Chapter 1 A: Exploring the Network - AT...
Transcript of Chapter 1 A: Exploring the Network - AT...
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1
Chapter 1 A: Exploring the Network
Introduction to Networks
Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
After completing this chapter, students will be able to:
Explain how multiple networks are used in everyday life.
Explain the topologies and devices used in a small- to medium-sized business network.
Explain the basic characteristics of a network that supports communication in a small- to medium-sized business.
Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
What is a Computer Network? A computer network is a telecommunications network which allows computers to exchange data.
Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Computer Networking Impacts in Our Daily Lives
Networks support the way we
learn.
communicate.
work.
play.
Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Example of a Computer Network
Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Network Topology Network Topology is the arrangement of various elements in a computer network.
Each computer or device in the a network is called a node.
Cables connecting the nodes are known as links.
Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Network Topology
Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Types of Network Topology
Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Topology
Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networks of Different Sizes
Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connected Devices
Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Types of Network • Peer-to-Peer Network • Client/Server Network • Local Area Network (LAN) • Wide Area Network (WAN) • Metropolitan Area Network (MAN) • Wireless LAN (WLAN) • Storage Area Network (SAN)
Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Peer-to-Peer Network
Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Client /Server Network A Client/Server Network is a system where standalone (client) PCs are connected to a Server (PC with Server OS)
Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Clients and Server Network
In a client/server environment, each computer still holds resources and files. Other computers can access the resources stored in a computer, as in a peer-to-peer scenario.
Files and resources are centralized. The server has the resources and other computers can access them.
Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Clients and Server Network
The server is always ON, the client machines can access the files and resources without caring whether a certain computer is ON.
Should the server be turned OFF, all resources will not be available. A standby server can be used for emergency.
Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Clients and Server Network
Security is created, managed, and can highly get enforced. To access the network, a person, called a user must provide some credentials, such as a username and a password. If the credentials are not valid, the user is prevented from accessing the network.
Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network Example of devices Computers (work stations, laptops, file servers, web
servers)
Network printers
VoIP (Voice over Internet Protocol) phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smart phones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network Network Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access points)
Internetworking Devices (routers)
Security Devices (firewalls)
Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network Network Media
Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network Topology Diagrams
Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
END OF CHAPTER 1A
Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
REVIEW
Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1. What is a Computer Network?
Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1. What is a Computer Network? A computer network is a telecommunications network which allows computers to exchange data.
Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
2. What is Network Topology .
Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
2. What is Network Topology Network Topology is the arrangement of various elements in a computer network.
Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Each computer or device in the a network is called a _____.
Cables connecting the nodes are known as _____.
Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Each computer or device in the a network is called a node.
Cables connecting the nodes are known as links.
Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
3. Names the topologies shown.
Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
Types of Network Topology
Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
4. What network is this?
Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
4. What network is this? Peer-to-Peer Network
Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
What Network is this?
Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
5. What Network is this? Client-Server Network
Presentation_ID 44 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
6. In a Peer-to-Peer Network, can one computer access the resources of the other computer?
Presentation_ID 45 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
6. In a Peer-to-Peer Network, can one computer access the resources of the other computer? Yes
Presentation_ID 46 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
7. In a Client Server Network, can one computer access the resources of the other computer?
Presentation_ID 47 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
6. In a Peer-to-Peer Network, can one computer access the resources of the other computer? Yes
Presentation_ID 48 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
7. In a Clients and Server Network, if one computer is not turned on, can the other computers access the server?
Presentation_ID 49 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
7. In a Clients and Server Network, if one computer is not turned on, can the other computers access the server?
Yes
Presentation_ID 50 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
8. In a Clients and Server Network, what must users have to access the server?
Presentation_ID 51 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
8. In a Clients and Server Network, what must users have to access the server? Credentials – userid and password
Presentation_ID 52 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
9. What are the three categories of network components? Devices
Media
Services
Presentation_ID 53 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
10. Name some Components of a Network
Presentation_ID 54 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
10. Name some Components of a Network Computers (work stations, laptops, file servers, web
servers)
Network printers
VoIP (Voice over Internet Protocol) phones
TelePresence endpoint
Security cameras
Mobile handheld
Presentation_ID 55 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
11. Name some intermediary network devices.
Presentation_ID 56 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
11. Name some intermediary network devices.
Network Access Devices (switches, and wireless access points)
Internetworking Devices (routers)
Security Devices (firewalls)
Presentation_ID 57 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
12. What are the 3 types of media for transporting data?
Presentation_ID 58 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
12. What are the 3 types of media for transporting data? • Copper • Fiber optic • wireless
Presentation_ID 59 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
13. What are the 2 types of Network topology?
Presentation_ID 60 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
13. What are the 2 types of Network topology? • Physical • logical
Presentation_ID 61 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network Topology Diagrams