Intro-Network-Technologies
Intro-Network-Technologies
Intro-Network-Technologies
kbogart@ino.com
@keithbogart1
in Iinkcdin.com/in/koith-bogart-2a75042
Who This Course + Those thinking of pursuing a
Is For career in computer networking,
but are still investigating, this
course will identify what a
computer network is, and
common components of a
computer network
Dept-A
Dept’B
Datacenter-1
Datacenter-2
IM
T
Il
A network is nothing more than two or more computing devices connected by a cable
or by a wireless radio connection so that they can exchange information
3. All of those host devices are cabled into what we call the network infrastructure
4. You’ll probably also have users and devices that utilize WiFi to connect to
infrastructure
INE
Common Terms/Vocabulary
-
Any device that is connected to the network is called a node
Why Do We Need Computer Networks?
kwK4IMW
When you download a new app for your phone or tablet, it’s the network that makes
that possible.
-
Resources:
----Printers
----Networked home devices (like DVRs)
----
IIXJE Thanks for Watching!
/TINE
Client Client
Client
Client
Servers
Today, most of what we do on our laptops, PCs, tablets and smartphones requires
pulling data from another device. Such as Retrieving a website, an online calendar,
downloading music files and videos.
-
Local & Remote Resources
+ Local Resources:
+ Your own HDD
+ Memory
+ Keyboard
+ DVD-ROM Drive
Network Resources:
+ Networked HDDs
+ Networked Printers
+ Networked Optical Drives connected to Network
Servers
»iNe
You can't tell just by looking at something if it is a LR or a NR. A printer sitting next to
you could also be on the network.
In the past, networking consisted of accessing shared resources on the local network
(shared printers, network drives, shared folders, etc) and also accessing the Internet
(primarily for research or entertainment) Today, many tasks that used to utilize shared
resources (such as Email, File Storage and Calendaring) now make use of Internet
resources instead (Gmail, DropBox, Google Calendar).
Common Network Components - NICs
RJ
45 R ji 1 INE
LAN / Ethernet NICs and cables on this page. Others on next page.
Common Network Components - NICs
Wall’Plate
INE
Coaxial Cable
Connector type is called an SMA (SubMiniature version A) which come in Male and
Female versions. There are other types of connectors as well.
Common Network Components - NICs
+ Wi-Fi NICs
Switches
irxjE
Routers
irxiE
Firewalls
acket inspection
d or block packet based on application
IIME
IIXIE"
INE
Common Components - Wi-Fi Controllers
+ Controllers
+ Central point of management for groups of Access
Points
+ Control Wi-Fi access for Clients
+ Controller differentiators
+ Quantity of Wi-Fi Clients supported
+ Features available
+ Appliance or Cloud-based
+ Type & quantity of uplink interfaces I
Many controllers also have integrated features such as Firewalls, ACLs and other
security features.
INE
The idea here is that before a single end-user or application touches your network,
you have pre-planned how the network should respond to these things when they DO
get connected. Your “intent” (what resources users should have access to, QoS
policies for different applications, etc) is given to the Controller which then, in turn,
translates that intent into usable configurations that are pushed down to network
devices.
Cisco DNA Center
API
Campus Fabric
Switches Access Points Routers Wireless Controllers
IIXJE Thanks for Watching!
/) ilXJE
s
1000 100
3
10
& a
1
s
8 4
a
2* 1
&
■interface S e ri a l l / 2
I d e s c ri p t i o n Connection-to-Backbone-Rtr
| ip address 1 . 2 . 1 . 1|255.255.255?0| J
INE
s s s a s 5 s s
1000 100 10 1 4096 256 16 1
/1NE
Sw-l#sho mac a d d r e s s - t a b l e
Mac Address Table
INE
Some architectures will require that you must utilize the services of a 3 rd party such as
an ISP or WAN Service Provider. The costs of implementing these services, planning
for their failure, and accounting for any latency they might introduce must all be
factored into your planning.
