Recent Changes - Search:

Home Page

Student Resources

Connect with us:

Full Length Courses

Short Courses

Course Archive Information

Class Wikis

Socials

Various tips:

PmWiki

Edit SideBar

End Navigation

Chapter 1 - Exploring the Network

1.0 Exploring the Network

1.0.1 Introduction >1.0.1.1 Introduction

Upon completion of this chapter you will be able to:

  • Explain how networks affect the way we interact, learn, work and play.
  • Describe how networks support communication.
  • Explain the concept of a converged network.
  • Describe the four basic requirements of a reliable network.
  • Explain the use of network devices.
  • Compare the devices and topologies of a LAN to the devices and topologies of a WAN.
  • Explain the basic structure of the internet.
  • Explain how Lans and Wans interconnect to the internet.
  • Describe the impact of BYOD, online collaboration, video and cloud computing on a business network.
  • Explain how networking technologies are changing the home environment.
  • Identify some basic security threats and solutions for both small and large networks.
  • Explain how the three Cisco enterprise architectures work to meet the needs of the evolving network environment.

1.0.1 Introduction >1.0.1.2 Class Activity – Draw Your Concepts of the Internet

The image on this page shows a man holding multiple devices connected to a global network.

The description for this image is:
"Technology helps create a world in which...

  • national borders
  • geographic distances
  • physical limitations

...become less relevant to our daily lives."

Objectives

Networks are made of many different components
In this activity, the learner is asked to visualize how they are connected, through the Internet, to those places, people, or businesses with whom (or which) they interact with on a daily basis. After reflection and sketching their home’s or school’s topology, they can draw conclusions about the Internet that they may not have thought of prior to this activity.

1.1 Globally Connected

1.1.1 Networking Today >1.1.1.1 Networks in Our Daily Lives

The YouTube video on this page, titled "How Connected We Are" can be accessed via the following link:
http://www.youtube.com/watch?v=-UPD7tbiwWE

1.1.1 Networking Today >1.1.1.2 Technology Then and Now

The figure on this page shows a data chart that illustrates the trend of people using the Internet from pre 1995 to 2020 and beyond showing the following progression:

  • "Fixed" computing (You go to the device).
  • Mobility/BYOD (The device goes with you).
  • Internet of Things (Age of Devices).
  • Internet of Everything (People, Process, Data, Things).

The trend shows that:

  • From 1995 the number of resources available through the internet doubled every 13 years to approximately 20 million in the year 2000.
  • From 2000 the number of resources available through the internet doubled every 1.4 years to approximately 10 billion in the year 2011.
  • From 2011 it is estimated that the number of resources available through the internet will reach approximately 50 billion by the year 2020.

1.1.1 Networking Today >1.1.1.3 The Global Community

The image on this page shows five people using Cisco Telepresence to engage in a conference with four people remotely.

1.1.1 Networking Today >1.1.1.4 Networks Support the Way we Learn

The figure on this page shows the following four ways of using networks to support learning:

  • Virtual Classrooms
  • Collaborative Learning Spaces
  • On Demand Video
  • Mobile Learning

The YouTube video on this page, titled "Cisco Vision Expanding the Classroom" can be accessed via the following link:
http://www.youtube.com/watch?v=dd6h3MeN4P4

1.1.1 Networking Today >1.1.1.5 Networks Support the Way we Communicate

The figure on this page illustrates three forms of communication in a network centric world as follows:

  • Instant Messaging:
    Instant messaging is everywhere and can include audio and video conversations. I M can send text messages to mobile phones.
  • Weblog:
    You can express your thoughts online, share your photos and join a community of fellow thinkers.
  • Podcasting:
    You can listen to your favourite radio show on your portable audio player whenever you have the time and wherever you are. Every time a new show becomes available, it can be automatically downloaded.

1.1.1 Networking Today >1.1.1.6 Networks Support the Way we Work

The image on this page shows four people working at a table, and they are involved in a webcast with a person remotely.

1.1.1 Networking Today >1.1.1.7 Networks Support the Way we Play

The figure illustrates some of the many ways that people use the Internetas follows:

  • Online Interest Groups
  • Online Gaming
  • Online Entertainment
  • Online Shopping
  • Onboard Data Network. For example, on an airplane
  • Instant Messaging

1.1.1 Networking Today >1.1.1.8 Lab - Researching Network Collaboration Tools

See Lab Descriptions.

