LANs provide high speed bandwidth to internal end devices and intermediary devices.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting