SlideShare a Scribd company logo
Chapter 5: Networking
Concepts
IT Essentials v7.0
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.1 Network Components
and Types
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of Networks
Network Icons
Intermediary Device Icons
Network Media Icons
Host Device Icons
4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of Networks
Network Topologies and Description
 PAN (personal area network) – Commonly uses
Bluetooth to connect mice, keyboards, phones, and
tablets.
 LAN (local area network) – A wired network
consisting of a switch and network devices in a
limited geographical area.
 VLAN (virtual LAN) – Extends beyond a traditional
LAN and groups users based on administratively
defined boundaries such as department or floor.
 WLAN (wireless LAN) – Connects multiple wireless
devices and uses an access point.
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of Networks
Network Topologies and Description
 WMN (wireless mesh network) – Connects
multiple wireless access points together to expand
the wireless network.
 MAN (metropolitan area network) – A network that
spans a city.
 WAN (wide area network) – A network that spans a
large geographical area.
 VPN (virtual private network) – A method of
connecting to a network such as a company
network across an unsecure network.
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connection Types
Brief History of Connection Technologies
 Analog telephone access (dialup) – uses an
analog modem to call another modem.
 ISDN (Integrated Services Digital Network) – more
bandwidth than dialup. Can carry voice, video, and
data.
 Broadband – uses different frequencies to send
multiple signals over media.
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connection Types
DSL, Cable, and Fiber
 DSL (digital subscriber line) – always on
technology that uses phone lines; voice and data
carried on different frequencies; requires a filter on
the port that connects to a phone.
 Cable – Uses a cable modem to connect to a
traditional cable TV network; shares the network
with multiple subscribers.
 Fiber – High bandwidth connection used in
backbone networks, large enterprise environments,
large data centers, and now part of some home
internet connections.
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connection Types
Line of Sight Wireless Internet Service
 Line of site wireless – always on technology that uses radio signals for connecting to the
internet.
• Clear path required
• Weather affects signal strength and performance
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connection Types
Satellite
 Satellite – broadband technology for remote areas
• Uses a satellite dish
• Not a good solution for time-sensitive applications like gaming, Voice over Internet
Protocol (VoIP), and video conferencing
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connection Types
Cellular
 Cellular– relies on cell towers to create a network used by cell phones and
connectivity to the internet
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connection Types
Mobile Hotspot and Tethering
 Cell phone option that allows another device to connect to the
internet using Wi-Fi, Bluetooth, or USB cable
• The other device is using the phone’s cellular connection to
connect to the internet
• Called tethering or a hotspot
 A mobile hotspot is when a cell phone allows Wi-Fi devices to
connect and use the mobile data network.
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.2 Networking Protocols,
Standards, and Services
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Transport Layer Protocols
The TCP/IP Model
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Transport Layer Protocols
TCP
 Three basic operations of reliability
• Numbering and tracking of data segments
• Acknowledgment of received data
• Retransmitting any unacknowledged data after a
period of time.
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Transport Layer Protocols
UDP
 Very little overhead or data checking
 Best-effort delivery protocol (unreliable)
• No acknowledgment that the data is received by the destination
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Port Numbers
Classify Application Port Numbers
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Port Numbers
Classify Application Port Numbers (Cont.)
18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Protocols
WLAN Protocols
19
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Protocols
Bluetooth, NFC, and RFID
 Bluetooth
• Up to 7 devices to create a PAN
• 802.15.1
• 2.4 to 2.485 GHz radio frequency range
 RFID
• Passive or active tags used to identify items
• Passive – rely on RFID reader to activate and read
• Active – have a battery to broadcast the ID up to
100 meters
• 125 MHz to 960 MHz radio frequency range
 NFC (Near Field Communication)
• Devices must be in close proximity to exchange
data
• Used for payments, printing, public parking, etc.
20
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Protocols
Zigbee and Z-Wave
 Zigbee
• Requires a ZigBee Coordinator to manage client
devices connected in a wireless mesh network.
• Devices commonly managed from a cell phone
app
• IEEE 802.15.4 standard
• 868 MHz to 2.4 GHz range up to 20 meters,
65,000 devices, and data speeds up to 250 kb/s
 Z-Wave
• Proprietary standard, but public version available
• 232 devices can connect to a wireless mesh
network with data speeds up to 100 kb/s.