1.1.2 Providing Resources in a Network >1.1.2.1 Networks of Many Sizes

The figure on this page shows different sizes and configurations for networks as follows:

  • Small Home Networks connect a few computers to each other and the Internet.
  • Small Office/Home Office networks or SOHO network enables computers within a home office or a remote office to connect to a corporate network or access to centralized, shared resources.
  • Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected computers.
  • World Wide Networks, the internet is a network that connects hundreds of millions of computers world wide.

1.1.2 Providing Resources in a Network >1.1.2.2 Clients and Servers

The figure on this page depicts a star topology in which 3 clients and 3 servers are connected to a switch as follows:

  • Web Client and Server:
    The web server runs server software and clients use their browser software, such as Windows Internet Explorer, to access web pages on the server.
  • Email Client and Server:
    The Email Server runs server software and clients use their mail client software, such as
    Microsoft Outlook, to access Email on the server.
  • File Client and Server:
    The File Server stores the file , the client device accesses the file with client software such as Windows Explorer.

1.1.2 Providing Resources in a Network >1.1.2.3 Clients and Servers (Cont.)

The figure on this page depicts a single server running multiple services and being accessed by multiple clients as follows:

  • The server is an email server, web server and file server.
  • The 1st computer is a File Access Client.
  • The 2nd computer is a Web Browser and Email Client.
  • The 3rd computer is a Web Browser and File Access Client.
  • The 4th computer is a Web Browser, Email Client and File Access Client.

1.1.2 Providing Resources in a Network >1.1.2.4 Peer to Peer

The figure on this page depicts a printer connected to one computer which is then connected to another computer. The first computer shares the printer and the second computer has files to share. This is called a peer to peer network.
A box below the figure lists the advantages and disadvantages of peer to peer networking.

The Advantages of peer to peer networking are:

  • Easy to setup
  • Less complexity
  • Lower cost since network devices and dedicated servers may not be required.
  • Can be used for simple tasks such as transferring files and sharing printers.

The disadvantages of peer to peer networking are:

  • No centralized administration
  • Not as secure
  • Not scalable
  • All devices may act as both clients and serves which can slow their performance.

1.2 Lans, WanS, and the Internet

1.2.1 Components of a Network >1.2.1.1 Components of the Network

The figure on this page shows the three categories of network components. The figure shows an internetwork of 4 routers connected to 2 LANs consisting of multiple devices.

The figure also has the following 3 buttons:

  • Devices
  • Media
  • Services

Selecting the Devices button highlights all the devices in the figure such as computers, servers, VoIP phones, switches, and routers.

Selecting the Media button highlights all the media in the figure such as cabling, radio frequencies, and infrared waves.

Selecting the Services button highlights all the services in the figure such as software running on a computer and processes and services running on network switches.

1.2.1 Components of a Network >1.2.1.2 End Devices

The animation on this page shows a data packet travelling from LAN1 through an Internetwork consisting of four interconnected routers to LAN2 as follows:

  1. A message from a learner on LAN1 is sent to router1 on the internetwork, from router1 the message has three possible paths it can travel by.
  2. On considering various conditions (which will be discussed later) the message is sent through router2 to LAN2.
  3. At LAN2 the message is received by the switch and by checking the destination address of the message it is delivered to the learner intended to receive the message.
The description given for this animation is "Data originates with an end device, flows through the network, and arrives at an end device".

1.2.1 Components of a Network >1.2.1.3 Intermediary Network Devices

The animation on this page shows an internetwork consisting of four interconnected routers (a router is an intermediary device) with redundant links as follows:

  • In the 1st case the message that arrives at router1 is a high priority message and it has a QoS. tag applied to it, so it will be delivered quickly to router3.
  • In the 2nd case the message that is being sent from router4 to router1 becomes damaged in transit and is not received. Router1 recognizes that a packet is missing and requests a retransmission.
  • In the 3rd case the message that is sent from router1 has two path options for delivery and the router makes a decision as to which path to use, in this case sending the packet to router2.
The description given for this animation is "Intermediary devices direct the path of data but do not generate or change the data content".

