Beruflich Dokumente
Kultur Dokumente
Switching:
Introduction to Networks
Presentation_ID
Cisco Confidential
Course Description
CCNA Routing and Switching teaches comprehensive networking concepts, from
network applications to the protocols and services provided to those applications by
the lower layers of the network. Students will progress from basic networking to more
complex enterprise and theoretical networking models later in the curriculum.
There are four courses in the recommended sequence:
Introduction to Networks
Routing and Switching Essentials
Scaling Networks
Connecting Networks
In each course, Networking Academy students will learn technology concepts with
the support of interactive media and apply and practice this knowledge through a
series of hands-on and simulated activities that reinforce their learning.
Presentation_ID
Cisco Confidential
Networking Today
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Components of a Network
There are three categories of network components:
Devices
Media
Services
Presentation_ID
Cisco Confidential
Components of Network
The components of a network
The path that a message takes from source to destination can be as simple as a single cable connecting one
computer to another or as complex as a network that literally spans the globe.
Presentation_ID
Cisco Confidential
Components of Network
What are the END Devices and their Role in the
Network?
The network devices that people are most familiar with are called end devices.
These devices form the interface between the human network and the underlying
communication network. Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
Security cameras
Mobile handheld devices (such as wireless barcode scanners, PDAs)
Servers are hosts that have software installed that enables them to provide information
and services, like e-mail or web pages, to other hosts on the network.
Clients are hosts that have software installed that enables them to request and display
the information obtained from the server.
Presentation_ID
Cisco Confidential
Network Structure
Presentation_ID
client
server
Cisco Confidential
Network Structure
What are the role of an intermediary device in a data
network?
Networks rely on intermediary devices to provide
connectivity and to work behind the scenes to ensure that
data flows across the network.
These devices connect the individual hosts to the network
and can connect multiple individual networks to form an
internetwork.
Examples of intermediary network devices are:
Network Access Devices (Hubs, switches, and wireless
access points)
Internetworking Devices (routers)
Communication Servers and Modems
Security Devices (firewalls)
Presentation_ID
Cisco Confidential
Network Structure
Role of an intermediary device
Presentation_ID
Cisco Confidential
10
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Other types of networks include:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
Presentation_ID
Cisco Confidential
11
Network Types
The Local Area Networks (LANs)
A network serving a home, building or campus
is considered a Local Area Network (LAN
LANs separated by geographic distance are
connected by networks known as WAN
Presentation_ID
Cisco Confidential
12
Network Types
Define the Internet
The internet is defined as a
global mesh of interconnected networks
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Presentation_ID
Cisco Confidential
15
Components of a Network
Network Media
Presentation_ID
Cisco Confidential
16
Copper Cabling
Copper Media
Unshielded Twisted
Pair (UTP) Cable
Shielded Twisted
Pair (STP) Cable
Coaxial Cable
Presentation_ID
Cisco Confidential
17
Copper Cabling
UTP Cable
Presentation_ID
Cisco Confidential
18
Copper Cabling
STP Cable
Braided or Foil Shield
Foil Shields
Presentation_ID
Cisco Confidential
19
Copper Cabling
Coaxial Cable
Presentation_ID
Cisco Confidential
20
Copper Cabling
Presentation_ID
Cisco Confidential
21
UTP Cabling
Presentation_ID
Cisco Confidential
22
UTP Cabling
Presentation_ID
Cisco Confidential
23
UTP Cabling
UTP Connectors
Presentation_ID
Cisco Confidential
24
UTP Cabling
Presentation_ID
Cisco Confidential
25
UTP Cabling
Presentation_ID
Cisco Confidential
26
Presentation_ID
Cisco Confidential
27
Presentation_ID
Cisco Confidential
