chapter 1 - living in a network-centric world-1

Upload: robert-guritz

Post on 03-Jun-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    1/39

    2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

    Living in a

    Network-CentricWorld

    Mike Fuszner

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    2/39

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    3/39

    Presentation_ID 3 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    4/39

    Presentation_ID 4 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    5/39

    Presentation_ID 5 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    6/39

    Presentation_ID 6 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    7/39Presentation_ID 7 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Communication: An

    Essential Part of OurLives

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    8/39Presentation_ID 8 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    What is Communication?

    Before communicating, we must establish rules oragreements to govern the conversation. In networking,we call these rules protocols.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    9/39Presentation_ID 9 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    10/39Presentation_ID 10 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    11/39Presentation_ID 11 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Network as aPlatform

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    12/39Presentation_ID 12 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Communicating Over Networks

    All networks have four basic elements in common:

    Rulesor agreements to govern how the messages are sent,directed, received and interpreted.

    Messagesor units of information.

    A means of interconnecting these devices - a medium.

    Deviceson the network.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    13/39Presentation_ID 13 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    14/39Presentation_ID 14 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    15/39Presentation_ID 15 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocolsare the rules that the networked devices use to communicate with each

    other.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    16/39Presentation_ID 16 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    17/39Presentation_ID 17 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Traceroute

    Tracert is used at a Windows command prompt to trace the route to a

    destination.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    18/39Presentation_ID 18 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    VisualTrace

    Download and install VisualTrace (formerly NeoTrace) from:

    http://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-

    Download-42.html

    http://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.htmlhttp://www.softpedia.com/progDownload/McAfee-NeoTrace-Professional-Download-42.html
  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    19/39Presentation_ID 19 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    VisualTrace

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    20/39Presentation_ID 20 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Companiesused to have

    multiple

    networks for

    voice, video,

    and data.

    Todays

    networks

    combine voice,

    video, and data

    onto a single

    converged

    network.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    21/39Presentation_ID 21 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    22/39Presentation_ID 22 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Architecture of the

    Internet

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    23/39Presentation_ID 23 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Network Architecture

    The term network architecture, in this context, refersto both the technologies that support the infrastructureand the programmed services and protocols that movethe messages across that infrastructure.

    A fault tolerant network is one that limits the impact ofa hardware or software failure and can recover quicklywhen such a failure occurs.

    A scalablenetwork can expand quickly to support newusers and applications without impacting theperformance of the service being delivered to existingusers.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    24/39Presentation_ID 24 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    25/39

    Presentation_ID 25 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    26/39

    Presentation_ID 26 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    The Internet

    The Internet, in its early inception, was the result ofresearch funded by the United States Department ofDefense (DoD).

    Its primary goal was to have a communications mediumthat could withstand the destruction of numerous sitesand transmission facilities without disruption of service.

    Fault tolerance was the focus of the effort of the initialinternetwork design work.

    The DoD researchers realized that a packet switchedconnectionless networkhad the features necessaryto support a resilient, fault tolerant network architecture.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    27/39

    Presentation_ID 27 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    28/39

    Presentation_ID 28 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    29/39

    Presentation_ID 29 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    30/39

    Presentation_ID 30 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Congestion

    Congestionis caused when the demand on thenetwork resources exceeds the available capacity.

    When the volume of packets is greater than what can

    be transported across the network, devices queue thepackets in memory until resources become available totransmit them.

    Queuing packets causes delay.

    If the number of packets to be queued continues toincrease, the memory queues fill up and packets aredropped.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    31/39

    Presentation_ID 31 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    32/39

    Presentation_ID 32 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Quality of Service (QoS)

    Quality of Service(QoS) is used to prioritize whichtypes of data packets must be delivered at the expenseof other types of packets that can be delayed ordropped.

    Applications are classified into categories based onspecific quality of service requirements.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    33/39

    Presentation_ID 33 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    34/39

    Presentation_ID 34 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    35/39

    Presentation_ID 35 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Security

    Securing a network infrastructure includes the physicalsecuring of devices that provide network connectivityand preventing unauthorized access to themanagement software that resides on them.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    36/39

    Presentation_ID 36 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    CIA

    Confidentialityensures data privacy throughencryption.

    Integrityensures that the information was not altered

    by using hashing algorithms and checksums. Sourceintegrity assures the identity of the sender by usingdigital signatures.

    Availabilityensures timely and reliable delivery ofdata.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    37/39

    Presentation_ID 37 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Subtitle

    Trends in

    Networking

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    38/39

    Presentation_ID 38 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Where is it all going?

    There are three majortrends that arecontributing to thefuture shape of

    complex informationnetworks:

    Increasing number ofmobile users.

    Proliferation of networkcapable devices.

    Expanding range ofservicesincludingwireless.

  • 8/12/2019 Chapter 1 - Living in a Network-Centric World-1

    39/39