1.2.1 Components of a Network >1.2.1.4 Network Representations

The image on this page shows three types of media. The first is copper cabling, the second is fiber optic cabling and the third is wireless signalling.

1.2.1 Components of a Network >1.2.1.5 Network Representations

The figure on this page is divided into 3 categories each displaying graphical symbolic network representations for corresponding devices and media used in the curriculum, as shown in the following table:

End DevicesDesktop Computer, Laptop, Printer, IP Phone, Wireless Tablet, TelePresence Endpoint
Intermediary DevicesWireless Router, LAN Switch, Router, Multilayer Switch, Firewall Appliance
Network MediaWireless Media, LAN Media, WAN Media

These network representations are used in topology diagrams to provide an easy way to understand how the devices in a large network are connected.

1.2.1 Components of a Network >1.2.1.6 Topology Diagrams

The figure on this page depicts two different types of topology diagrams as follows:

  1. A Physical Topology diagram, which Identifies the physical location of intermediary devices, configured ports, and cable installation. These may include computers, servers, hubs, switches, and routers.
  2. A Logical Topology diagram, which Identifies devices, ports, and IP addressing scheme. These may include network addresses, individual IP addresses of computers, servers, and routers.

1.2.1 Components of a Network >1.2.1.7 Activity- Network Components Representations and Functions.

The figure on this page is a table divided into 3 Device Categories as follows:

  • End Devices
  • Intermediary Devices
  • Network Media

The learner is first asked to match the following network component function to its Device Category:

  • Provides an interface between human network and communication network
  • Provides a connection for a host to the network and can connect multiple networks to form an internetwork
  • Provides a channel for messages to travel from source to destination

The learner is then asked to match a number of Network Component Icons to their Device Category.

The figure also has the following 2 buttons:

  • Check
  • Reset

1.2.2 LANs and WANs >1.2.2.1 Types of Networks

The figure on this page depicts the Internet as a wide area network allowing connection between three local area networks, such as a home office, a company's central office and a company branch office.

1.2.2 LANs and WANs >1.2.2.2 Local Area Networks

The figure on this page represents a LAN network consisting of four end devices connected to a single switch which is connected to a server. A LAN typically consists of computers, workstations, network servers and commonly VOIP stations.

The description given for this figure is "A network serving a home, building or a campus is considered a LAN".

1.2.2 LANs and WANs >1.2.2.3 Wide Area Networks

The figure on this page depicts two LanS connected by a WAN link.

The description given for this figure is "LanS separated by geographic distance are connected by a network known as WAN".

1.2.3 The Internet >1.2.3.1 The Internet

The figure on this page depicts a collection of interconnected local area networks forming the Internet.

The description given for this figure is "LanS and WanS maybe connected into internetworks."

1.2.3 The Internet >1.2.3.2 Intranet and Extranet

The figure on this page shows three concentric circles illustrating the difference between an intranet and an extranet. The intranet is only accessible from within the organization, and the extranet is accessible outside the company. The circles are labelled as follows:

  • The inner circle is labelled Intranet, Company Only.
  • The middle circle is labelled Extranet, Suppliers, Customers, Collaborators.
  • The outer circle is labelled The Internet, The World.

1.2.3 The Internet >1.2.3.3 Researching Converged Network Services

See Lab Descriptions.

1.2.4 Connecting to the Internet >1.2.4.1 Internet Access Technologies

The image on this page shows a globe with network cables plugged into it representing the Internet.

1.2.4 Connecting to the Internet >1.2.4.2 Connecting Remote learners to the Internet

The figure on this page illustrates options for connecting to the Internet, which include:

  • DSL
  • Cable
  • Cellular
  • Satellite
  • Dial up Telephone

1.2.4 Connecting to the Internet >1.2.4.3 Connecting Business to the Internet

The figure on this page illustrates connection options for businesses, which include:

  • Dedicated Leased Line
  • Metro Ethernet
  • DSL
  • Satellite

1.2.4 Connecting to the Internet >1.2.4.4 Packet Tracer - Network Representation

Objectives:

Part 1: Overview of the Packet Tracer Program
Part 2: Exploring Lans, Wans and Internets

1.3 The Network as a Platform

1.3.1 Converged Networks >1.3.1.1 The Converging Network

The two figures on this page represent multiple networks and converged networks respectively.