28
Presentation_ID
Cisco Confidential
29
Presentation_ID
Cisco Confidential
30
Presentation_ID
Cisco Confidential
31
Presentation_ID
Implementation Issues
Copper Media
Fibre Optic
Bandwidth Supported
10 Mbps 10 Gbps
Distance
Relatively short
(1 100 meters)
Relatively High
(1 100,000 meters)
Low
High
(Completely immune)
Low
High
(Completely immune)
Lowest
Highest
Lowest
Highest
Safety Precautions
Lowest
Highest
Cisco Confidential
32
Wireless Media
Presentation_ID
Cisco Confidential
33
Wireless Media
Presentation_ID
Cisco Confidential
34
Components of a Network
Network Representations
Presentation_ID
Cisco Confidential
35
Components of a Network
Topology Diagrams
Presentation_ID
Cisco Confidential
36
Reliable Network
Presentation_ID
Cisco Confidential
37
Configuring a Network Operating System
Presentation_ID
Cisco Confidential
38
Cisco IOS
Operating Systems
All networking equipment dependent on operating systems
The operating system on home routers is usually called firmware
Cisco IOS Collection of network operating systems used on Cisco
devices
Presentation_ID
Cisco Confidential
39
Cisco IOS
Presentation_ID
Cisco Confidential
40
Cisco IOS
Purpose of OS
PC operating systems (Windows 8 and OS X) perform technical
functions that enable:
Use of a mouse
View output
Enter text
Switch or router IOS provides options to:
Configure interfaces
Enable routing and switching functions
All networking devices come with a default IOS
Possible to upgrade the IOS version or feature set
In this course, primary focus is Cisco IOS Release 15.x
Presentation_ID
Cisco Confidential
41
Cisco IOS
Presentation_ID
Cisco Confidential
42
Cisco IOS
IOS Functions
These are the major functions performed or enabled by Cisco routers
and switches.
Presentation_ID
Cisco Confidential
43
Presentation_ID
Cisco Confidential
44
Presentation_ID
Cisco Confidential
45
Cisco Confidential
46
Presentation_ID
Cisco Confidential
47
Presentation_ID
Cisco Confidential
48
Primary Modes
Presentation_ID
Cisco Confidential
49
Presentation_ID
Cisco Confidential
50
Presentation_ID
Cisco Confidential
51
Presentation_ID
Cisco Confidential
52
Presentation_ID
Cisco Confidential
53
Presentation_ID
Cisco Confidential
54
Presentation_ID
Cisco Confidential
55
The Rules
What is Communication?
Presentation_ID
Cisco Confidential
56
The Rules
Presentation_ID
Cisco Confidential
57
A standard is
a process or protocol that has been endorsed by
the networking industry and ratified by a
standards organization, such as the Institute of Electrical
and Electronics Engineers (IEEE) or the Internet Engineering Task
Force (IETF).
Presentation_ID
Cisco Confidential
58
Protocols
Network Protocols
How the message is formatted or structured
The process by which networking devices share information about
pathways with other networks
How and when error and system messages are passed between devices
The setup and termination of data transfer sessions
Presentation_ID
Cisco Confidential
59
Protocols
Interaction of Protocols
Application Protocol Hypertext Transfer Protocol (HTTP)
Transport Protocol Transmission Control Protocol (TCP)
Internet Protocol Internet Protocol (IP)
Network Access Protocols Data link & physical layers
Presentation_ID
Cisco Confidential
60
Protocol Suites
Presentation_ID
Cisco Confidential
61
Protocol Suites
Cisco Confidential
62
Protocol Suites
Presentation_ID
Cisco Confidential
63
Standards Organizations
Open Standards
The Internet Society (ISOC)
The Internet Architecture Board (IAB)
The Internet Engineering Task Force (IETF)
Institute of Electrical and Electronics Engineers (IEEE)
The International Organization for Standards (ISO)
Presentation_ID
Cisco Confidential
64
Standards Organizations
Presentation_ID
Cisco Confidential
65
Standards Organizations
ISO
OSI Model
Presentation_ID
Cisco Confidential
66
Standards Organizations
Presentation_ID
Cisco Confidential
67
Reference Models
Presentation_ID
Cisco Confidential
68
Reference Models
Presentation_ID
Cisco Confidential
69
Reference Models
Presentation_ID
Cisco Confidential
70
Reference Models
Presentation_ID
Cisco Confidential
71
Presentation_ID
As application data is passed down the protocol stack on its way to be transmitted
across the network media, various protocols add information to it at each level.
