Professional Documents
Culture Documents
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Peer-to-Peer
Presentation_ID
Cisco Confidential
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID
Cisco Confidential
Components of a Network
Network Media
Presentation_ID
Cisco Confidential
Components of a Network
Network Representations
Presentation_ID
Cisco Confidential
Components of a Network
Topology Diagrams
Presentation_ID
Cisco Confidential
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
10
Presentation_ID
Cisco Confidential
11
The Internet
Presentation_ID
Cisco Confidential
12
The Internet
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Presentation_ID
Cisco Confidential
15
Presentation_ID
Cisco Confidential
16
Converged Networks
Presentation_ID
Cisco Confidential
17
Reliable Network
Presentation_ID
Cisco Confidential
18
Reliable Network
Presentation_ID
Cisco Confidential
19
Reliable Network
Packet-Switched Networks
Presentation_ID
Cisco Confidential
20
Reliable Network
Scalable Networks
Presentation_ID
Cisco Confidential
21
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
Time-sensitive communication - increase priority for services
like telephony or video distribution.
Non time-sensitive communication - decrease priority for web
page retrieval or email.
High importance to organization - increase priority for
production control or business transaction data.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Presentation_ID
Cisco Confidential
22
Reliable Network
Presentation_ID
Cisco Confidential
23
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
Redundant data communications connections
High-speed virtual servers (sometimes referred to as server
farms or server clusters)
Redundant storage systems (typically uses SAN technology)
Redundant or backup power supplies
Environmental controls (e.g., air conditioning, fire
suppression)
Security devices
Presentation_ID
Cisco Confidential
24
Presentation_ID
Cisco Confidential
25
Wireless Broadband
Presentation_ID
Cisco Confidential
26
Future of Networking
Network Security
Presentation_ID
Cisco Confidential
27
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Presentation_ID
Cisco Confidential
28
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
Presentation_ID
Cisco Confidential
29
Chapter 2
2.1 IOS Bootcamp
2.2 Getting Basic
2.3 Address Schemes
2.4 Summary
Presentation_ID
Cisco Confidential
30
Cisco IOS
Operating Systems
All networking equipment dependent on operating systems
Presentation_ID
Cisco Confidential
31
Cisco IOS
Operating Systems
Presentation_ID
Cisco Confidential
32
Cisco IOS
Presentation_ID
Cisco Confidential
33
Cisco IOS
IOS Functions
Major functions performed or enabled by Cisco routers and
switches include:
Presentation_ID
Cisco Confidential
34
Presentation_ID
Cisco Confidential
35
Presentation_ID
Cisco Confidential
36
Cisco Confidential
37
Presentation_ID
Cisco Confidential
38
Presentation_ID
Cisco Confidential
39
Primary Modes
Presentation_ID
Cisco Confidential
40
Presentation_ID
Cisco Confidential
41
Presentation_ID
Cisco Confidential
42
Presentation_ID
Cisco Confidential
43
Presentation_ID
Cisco Confidential
44
Presentation_ID
Cisco Confidential
45
Presentation_ID
Cisco Confidential
46
Cisco Confidential
47
Presentation_ID
Cisco Confidential
48
Presentation_ID
Cisco Confidential
49
Hostnames
Presentation_ID
Cisco Confidential
50
Hostnames
Device Names
Some guidelines for naming conventions are that names should:
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
Presentation_ID
Cisco Confidential
51
Hostnames
Hostnames
Hostnames allow
devices to be
identified by
network
administrators
over a network or
the Internet.
Presentation_ID
Cisco Confidential
52
Hostnames
Configuring Hostnames
Presentation_ID
Cisco Confidential
53
Presentation_ID
Cisco Confidential
54
Presentation_ID
Cisco Confidential
55
Cisco Confidential
56
Cisco Confidential
57
Banner Messages
important part of
the legal process in
the event that
someone is
prosecuted for
breaking into a
device
wording that
implies that a login
is "welcome" or
"invited" is not
appropriate
often used for legal
notification
because it is
displayed to all
connected
terminals
Presentation_ID
Cisco Confidential
58
Saving Configurations
Configuration Files
Switch# reload
System configuration has
been modified. Save?
[yes/no]: n
Proceed with reload?
[confirm]
Startup configuration is
removed by using
the erase startup-config
Switch# erase startup-config
Presentation_ID
Cisco Confidential
59
Saving Configurations
Capturing Text
Presentation_ID
Cisco Confidential
60
Cisco Confidential
61
Presentation_ID
Cisco Confidential
62
Addressing Devices
Cisco Confidential
63
Addressing Devices
Presentation_ID
Cisco Confidential
64
Addressing Devices
Presentation_ID
Cisco Confidential
65
Addressing Devices
IP Address Conflicts
Presentation_ID
Cisco Confidential
66
Verifying Connectivity
Presentation_ID
Cisco Confidential
67
Verifying Connectivity
Presentation_ID
Cisco Confidential
68
Verifying Connectivity
Presentation_ID
Cisco Confidential
69
Chapter 3
3.1
3.2
3.3
3.4
Presentation_ID
Rules of Communication
Network Protocols and Standards
Moving Data in the Network
Summary
Cisco Confidential
70
The Rules
What is Communication?
Presentation_ID
Cisco Confidential
71
The Rules
Presentation_ID
Cisco Confidential
72
The Rules
Presentation_ID
Cisco Confidential
73
Protocols
Presentation_ID
Cisco Confidential
74
Protocols
Network Protocols
How the message is formatted or structured
The process by which networking devices share information
about pathways with other networks
How and when error and system messages are passed
between devices
The setup and termination of data transfer sessions
Presentation_ID
Cisco Confidential
75
Protocols
Interaction of Protocols
Application Protocol Hypertext Transfer Protocol (HTTP)
Transport Protocol Transmission Control Protocol (TCP)
Internet Protocol Internet Protocol (IP)
Network Access Protocols Data Link & Physical layers
Presentation_ID
Cisco Confidential
76
Protocol Suites
Presentation_ID
Cisco Confidential
77
Protocol Suites
Presentation_ID
Cisco Confidential
78
Reference Models
Presentation_ID
Cisco Confidential
79
Reference Models
Presentation_ID
Cisco Confidential
80
Reference Models
Presentation_ID
Cisco Confidential
81
Data Encapsulation
Presentation_ID
Cisco Confidential
82
Data Encapsulation
Presentation_ID
Cisco Confidential
83
Data Encapsulation
Encapsulation
Presentation_ID
Cisco Confidential
84
Data Encapsulation
De-encapsulation
Presentation_ID
Cisco Confidential
85
Presentation_ID
Cisco Confidential
86
Presentation_ID
Cisco Confidential
87
Presentation_ID
Cisco Confidential
88
ARP
Request
PC1
192.168.1.110
AA-AA-AA-AA-AA-AA
S1
R1
PC2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
Presentation_ID
Cisco Confidential
89
Default Gateway
PC 1
192.168.1.110
AA-AA-AA-AA-AA-AA
R2
172.16.1.99
22-22-22-22-22-22
R1
192.168.1.1
11-11-11-11-11-11
Web Server
172.16.1.99
AB-CD-EF-12-34-56
PC 2
192.168.1.111
BB-BB-BB-BB-BB-BB
Presentation_ID
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
Cisco Confidential
90
Presentation_ID
Cisco Confidential
91
Presentation_ID
Cisco Confidential
92
Presentation_ID
Cisco Confidential
93