Figure 1 represents three independent networks, each running a different service. The first one is running a computer data network. The second network is running a telephone network and the third is running a broadcast media network.

The description given for figure 1 is, "Multiple services are running on multiple networks."

Figure 2 represents a converged network, which is one network running all previously mentioned services.

The description given for figure 2 is "Converged data networks carry multiple services on one network."

1.3.1 Converged Networks >1.3.1.2 Planning for the Future

The figure on this page represents how the Internet allows people throughout the world to communicate. It shows a map of the world with the text, "The Human Network is everywhere.". The map is surrounded by the following four images and their respective text:

ImageText
a man holding a tablet device reading a newspaperIntelligent networks allow handheld devices to receive news and emails, and to send text.
a group of people participating in a video conferencePhones connect globally to share voice, text, and images.
people competing in online gamingVideo conferencing around the globe is in the palm of your hand.
a person using a smart phoneOnline gaming connects thousands of people seamlessly.

Each image has an arrow pointing to a different area on the map.

1.3.1 Converged Networks >1.3.1.3 Lab - Mapping the Internet

See Lab Descriptions.

1.3.2 Reliable Network >1.3.2.1 The Supporting Network Architecture

The four figures on this page explain the following four basic characteristics that the underlying network architectures need to address in order to meet learner expectations:

  • Figure 1, Fault Tolerance: Redundant connections allow for alternative paths if a device or a link fails. The learner experience is unaffected.
  • Figure 2, Scalability: Additional learners and whole networks can be connected to the internet without degrading the performance for existing learners.
  • Figure 3, Quality of Service (QoS): Quality of Service managed by the router; ensures that priorities are matched with the type of communication and its importance to the organization. Web pages can usually receive a lower priority. Streaming media will need priority to maintain a smooth, uninterrupted learner experience.
  • Figure 4, Security: Administrators can protect the network with software and hardware security and by preventing physical access to network devices. Security measures protect the network from unauthorised access.

1.3.2 Reliable Network >1.3.2.2 Fault Tolerance in Circuit Switched Networks

The figure on this page represents a circuit switched telephone network. Two telephones are connected through a network of five telephone switches. Each individual phone call, once it is established, will maintain that circuit until that call is ended.

The process is as follows:

  • Many paths are possible but only one path is selected per call.
  • Once a call is established, all communication takes place on this path or circuit. A circuit is dedicated to this call for the duration of the call.
  • The circuit stays active, even if no one is speaking.

The description given for this figure is "There are many, many circuits, but a finite number. During peak periods, some calls may be denied."

1.3.2 Reliable Network >1.3.2.3 Fault Tolerance in Packet Switched Networks

The figure on this page represents a packet switched Data Network. This network consists of five routers located between the source and the destination:

The process is as follows:

  • Many paths may be used for a single communication as individual packets are routed to a destination.
  • No fixed path is established. Packets are routed according to the best path available at the time.
  • Prior to transmission, each communication is broken into packets which are addressed and numbered. Each packet has three blocks, source address, destination address and sequence number.
  • At the destination packets may be reassembled into order according to their sequence number.

The description given for this figure is "During peak periods, communication may be delayed, but not denied."

1.3.2 Reliable Network >1.3.2.4 Scalable Networks

The three figures on this page depict the internet's hierarchical layered structure for addressing, for naming, and for connectivity services as follows:

  • Figure 1: At the centre of the internet, Tier 1 ISP's provide national and international connections. These ISP's treat each other as equals. Examples are Verizon, Sprint, AT & T NTT, cable systems, and wide area wireless networks. This is the backbone of the internet.
  • Figure 2: Tier 2: These ISP's are smaller and often provide regional services. Tier 2 ISP's usually pay Tier 1 ISP's for connectivity to the rest of the Internet. Peer connections between networks at the same level provide direct connections, bypassing longer routes and preventing congestion on the backbone. The point where ISP's interconnect is often called a border.
  • Figure 3: Tier 3 ISP's are the local providers of service directly to the end learners .Tier 3 ISP's are usually connected to Tier 2 ISP's and pay Tier 2 providers for internet access.