2-Tier & 3-Tier Architectures
+ T h e enterprise/campus LAN networks are typically
designed as either 2-tier or 3-tier networks
Network
Cone Layer
3-Tier
Distribution Layer
Access Layer
INE
The 2-Tier network has also been called the “Collapsed Core” architecture.
SPINE
"The Fabric"
LEAF
;■ iixie
Image courtesy of searchdaLac9nter.techtBrget.com
This type of architecture is best suited for data center traffic that is more likely to move
east-to-west rather than north-to-south.
Typically connections between all switches will be Layer-3 in order to prevent bridging
loops and the delays induced by using Spanning-Tree (or other similar loop-
prevention technologies).
NBMA
IIME
IIME
On-Premise Vs. Cloud-Based Architectures
Corporate
Network
On-premises characteristics:
-----Majority (if not all) of resources that end-users need physically reside within the
enterprise.
-----The network admin has control (and responsibility) for end-to-end reachability
between end-users and the resources they need.
-----An almost endless supply of options available for controlling the network and
security implementations.
Cloud-based characteristics:
----Responsibility for cloud-based resource uptime shifted to cloud-provider
----From the perspective of the customer, choices are very limited with regards to
cloud network segmentation and security.
----Confidentiality of data sent to/from the cloud a major concern
IIXJE Thanks for Watching!
/) ilXJE
INE
Time and cost: Less cables have to be run through walls, around cabinets, into
ceilings, etc.
Flexibility: Now, if you can run an Ethernet cable to a location you can also run power
to that same location.
Safety: POE delivery is intelligent, and designed to protect network equipment from
overload, underpowering, or incorrect installation.
Reliability: POE power comes from a central and universally compatible source,
rather than a collection of distributed wall adapters. Without PoE you have to be
concerned with obtaining a power cable that has the correct pinouts and plugs for
your particular country. And what if you want to move that device to a different
country? By using PoE you don’t have to worry about that. Also, PoE power-
supplying-equipment can be backed-up by an uninterruptible power supply, or
controlled to easily disable or reset devices.
Scalability: You don’t have to worry about being limited to only a handful of power
outlets in a room. With a PoE switch in that room you now have dozens of
connections that can provide power.
PSE & PD
Shown here are some examples of PoE injectors. You would use these when you
have a PD that is ONLY capable of being powered by PoE but your network switch
doesn’t support PoE. In this case, you’re not really reaping any benefits from PoE
because you still need to plug a PoE injector into an AC outlet.
How Much Power Can I Get?
INE
Here you can see that there are various PoE standards. Depending on whichever
standard(s) your PSE supports will dictate the maximum power that device can
deliver.
Keep in mind that each type of switch that can provide power has something called a
“Power Budget” which is the TOTAL amount of power that can be delivered via PoE.
Many switches do not have the capability to deliver maximum PoE levels across each
and every switchport.
How Is Power Delivered?
30W
The graphic shown here demonstrates how UPoE delivers 60W over Category5e
twisted pair ethernet cable.
There is an IEEE equivalent to Cisco’s UPoE which is called IEEE 802.3bt (also
called 4PPoE). This is also capable of delivering up to 90W of power by using all four
pairs of UTP cabling to deliver power.
PoE Detection & Negotiation
z irxje
INE
Image courtesy of cisco.com
In this output the “Power Drawn” represents the maximum required power for this
phone, which is 10250 milliwatts (10.25 W)
However this phone has also advertised that is capable of operating with reduced
screen brightness at 6.3 W
Monitoring PoE On Cisco Devices
S t a c k - 1 # show power i n l i n e
Module Available Used Remaining
(Watts) (Watts) (Watts)
/ ir\iE
Image courtesy ofdsco.com
The output of this command shows the total power budget (total power available to
be delivered) by each switch in this switch stack (grouping of switches) and how
much has been consumed so far.
IIXJE Thanks for Watching!