This is commonly known as the encapsulation process.
The form that a piece of data takes at any layer is called a Protocol Data Unit
(PDU). During encapsulation, each succeeding layer encapsulates the PDU that it
receives from the layer above in accordance with the protocol being used.
Cisco Confidential
72
Presentation_ID
Cisco Confidential
73
Presentation_ID
Cisco Confidential
74
Presentation_ID
Cisco Confidential
75
Presentation_ID
Cisco Confidential
76
To accomplish
this end-to-end
transport,
Layer 3 uses
four basic
processes:
Addressing
Encapsulation
Routing
Decapsulation
Presentation_ID
Cisco Confidential
77
Presentation_ID
Cisco Confidential
78
Presentation_ID
Cisco Confidential
79
Presentation_ID
Describe the role the Data Link layer plays in linking the software and hardware
layers
The Data Link layer exists as a connecting layer between the software processes
of the layers above it and the Physical layer below it. As such, it prepares the
Network layer packets for transmission across some form of media, be it copper,
fiber, or the atmosphere.
Cisco Confidential
80
Presentation_ID
Cisco Confidential
81
Logical Link Control (LLC) places information in the frame that identifies which Network layer protocol is being used for the
frame. This information allows multiple Layer 3 protocols, such as IP and IPX, to utilize the same network interface and
media.
Media Access Control (MAC) provides Data Link layer addressing and delimiting of data according to the physical signaling
requirements of the medium and the type of Data Link layer protocol in use.
Presentation_ID
Cisco Confidential
82
LLC Sublayer
Data Link
Presentation_ID
Cisco Confidential
802.15
Bluetooth
Bluetooth
802.11
802.11
Wi-Fi
Wi-Fi
Physical
802.3
802.3
Ethernet
Ethernet
MAC Sublayer
83
Presentation_ID
The role of the OSI physical layer is to encode the binary digits that represent
data link layer frames into signals and to transmit and receive these signals
across the physical mediacopper wires, optical fiber, and wirelessthat
connect network devices.
Cisco Confidential
84
Presentation_ID
Cisco Confidential
85
Presentation_ID
Cisco Confidential
86
Presentation_ID
Cisco Confidential
87
Physical Security
Four classes of physical threats are:
Hardware threats Physical damage to servers, routers,
switches, cabling plant, and workstations
Environmental threats Temperature extremes (too hot or too
cold) or humidity extremes (too wet or too dry)
Electrical threats Voltage spikes, insufficient supply voltage
(brownouts), unconditioned power (noise), and total power loss
Maintenance threats Poor handling of key electrical
components (electrostatic discharge), lack of critical spare parts,
poor cabling, and poor labeling
Presentation_ID
Cisco Confidential
88
Types of Security
Weaknesses:
Technological
Configuration
Security policy
Presentation_ID
Cisco Confidential
89
Presentation_ID
Cisco Confidential
90
Reconnaissance Attacks
Presentation_ID
Cisco Confidential
91
Access Attacks
Presentation_ID
Cisco Confidential
92
Presentation_ID
Cisco Confidential
93
Presentation_ID
Cisco Confidential
94
Presentation_ID
Cisco Confidential
95
Presentation_ID
Cisco Confidential
96
Firewalls
A Firewall resides
between two or more
networks. It controls
traffic and helps prevent
unauthorized access.
Firewalls
Cisco Confidential
97
Endpoint Security
Common endpoints are
laptops, desktops,
servers, smart phones,
and tablets.
Employees must follow
the companies
documented security
policies to secure their
devices.
Policies often include
the use of anti-virus
software and host
intrusion prevention.
Presentation_ID
Cisco Confidential
98
Securing Devices
Presentation_ID
Cisco Confidential
99
Securing Devices
Passwords
Weak and Strong Passwords
Presentation_ID
Cisco Confidential
100
Securing Devices
Presentation_ID
Securing Devices
Cisco Confidential
101
Securing Devices
Enable SSH
Presentation_ID
Cisco Confidential
102
Presentation_ID
Cisco Confidential
103
Presentation_ID
Cisco Confidential
104