1.3.2 Reliable Network >1.3.2.5 Providing QoS

The three figures on this page illustrate how Quality of Service (QoS) is an ever increasing requirement of networks today as follows:

  • Figure 1 lists the types of data carried on a converged data network:
    • Real time traffic such as Voice over IP (VoIP) and Video conferencing.
    • Web content such as Browsing and Online shopping.
    • Transactional traffic such as Order processing and billing, Inventory and reporting, Accounting and reporting.
    • Streaming traffic such s Video on Demand (VoD) and Movies.
    • Bulk traffic such as Email, Data backups, Print files.
The description given for this figure is "On a converged network all traffic is not alike."
  • Figure 2 represents the use of queuing to prioritise communication:
    1. Communication from a telephone, a PC and a web server is passed to a router. The contents are Voice over IP, financial transaction and a web page respectively.
    2. The router prioritizes the three different communications according to their classification. Accordingly Voice Over IP is queued as high priority, the financial transaction from the PC is queued as medium priority and the web page is queued as low priority. All the three communications are passed through a single link from router to the network .
    3. All communication has some access to the media, but higher priority communication has greater percentage of the packets.
The description given for this figure is "Queuing according to data type enables voice data to have priority over transaction data, which has priority over web data."
  • Figure 3 is a table that lists an example demonstrating the benefit of quality of service on streaming video data traffic:
Communication typeWithout QoSWith QoS
Streaming audio or videoChoppy picture starts and stopsClear, continuous service.
Vital TransactionsTime:02:14:05
Price: $1.54
Just one second earlier...
Time:02:14:05
Price:$1.52
The price maybe better.
Downloading web pages
(often low priority)
Web pages arrive a bit later...But the end result is identical.

1.3.2 Reliable Network >1.3.2.6 Providing Network Security

The two figures on this page illustrate why security is important on Data Networks as follows:

  • Figure 1 shows a credit card statement with fraudulent charges, the learners account has presumably been compromised.
  • Figure 2 shows various security methods, such as access policies, firewalls and data encryption.states that unauthorized use of our communications data can have severe consequences.

1.3.2 Reliable Network >1.3.2.7 Activity – Reliable Networks

The figure on this page is a table consisting of 5 columns. The first column lists the following network architecture requirements:

  1. Networks should always be available:
  2. Full memory queues mean packets must be dropped.
  3. Priority queues are implemented when demand for network bandwidth exceeds supply.
  4. Business and personal network equipment must be protected.
  5. Developing a plan for priority queueing is a strategy for quality delivery of information.
  6. Business and personal data must be protected.
  7. Different types of Internet Service Providers can affect the quality of network data delivery.
  8. Networks can grow or expand with minimal impact on performance.
  9. Priority for queueing packets is based on the type of data sent and how important it may be.
  10. Data can travel through more than one route for delivery from a remote source.
  11. Types of network equipment, how they are identified (IP address / MAC address), and how they are named can have an impact on the growth of the network.
  12. Many tools and procedures are being implemented to address the need to exchange confidential and business critical information.
  13. Traffic delay and data loss should be considered when setting up delivery through priority queueing.
  14. Compromising the integrity of crucial business and personal assets could have serious repercussions.
  15. Common network standards allow hardware and software vendors to focus on product improvements and services.
  16. Types of network connectivity can affect delivery of information.

The other four columns have headings of:

  • Fault Tolerance
  • Scalability
  • Quality of Service
  • Security

The learner is asked to select the appropriate column to identify the network architecture requirement to which each characteristic or feature belongs.

The figure also has the following 2 buttons:

  • Check
  • Reset

1.4 The Changing Network Environment

1.4.1 Network Trends >1.4.1.1 New Tends

The figure on this page lists the following Internet use predictions:

  • By 2014, traffic from wireless devices will exceed traffic from wired devices.
  • By 2015, the amount of content traversing the Internet annually will be 540,000 times the amount that travelled in 2003.
  • By 2015, 90% of all content on the Internet will be video based.
  • By 2015, a million video minutes will traverse the Internet every second.
  • By 2016, the annual global IP traffic will surpass the zettabyte threshold (1,180,591,620,717,411,303,424 bytes).
  • By 2016, the number of devices connected to IP networks will be nearly three times as high as the global population.
  • By 2016, 1.2 million minutes of video content will cross the network every second.
  • By 2020, 50 billion devices will be connected to the Internet.