21
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Protocols
Cellular Generations
 1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and
caller ID with speeds less than 9.6 Kb/s
 2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.
 3G – full motion video and streaming music at speeds up to 2 Mb/s
 4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s
 LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity
while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.
 5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data
transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.
22
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Client – Server Roles
 File Client and Server
 Web Client and Server
 Email Client and Server
23
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
DHCP Server
 A DHCP server provides IP addressing information.
24
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
DNS Server
 A DNS server translates domain names such as cisco.com to an IP address.
25
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Print Server
 A print server
• Can control multiple printers
• Provides client access to print resources
• Allows centralized print job administration
• Provides feedback to network clients
26
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
File Server
 A file server allows clients to access
files using a specific protocol
• FTP (File Transfer Protocol)
• FTPS (File Transfer Protocol Secure)
• SFTP (Secure Shell File Transfer
Protocol)
• SCP (Secure Copy)
27
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Web Server
 A web server provides web
resources using these protocols
• Hypertext Transfer Protocol (HTTP)
• TCP port 80
• Secure HTTP (HTTPS)
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• TCP port 443
28
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Mail Server
 Email messages are stored in
databases on mail servers
• Client communicates with server in
order to reach a different client
• Protocol used to send email
• Simple Mail Transfer Protocol (SMTP)
• Protocols used to retrieve email
• Post Office Protocol (POP)
• Internet Message Access Protocol (IMAP)
29
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Proxy Server
 Proxy servers act on behalf of a client, thus hiding the real internal host
 Used to cache frequently accessed web pages
30
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Authentication Server
 Authentication, Authorization, and Accounting (AAA) - Allows access to a network
device or a particular network
31
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Services
Syslog Server
 Syslog stores network messages sent by networking devices.
32
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.3 Basic Network Devices
33
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Basic Network Devices
Network Interface Card
 Todays computers have wired and/or wireless network capability.
34
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Basic Network Devices
Repeaters, Bridges, and Hubs
 Repeaters – Also called
extenders because they
regenerate the signal so it can be
sent further.
 Hub – Receives data on one port
and sends to all other ports.
 Bridge – Divides a network into
two or more segments and tracks
which device is on each segment.
35
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Ethernet switches record MAC
addresses for each device
connected to the switch.
• Data is sent to a specific device if
the MAC address of that device is
in the MAC address table.
• Managed switches are used in a
company environment and have
additional features.
• Unmanaged switches are used in
home or a small business
network.
Basic Network Devices
Switches
36
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Wireless access points (APs) – provide
access to a wireless network for a limited
range.
Basic Network Devices
Wireless Access Points
37
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Basic Network Devices
Routers
 Routers connect networks.
• Use an IP address to forward traffic to other networks
• Can be a multipurpose device (integrated router) that includes switching and wireless capabilities
38
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Devices
Firewalls
 A firewall protects data and
devices connected to a network.
 Firewalls use access control lists
(ACLs) which are rules used to
determine whether data is
permitted (allowed through) or
denied.
39
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Devices
IDS and IPS
An Intrusion Detection System
(IDS) monitors traffic and is a
passive system.
An Intrusion Prevention
System (IPS) actively monitors
traffic and takes action when
needed.
40
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Devices
UTMs
 Universal Threat Management (UTM) is
an all-in-one security appliance. Features
are vendor-specific, but could include:
• Firewall services
• IDS/IPS services
• Additional security services against Zero
Day, Denial of Service (DoS) Distributed
Denial of Service (DDoS), and spyware
• Proxy and email filtering
• Network access control
• VPN services
41
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Devices
Endpoint Management Server
 An endpoint management server monitors end devices such as PCs, laptops, servers, tablets,
printers, etc.
42
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Other Network Devices
Legacy and Embedded Systems
 A legacy system is a device on the network
no longer supported, but still in operation.
 An embedded system is a device built into
something else such as an appliance.
Embedded microchips are contained in
legacy systems and embedded systems.
 Legacy systems and embedded systems
could be a security risk.
43
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Other Network Devices
Patch Panel
A centralized place where
network cables attach to the
back. Patch cables are used to
make a connection to another
patch panel which connects to a
different wiring closet, or to a
device such as a switch mounted
nearby.
