Chapter 1 - Living in A Network-Centric World-1
Chapter 1 - Living in A Network-Centric World-1
Chapter 1 - Living in A Network-Centric World-1
Mike Fuszner
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
What is Communication?
Before communicating, we must establish rules or agreements to govern the conversation. In networking, we call these rules protocols.
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
10
Presentation_ID
Cisco Confidential
11
Presentation_ID
Cisco Confidential
12
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Protocols are the rules that the networked devices use to communicate with each other.
Presentation_ID
Cisco Confidential
15
Presentation_ID
Cisco Confidential
16
Traceroute
Tracert is used at a Windows command prompt to trace the route to a destination.
Presentation_ID
Cisco Confidential
17
VisualTrace
Download and install VisualTrace (formerly NeoTrace) from: http://www.softpedia.com/progDownload/McAfee-NeoTrace-ProfessionalDownload-42.html
Presentation_ID
Cisco Confidential
18
VisualTrace
Presentation_ID
Cisco Confidential
19
Companies used to have multiple networks for voice, video, and data. Todays networks combine voice, video, and data onto a single converged network.
Presentation_ID
Cisco Confidential
20
Presentation_ID
Cisco Confidential
21
Presentation_ID
Cisco Confidential
22
Presentation_ID
Cisco Confidential
23
Presentation_ID
Cisco Confidential
24
Presentation_ID
Cisco Confidential
25
The Internet
The Internet, in its early inception, was the result of research funded by the United States Department of Defense (DoD). Its primary goal was to have a communications medium that could withstand the destruction of numerous sites and transmission facilities without disruption of service.
Fault tolerance was the focus of the effort of the initial internetwork design work.
The DoD researchers realized that a packet switched connectionless network had the features necessary to support a resilient, fault tolerant network architecture.
Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
26
Presentation_ID
Cisco Confidential
27
Presentation_ID
Cisco Confidential
28
Presentation_ID
Cisco Confidential
29
Congestion
Congestion is caused when the demand on the network resources exceeds the available capacity.
When the volume of packets is greater than what can be transported across the network, devices queue the packets in memory until resources become available to transmit them. Queuing packets causes delay.
If the number of packets to be queued continues to increase, the memory queues fill up and packets are dropped.
Presentation_ID
Cisco Confidential
30
Presentation_ID
Cisco Confidential
31
Presentation_ID
Cisco Confidential
32
Presentation_ID
Cisco Confidential
33
Presentation_ID
Cisco Confidential
34
Network Security
Securing a network infrastructure includes the physical securing of devices that provide network connectivity and preventing unauthorized access to the management software that resides on them.
Presentation_ID
Cisco Confidential
35
CIA
Confidentiality ensures data privacy through encryption.
Integrity ensures that the information was not altered by using hashing algorithms and checksums. Source integrity assures the identity of the sender by using digital signatures. Availability ensures timely and reliable delivery of data.
Presentation_ID
Cisco Confidential
36
Trends in Networking
Subtitle
Presentation_ID
Cisco Confidential
37 37
38
Presentation_ID
Cisco Confidential
39