The YouTube video on this page , titled "Imagine the Possibilities" describes the changing world of technology. It can be accessed via the following link:
http://www.youtube.com/watch?v=EZLVOs2oX_M

1.4.1 Network Trends >1.4.1.2 B.Y.O.D.

The image on this page shows a man holding a netbook computer, a tablet computer and a smart phone. This represents the idea of Bring Your Own Device (BYOD).

1.4.1 Network Trends >1.4.1.3 Online Collaboration

The figure on this page lists the following benefits of incorporating collaboration tools into a business strategy:

  • Improve customer satisfaction:
    Enhance the quality of customer experiences through an instant online presence and communication mechanism.
  • Increase communication choices:
    Provide a broader range of communication channels, while reducing cost and improving satisfaction.
  • Optimize team performance:
    Build trust and share information across distributed groups, businesses, and geographies to speed business agility.
  • Enable mobile learners:
    Provide flexibility and satisfaction to employees by allowing them to work from anywhere, using any preferred device.
  • Improve organizational communications:
    Communicate effectively to the entire organization through online forums or company wide online meetings that allow all company levels to participate and feel included.
  • Transform training and event management:
    Deliver an interactive strategy to achieving high business performance through training, without incurring additional travel costs of face to face interactions.
  • Improve facility management:
    Create a new workplace offering secure and flexible working options to improve teamwork, increase productivity, all while reducing the cost of real estate and physical workplace requirements.

1.4.1 Network Trends >1.4.1.4 Video Communication

The two figures on this page show that video is another trend in networking that is critical in the communication and collaboration effort.

  • Figure 1 is a data chart depicting the rapid increase of people becoming connected to the Internet as follows:
    • In 2001 there were 250 million worldwide internet learners.
    • In 2012 there were 2.08 billion worldwide internet learners.
    • In 2012 internet video accounted for 40% of all consumer internet traffic
    • In 2016 it is predicted that internet video will become 62% of all consumer internet traffic.
  • Figure 2 lists the following drivers for implementing a video strategy:
    • A global workforce and need for real time collaboration: Create collaborative teams that span corporate and national boundaries, and geographies.
    • Reducing costs and green IT : Avoiding travel reduces both cost and carbon emissions.
    • New opportunities for IP convergence: Converging video applications, such as high definition video collaboration, video surveillance systems, and video advertising signage onto a single I P network.
    • Media explosion: Plummeting cost of video cameras and a new generation of high quality, low cost devices have turned learners into would be movie producers.
    • Social networking: The social networking phenomenon can be as effective in business as it is in a social setting. For example, employees are increasingly filming short videos to share best practices with colleagues, and to brief peers about projects and initiatives.
    • Demands for universal media access: learners are demanding to be able to access rich media applications wherever they are, and on any device. Participation in video conferencing, viewing the latest executive communications, and collaborating with co workers are applications that will need to be accessible to employees, regardless of their work location.

The YouTube video on this page, titled "Cisco Telepresence Vision: Future Technology" is about using Cisco TelePresence in daily life. It can be accessed via the following link:
http://www.youtube.com/watch?v=NkW0hHlO7Jk

1.4.1 Network Trends >1.4.1.5 Cloud Computing

Figure 1 on this page is a drawing of the Internet cloud with several devices connecting to it, such as personal computers, servers, databases and notebook computers.

Figure 2 on this page depicts the following many types of clouds used in cloud computing:

  • Custom clouds:
    These are clouds built to meet the needs of specific industry such as healthcare or media. Custom clouds can be private or public.
  • Hybrid clouds:
    A hybrid cloud is made up of two or more clouds (example: part custom, part public), where each part remains a distinctive object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on learner access rights.
  • Private clouds:
    Cloud based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government. A private cloud can be set up using the organization’s private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.
  • Public clouds:
    Cloud based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay per use model, such as paying for online storage. The public cloud uses the Internet to provide services.