44
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Other Network Devices
Power over Ethernet and Ethernet over Power
 Power over Ethernet (PoE) is a standard
for providing power to devices such as
APs, cameras, or IP phones through a
cable.
 A PoE injector can be connected to a
cable and a second cable is used to
connect a device that receives power from
the injector.
PoE injector
 Ethernet over Power (powerline
networking) uses existing electrical wiring
to create a network.
Network cable
45
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Other Network Devices
Cloud-based Network Controller
 A cloud-based network controller
is a remote device used to
manage network devices like
access points or switches.
46
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.4 Network Cables
47
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Tools
Network Tools and Descriptions
 Wire cutters or side cutters
 Wire strippers
 Crimper – used to securely attach an RJ-45
connector
 Punch down tool – used to terminate wires into
termination
48
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Tools
Network Tools and Descriptions (Cont.)
 Multimeter
 Tone Generator
 Loopback adapter –
used to check a port
 Cable Tester
 Wi-Fi analyzer
49
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copper Cables and Connectors
Cable Types
 Cable types used in networking
• Twisted-pair
• Coaxial
• Fiber-optic
50
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copper Cables and Connectors
Coaxial Cables
 Coaxial cable
• Copper or aluminum
• Used in cable TV systems and
satellite communication systems
• Harder to install, more expensive,
and harder to troubleshoot than
twisted-pair cabling
51
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copper Cables and Connectors
Twisted-Pair Cables
 Twisted-pair cabling types
• Unshielded twisted-pair (UTP)
• Shielded twisted-pair (STP)
 UTP
• Most common
• Four pairs of color-coded wires
• Prone to electromagnetic interference
(EMI) and radio frequency
interference (RFI)
 STP
• Better protection against EMI and RFI
• More expensive and harder to install
UTP cabling
STP cabling
52
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copper Cables and Connectors
Twisted-Pair Category Ratings
Cat 5 UTP
Cat 5e UTP
Cat 6 UTP
53
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copper Cables and Connectors
Twisted-Pair Wire Schemes
When creating a cable to
connect a network device to a
wall jack or from the patch
panel to a switch, make both
ends of the cable the same
standard.
T568A T568B
54
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Copper Cables and Connectors
Build and Test a Network Cable
55
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Fiber Cables and Connectors
Types of Fiber Media
 Single-mode fiber (SMF)
• Small core
• Uses laser technology to send one
beam of light
• Long distances
 Multimode fiber (MMF)
• Larger core
• Uses LEDs to send light
• Light is injected at different angles
• Cheaper
• Bandwidth up to 10 Gb/s up to 550
meters
SMF
MMF
56
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Fiber Cables and Connectors
Fiber-Optic Connectors
Lecture 1.pptx

More Related Content

PPTX
Sap basis ppt
PDF
309675745
DOCX
Sistemas de apoyo a la toma de decisiones (dss).
PDF
PPT ROAMING 2015
PPTX
Cisco Security portfolio update
PDF
Low latencytradingsystem by_barunsharma
PPT
LA RED MUNDIAL
PDF
5G Multi-Access Edge Compute
Sap basis ppt
309675745
Sistemas de apoyo a la toma de decisiones (dss).
