chapter 1 - living in a network-centric world-1
TRANSCRIPT
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
1/39
2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Living in a
Network-CentricWorld
Mike Fuszner
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
2/39
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
3/39
Presentation_ID 3 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
4/39
Presentation_ID 4 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
5/39
Presentation_ID 5 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
6/39
Presentation_ID 6 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
7/39Presentation_ID 7 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communication: An
Essential Part of OurLives
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
8/39Presentation_ID 8 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
What is Communication?
Before communicating, we must establish rules oragreements to govern the conversation. In networking,we call these rules protocols.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
9/39Presentation_ID 9 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
10/39Presentation_ID 10 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
11/39Presentation_ID 11 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Network as aPlatform
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
12/39Presentation_ID 12 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Communicating Over Networks
All networks have four basic elements in common:
Rulesor agreements to govern how the messages are sent,directed, received and interpreted.
Messagesor units of information.
A means of interconnecting these devices - a medium.
Deviceson the network.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
13/39Presentation_ID 13 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
14/39Presentation_ID 14 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
15/39Presentation_ID 15 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocolsare the rules that the networked devices use to communicate with each
other.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
16/39Presentation_ID 16 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
17/39Presentation_ID 17 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Traceroute
Tracert is used at a Windows command prompt to trace the route to a
destination.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
18/39Presentation_ID 18 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VisualTrace
Download and install VisualTrace (formerly NeoTrace) from:
http://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-
Download-42.html
http://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.html -
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
19/39Presentation_ID 19 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VisualTrace
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
20/39Presentation_ID 20 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Companiesused to have
multiple
networks for
voice, video,
and data.
Todays
networks
combine voice,
video, and data
onto a single
converged
network.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
21/39Presentation_ID 21 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
22/39Presentation_ID 22 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Architecture of the
Internet
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
23/39Presentation_ID 23 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Network Architecture
The term network architecture, in this context, refersto both the technologies that support the infrastructureand the programmed services and protocols that movethe messages across that infrastructure.
A fault tolerant network is one that limits the impact ofa hardware or software failure and can recover quicklywhen such a failure occurs.
A scalablenetwork can expand quickly to support newusers and applications without impacting theperformance of the service being delivered to existingusers.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
24/39Presentation_ID 24 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
25/39
Presentation_ID 25 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
26/39
Presentation_ID 26 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
The Internet, in its early inception, was the result ofresearch funded by the United States Department ofDefense (DoD).
Its primary goal was to have a communications mediumthat could withstand the destruction of numerous sitesand transmission facilities without disruption of service.
Fault tolerance was the focus of the effort of the initialinternetwork design work.
The DoD researchers realized that a packet switchedconnectionless networkhad the features necessaryto support a resilient, fault tolerant network architecture.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
27/39
Presentation_ID 27 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
28/39
Presentation_ID 28 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
29/39
Presentation_ID 29 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
30/39
Presentation_ID 30 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Congestion
Congestionis caused when the demand on thenetwork resources exceeds the available capacity.
When the volume of packets is greater than what can
be transported across the network, devices queue thepackets in memory until resources become available totransmit them.
Queuing packets causes delay.
If the number of packets to be queued continues toincrease, the memory queues fill up and packets aredropped.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
31/39
Presentation_ID 31 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
32/39
Presentation_ID 32 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quality of Service (QoS)
Quality of Service(QoS) is used to prioritize whichtypes of data packets must be delivered at the expenseof other types of packets that can be delayed ordropped.
Applications are classified into categories based onspecific quality of service requirements.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
33/39
Presentation_ID 33 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
34/39
Presentation_ID 34 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
35/39
Presentation_ID 35 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Securing a network infrastructure includes the physicalsecuring of devices that provide network connectivityand preventing unauthorized access to themanagement software that resides on them.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
36/39
Presentation_ID 36 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
CIA
Confidentialityensures data privacy throughencryption.
Integrityensures that the information was not altered
by using hashing algorithms and checksums. Sourceintegrity assures the identity of the sender by usingdigital signatures.
Availabilityensures timely and reliable delivery ofdata.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
37/39
Presentation_ID 37 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Subtitle
Trends in
Networking
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
38/39
Presentation_ID 38 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Where is it all going?
There are three majortrends that arecontributing to thefuture shape of
complex informationnetworks:
Increasing number ofmobile users.
Proliferation of networkcapable devices.
Expanding range ofservicesincludingwireless.
-
8/12/2019 Chapter 1 - Living in a Network-Centric World-1
39/39