1.4.1 Network Trends >1.4.1.6 Data Centers

The YouTube video on this page, titled "How Big Will cloud Computing be in 2015?" is on the growing use of cloud computing. It can be accessed via the following link:
http://www.youtube.com/watch?v=D34G30lWgg8

1.4.2 Networking Technologies for the Home >1.4.2.1 Technology Trends in the Home

The image on this page shows a car, a smart phone and a typical house all connected to the cloud. This is used to show Smart Home Technology.

1.4.2 Networking Technologies for the Home >1.4.2.2 Powerline Networking

The figure on this page shows Powerline Networking. A Linksys PLEK 400 powerline adapter is plugged into an electrical wall outlet and allows connections to networking devices through the existing power lines.

1.4.2 Networking Technologies for the Home >1.4.2.3 Wireless Broadband

The figure on this page shows a transmission tower emitting wireless signals. Next to the tower is an outline drawing of a typical home, and inside the home are wireless devices, such as a wireless computer, a set of wireless speakers and a wireless tablet device.

1.4.3 Network Security >1.4.3.1 Security Threats

The figure on this page shows threats to networks, external threats come from the Internet and internal threats come from within the network.

1.4.3 Network Security >1.4.3.2 Security Solutions

The image on this page shows a drawing of Network Security Devices, these include firewalls and access control lists on routers.

1.4.3 Network Security >1.4.3.3 Activity – Network Security Terminology

The figure on this page lists the following five security terms:

  • Firewall
  • Zero day (-hour)
  • Virus, Worm or Trojan horse
  • Access Control List (ACL)
  • Denial of Service

There is a table with two columns headed Terminology and Definition. The definitions are:

  • An attack which slows down or crashes equipment and programs.
  • Filters network access and data traffic.
  • Blocks unauthorised access to your network.
  • Network attack that occurs on the first day that a vulnerability becomes known.
  • Arbitrary code running on learner devices.

The learner is asked to match the security terms to their correct definitions.

The figure also has the following 2 buttons:

  • Check
  • Reset

1.4.4 Network Architectures >1.4.4.1 Cisco Network Architectures

The image on this page shows a network technician working on a set of punch down blocks.

1.4.4 Network Architectures >1.4.4.2 CCNA

The figure on this page depicts the Cisco certification pyramid. The levels are as follows:

  1. The first level at the base of the pyramid is the entry level certification
  2. The second level is the Associate level certification
  3. The third level is the Professional level certification
  4. The fourth level is the Expert level certification
  5. The fifth level at the top of the pyramid is the Architect level certification

1.4.4 Network Architectures >1.4.4.3 Lab - Researching I T and Networking Job Opportunities

See Lab Descriptions.

1.5 Summary

1.5.1 Summary >1.5.1.1 Class Activity –Draw Your Concept of the Internet Now

The image on this page shows a globe made up of various small pictures.

The description given for this image is:
"Exploring the Network...

  • Communicating in a Network Centric World
  • The Network as a Platform
  • Lans, Wans and the Internet
  • The Changing Network Environment"

Objectives

In this activity, the learner is asked to illustrate how concepts from Chapter 1 are applied to show how network devices connect to and throughout the Internet. After reflecting on their home or small business topology, they will become familiar with using device icons and knowledge needed to visualize network connectivity through the remaining network courses.

1.5.1 Summary >1.5.1.2 Summary

The images on this page show how the Internet allows people throughout the world to communicate as follows:

  • Image 1 is a man holding a tablet device reading a newspaper. Intelligent networks allow handheld devices to receive news and emails and to send text.
  • Image 2 is a group of people participating in a video conference. Video conferencing around the globe is in the palm of your hand.
  • Image 3 is people competing in online gaming. Online gaming connects thousands of people seamlessly.
  • Image 4 is a person using a smart phone. Phones connect globally to share voice, text and images.

The description for these images is "The Human Network is everywhere."

End of Chapter 1: Exploring the Network.

Next - Chapter 2: Configuring a Network Operating System.

Edit - History - Print - Recent Changes - Search
Page last modified on October 29, 2014, at 12:52 AM