PPT ROAMING 2015
Cisco Security portfolio update
Low latencytradingsystem by_barunsharma
LA RED MUNDIAL
5G Multi-Access Edge Compute

Similar to Lecture 1.pptx (20)

PPTX
ITE7_Chp5.pptx
PPTX
Lecture-1.pptx
PPTX
ITN_Module_1.pptx
PPTX
ITN_Module_1networkingmoduleonecisco.pptx
PDF
CCNA Module_1 AAAAAAAAAAAAAAAAAAAAAAAAA.pdf
PPTX
ITN_Module_1.pptx
PPTX
CCNA Introduction to Networks Module 1
PPTX
moduleeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
PPTX
--Networking Today_Module 1_ITNv7.pptx--
PPTX
ITN_Module_1ppppppppppppppppppppppp.pptx
PDF
ITN_Module_1.pdf
PPTX
ITN_Module_1.pptx
PPTX
ITN_Module_1-Networking Today.pptx
PPTX
ITN_Module_1.pptx
PPT
ITE v5.0 - Chapter 6
PPTX
Subject about CHAPTER 1 NETWORKING TODAY.pptx
PPTX
ETN-LECTURE_1.pptx
PPTX
Introduction_To_Network_ITN_Module_1.pptx
PPTX
ITN_Module_1.pptx
ITE7_Chp5.pptx
Lecture-1.pptx
ITN_Module_1.pptx
ITN_Module_1networkingmoduleonecisco.pptx
CCNA Module_1 AAAAAAAAAAAAAAAAAAAAAAAAA.pdf
ITN_Module_1.pptx
CCNA Introduction to Networks Module 1
moduleeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
--Networking Today_Module 1_ITNv7.pptx--
ITN_Module_1ppppppppppppppppppppppp.pptx
ITN_Module_1.pdf
ITN_Module_1.pptx
ITN_Module_1-Networking Today.pptx
ITN_Module_1.pptx
ITE v5.0 - Chapter 6
Subject about CHAPTER 1 NETWORKING TODAY.pptx
ETN-LECTURE_1.pptx
Introduction_To_Network_ITN_Module_1.pptx
ITN_Module_1.pptx
Ad

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Complications of Minimal Access Surgery at WLH
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Lesson notes of climatology university.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
master seminar digital applications in india
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Presentation on HIE in infants and its manifestations
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Complications of Minimal Access Surgery at WLH
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Lesson notes of climatology university.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Supply Chain Operations Speaking Notes -ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
01-Introduction-to-Information-Management.pdf
RMMM.pdf make it easy to upload and study
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Cell Types and Its function , kingdom of life
Module 4: Burden of Disease Tutorial Slides S2 2025
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Presentation on HIE in infants and its manifestations
Ad

Lecture 1.pptx

  • 2. 2 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.1 Network Components and Types
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of Networks Network Icons Intermediary Device Icons Network Media Icons Host Device Icons
  • 4. 4 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of Networks Network Topologies and Description  PAN (personal area network) – Commonly uses Bluetooth to connect mice, keyboards, phones, and tablets.  LAN (local area network) – A wired network consisting of a switch and network devices in a limited geographical area.  VLAN (virtual LAN) – Extends beyond a traditional LAN and groups users based on administratively defined boundaries such as department or floor.  WLAN (wireless LAN) – Connects multiple wireless devices and uses an access point.
  • 5. 5 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of Networks Network Topologies and Description  WMN (wireless mesh network) – Connects multiple wireless access points together to expand the wireless network.  MAN (metropolitan area network) – A network that spans a city.  WAN (wide area network) – A network that spans a large geographical area.  VPN (virtual private network) – A method of connecting to a network such as a company network across an unsecure network.
  • 6. 6 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connection Types Brief History of Connection Technologies  Analog telephone access (dialup) – uses an analog modem to call another modem.  ISDN (Integrated Services Digital Network) – more bandwidth than dialup. Can carry voice, video, and data.  Broadband – uses different frequencies to send multiple signals over media.
  • 7. 7 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connection Types DSL, Cable, and Fiber  DSL (digital subscriber line) – always on technology that uses phone lines; voice and data carried on different frequencies; requires a filter on the port that connects to a phone.  Cable – Uses a cable modem to connect to a traditional cable TV network; shares the network with multiple subscribers.  Fiber – High bandwidth connection used in backbone networks, large enterprise environments, large data centers, and now part of some home internet connections.
  • 8. 8 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connection Types Line of Sight Wireless Internet Service  Line of site wireless – always on technology that uses radio signals for connecting to the internet. • Clear path required • Weather affects signal strength and performance
  • 9. 9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connection Types Satellite  Satellite – broadband technology for remote areas • Uses a satellite dish • Not a good solution for time-sensitive applications like gaming, Voice over Internet Protocol (VoIP), and video conferencing
  • 10. 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connection Types Cellular  Cellular– relies on cell towers to create a network used by cell phones and connectivity to the internet
  • 11. 11 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connection Types Mobile Hotspot and Tethering  Cell phone option that allows another device to connect to the internet using Wi-Fi, Bluetooth, or USB cable • The other device is using the phone’s cellular connection to connect to the internet • Called tethering or a hotspot  A mobile hotspot is when a cell phone allows Wi-Fi devices to connect and use the mobile data network.
  • 12. 12 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.2 Networking Protocols, Standards, and Services
  • 13. 13 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Transport Layer Protocols The TCP/IP Model
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Transport Layer Protocols TCP  Three basic operations of reliability • Numbering and tracking of data segments • Acknowledgment of received data • Retransmitting any unacknowledged data after a period of time.
  • 15. 15 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Transport Layer Protocols UDP  Very little overhead or data checking  Best-effort delivery protocol (unreliable) • No acknowledgment that the data is received by the destination
  • 16. 16 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Port Numbers Classify Application Port Numbers
  • 17. 17 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Port Numbers Classify Application Port Numbers (Cont.)
  • 18. 18 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Protocols WLAN Protocols
  • 19. 19 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Protocols Bluetooth, NFC, and RFID  Bluetooth • Up to 7 devices to create a PAN • 802.15.1 • 2.4 to 2.485 GHz radio frequency range  RFID • Passive or active tags used to identify items • Passive – rely on RFID reader to activate and read • Active – have a battery to broadcast the ID up to 100 meters • 125 MHz to 960 MHz radio frequency range  NFC (Near Field Communication) • Devices must be in close proximity to exchange data • Used for payments, printing, public parking, etc.
  • 20. 20 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Protocols Zigbee and Z-Wave  Zigbee • Requires a ZigBee Coordinator to manage client devices connected in a wireless mesh network. • Devices commonly managed from a cell phone app • IEEE 802.15.4 standard • 868 MHz to 2.4 GHz range up to 20 meters, 65,000 devices, and data speeds up to 250 kb/s  Z-Wave • Proprietary standard, but public version available • 232 devices can connect to a wireless mesh network with data speeds up to 100 kb/s.
  • 21. 21 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Protocols Cellular Generations  1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and caller ID with speeds less than 9.6 Kb/s  2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.  3G – full motion video and streaming music at speeds up to 2 Mb/s  4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s  LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.  5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.
  • 22. 22 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Client – Server Roles  File Client and Server  Web Client and Server  Email Client and Server
  • 23. 23 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services DHCP Server  A DHCP server provides IP addressing information.
  • 24. 24 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services DNS Server  A DNS server translates domain names such as cisco.com to an IP address.
  • 25. 25 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Print Server  A print server • Can control multiple printers • Provides client access to print resources • Allows centralized print job administration • Provides feedback to network clients
  • 26. 26 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services File Server  A file server allows clients to access files using a specific protocol • FTP (File Transfer Protocol) • FTPS (File Transfer Protocol Secure) • SFTP (Secure Shell File Transfer Protocol) • SCP (Secure Copy)
  • 27. 27 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Web Server  A web server provides web resources using these protocols • Hypertext Transfer Protocol (HTTP) • TCP port 80 • Secure HTTP (HTTPS) • Secure Sockets Layer (SSL) • Transport Layer Security (TLS) • TCP port 443
  • 28. 28 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Mail Server  Email messages are stored in databases on mail servers • Client communicates with server in order to reach a different client • Protocol used to send email • Simple Mail Transfer Protocol (SMTP) • Protocols used to retrieve email • Post Office Protocol (POP) • Internet Message Access Protocol (IMAP)
  • 29. 29 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Proxy Server  Proxy servers act on behalf of a client, thus hiding the real internal host  Used to cache frequently accessed web pages
  • 30. 30 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Authentication Server  Authentication, Authorization, and Accounting (AAA) - Allows access to a network device or a particular network
  • 31. 31 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Services Syslog Server  Syslog stores network messages sent by networking devices.
  • 32. 32 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.3 Basic Network Devices
  • 33. 33 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Basic Network Devices Network Interface Card  Todays computers have wired and/or wireless network capability.
  • 34. 34 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Basic Network Devices Repeaters, Bridges, and Hubs  Repeaters – Also called extenders because they regenerate the signal so it can be sent further.  Hub – Receives data on one port and sends to all other ports.  Bridge – Divides a network into two or more segments and tracks which device is on each segment.
  • 35. 35 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Ethernet switches record MAC addresses for each device connected to the switch. • Data is sent to a specific device if the MAC address of that device is in the MAC address table. • Managed switches are used in a company environment and have additional features. • Unmanaged switches are used in home or a small business network. Basic Network Devices Switches
  • 36. 36 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Wireless access points (APs) – provide access to a wireless network for a limited range. Basic Network Devices Wireless Access Points
  • 37. 37 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Basic Network Devices Routers  Routers connect networks. • Use an IP address to forward traffic to other networks • Can be a multipurpose device (integrated router) that includes switching and wireless capabilities
  • 38. 38 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Devices Firewalls  A firewall protects data and devices connected to a network.  Firewalls use access control lists (ACLs) which are rules used to determine whether data is permitted (allowed through) or denied.
  • 39. 39 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Devices IDS and IPS An Intrusion Detection System (IDS) monitors traffic and is a passive system. An Intrusion Prevention System (IPS) actively monitors traffic and takes action when needed.
  • 40. 40 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Devices UTMs  Universal Threat Management (UTM) is an all-in-one security appliance. Features are vendor-specific, but could include: • Firewall services • IDS/IPS services • Additional security services against Zero Day, Denial of Service (DoS) Distributed Denial of Service (DDoS), and spyware • Proxy and email filtering • Network access control • VPN services
  • 41. 41 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Devices Endpoint Management Server  An endpoint management server monitors end devices such as PCs, laptops, servers, tablets, printers, etc.
  • 42. 42 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Other Network Devices Legacy and Embedded Systems  A legacy system is a device on the network no longer supported, but still in operation.  An embedded system is a device built into something else such as an appliance. Embedded microchips are contained in legacy systems and embedded systems.  Legacy systems and embedded systems could be a security risk.
  • 43. 43 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Other Network Devices Patch Panel A centralized place where network cables attach to the back. Patch cables are used to make a connection to another patch panel which connects to a different wiring closet, or to a device such as a switch mounted nearby.
  • 44. 44 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Other Network Devices Power over Ethernet and Ethernet over Power  Power over Ethernet (PoE) is a standard for providing power to devices such as APs, cameras, or IP phones through a cable.  A PoE injector can be connected to a cable and a second cable is used to connect a device that receives power from the injector. PoE injector  Ethernet over Power (powerline networking) uses existing electrical wiring to create a network. Network cable
  • 45. 45 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Other Network Devices Cloud-based Network Controller  A cloud-based network controller is a remote device used to manage network devices like access points or switches.
  • 46. 46 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.4 Network Cables
  • 47. 47 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Tools Network Tools and Descriptions  Wire cutters or side cutters  Wire strippers  Crimper – used to securely attach an RJ-45 connector  Punch down tool – used to terminate wires into termination
  • 48. 48 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Tools Network Tools and Descriptions (Cont.)  Multimeter  Tone Generator  Loopback adapter – used to check a port  Cable Tester  Wi-Fi analyzer
  • 49. 49 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copper Cables and Connectors Cable Types  Cable types used in networking • Twisted-pair • Coaxial • Fiber-optic
  • 50. 50 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copper Cables and Connectors Coaxial Cables  Coaxial cable • Copper or aluminum • Used in cable TV systems and satellite communication systems • Harder to install, more expensive, and harder to troubleshoot than twisted-pair cabling
  • 51. 51 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copper Cables and Connectors Twisted-Pair Cables  Twisted-pair cabling types • Unshielded twisted-pair (UTP) • Shielded twisted-pair (STP)  UTP • Most common • Four pairs of color-coded wires • Prone to electromagnetic interference (EMI) and radio frequency interference (RFI)  STP • Better protection against EMI and RFI • More expensive and harder to install UTP cabling STP cabling
  • 52. 52 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copper Cables and Connectors Twisted-Pair Category Ratings Cat 5 UTP Cat 5e UTP Cat 6 UTP
  • 53. 53 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copper Cables and Connectors Twisted-Pair Wire Schemes When creating a cable to connect a network device to a wall jack or from the patch panel to a switch, make both ends of the cable the same standard. T568A T568B
  • 54. 54 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Copper Cables and Connectors Build and Test a Network Cable
  • 55. 55 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Fiber Cables and Connectors Types of Fiber Media  Single-mode fiber (SMF) • Small core • Uses laser technology to send one beam of light • Long distances  Multimode fiber (MMF) • Larger core • Uses LEDs to send light • Light is injected at different angles • Cheaper • Bandwidth up to 10 Gb/s up to 550 meters SMF MMF
  • 56. 56 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Fiber Cables and Connectors Fiber-Optic Connectors