Welcome to CAVI, the Cisco Academy for the Vision Impaired. Course Fees Linux Wiki HTML Wiki Documentation Index PmWiki FAQ |
Main /
IntroductionToNetworksChapterDescriptionsAndLabWorkChapter 0: Course Introduction0.0.1.4 How we teachE-Doing design philosophy is represented by five columns in the figure with central column is E-doing surrounded by four columns Engage, Personalize, stimulate, and interact. 0.0.1.5 Practice leads to MasteryFour methods to learn Cisco are shown in the figure
Chapter 1 : Exploring the networkUpon completion of this chapter you will be able to:
1.0 Exploring the Network1.0.1.2 Class Activity – Draw Your Concepts of the InternetFigure here says that Technology helps create a world which National borders, Geographic distances, Physical limitations Become less relevant to our daily lives. 1.1 Globally Connected> 1.1.2 Providing Resources in a Network1.1.2 Providing Resources in a Network >1.1.2.1 Networks of Many SizesThe figure gives you an idea about different type of network in terms of range
1.1.2 Providing Resources in a Network >1.1.2.2 Clients and ServersThe figure here exhibits a star topology in which different clients and servers are connected to a switch. The different client and server services are briefly described below.
The web server runs server software and clients use their browser software, such as Windows Internet Explorer, to access web pages on the server.
The Email Server runs server software and clients use their mail client software, such as Microsoft Outlook, to access Email on the server.
The File Server stores the file , the client device accesses the file with client software such as Windows Explorer. 1.1.2 Providing Resources in a Network >1.1.2.3 Clients and Servers (Cont.)The exhibit in this page show four computers are connected to a single server which explain multiple types of server software and multiple types of client software running on a single computer. The server is an email server, web server and file server. The first computer is a File Access Client. 2nd computer is a web browser as well as an email client. 3rd computer is a web browser and file access client. 4th computer is an email client also a file access client. 1.1.2 Providing Resources in a Network >1.1.2.4 Peer-to-PeerThe exhibit in this page show two computers and a printer connected in a single line which is a peer-to-peer network. Also there is a display of advantages and disadvantages of peer-to-peer networking. The Advantages of peer-to-peer networking:
The disadvantages of peer-to-peer networking
1.2 LANs, WANS, and the Internet1.2.1 Components of a network >1.2.1.2. End DevicesIn the animation shown here has two LAN’s LAN1 and LAN2 connected by an Internetwork consisting of four routers connected to each other. A message from a user on LAN1 is sent to router1 on inter-network, from router1 it has three paths to travel by considering various conditions (which will be learned later) it choose path through router 2 and reaches LAN2.At LAN2 message is received by the switch and by checking the destination address of the message it is delivered to the user intended to receive the message. The description given in this animation is data originates with an end device, flows through the network, and arrives at an end device. 1.2.1 Components of a network >1.2.1.3 Intermediary network devicesIn this animation there are four routers, which is an intermediary device, connected to each other. In the first case a message arrives at a router1 it is an important message thus it is given priority to send. In the second case a message is sent from one router 1 to next router 2 but the message was broken thus it was send again. In the third case message is received at a router2 and it has two paths through router 3 and router 4 to reach its destination, router2 send the message to the path were it will arrive faster i.e. through router 3. The description given in this animation is intermediary devices direct the path of data but do not generate or change the data content. 1.2.1 Components of a network >1.2.1.7 Activity- Network components representations and functionsName the network component according to the function:
1.2.2 LANs and WANs > 1.2.2.2 Local Area NetworksThe figure shown here is a representation of LAN network, here four end devices are connected to a single switch and switch is connected to a server. A network serving a home, building or a campus is considered a LAN. 1.2.2 LANs and WANs >1.2.2.3 Wide Area NetworksThe picture represented here is a WAN, here two LANS are separated by geographic distance which is connected by a WAN. LANS separated by geographic distance are connected by a network known as WAN. 1.2.3 The Internet >1.2.3.1 The InternetIn the given figure different LANs and WANs are connected to each other that represent Internet. LANS and WANS maybe connected into internet. 1.2.3 The Internet >1.2.3.3 Intranet and ExtranetThree concentric circles are used in this figure to represent internet, intranet and extranet. The innermost circle stands for intranet this represent company only. The middle circle stands for extranet this represent suppliers, customers and collaborators. The outermost circle correspond to internet this represent the world. 1.2.4 Connecting to the internet>1.2.4.2 Connecting remote users to the internetThe figure here illustrates the connection between small office and home users to internet service provider. The different connection options for above mentioned set-up are :
1.2.4 Connecting to the internet >1.2.4.3 Connecting Business to the InternetThe figure here illustrates the connection between organisation and Internet service provider . The different connection options for this set-up are :
1.3 The Network as a platform1.3.1 Converged networks > 1.3.1.1 The converging networkThe two figures over here represents multiple networks and converged networks respectively. In figure 1three connections are shown here which represent multiple networks. First a PC is sending a message to another PC with the help of computer networks in the middle. Second a message is send from a telephone to another telephone with telephone networks in the middle. Third broadcasting station is connected to a television with broadcast networks in the middle. These three different connection shows multiple services are running on multiple networks. Figure 2 represent converged networks. In figure 2 the above described separate and distinct communications forms in figure 1have converged onto a common platform. All the end devices mentioned above are connected to other end devices with converged network in the middle. This figure depicts converged data networks carrying multiple services on one network. 1.3.1 Converged networks >1.3.1.2 Planning for the futureThe pictures here represent how intelligent network represents are bringing the world together. Intelligent networks allow handheld devices to receive news and emails, and to send text. Phones connect globally to share voice, text, and images. Video conferencing around the globe is in the palm of your hand. Online gaming connects thousands of people seamlessly. 1.3.2 Reliable Network>1.3.2.1 the supporting Network ArchitectureThe figures explain four characteristics network architecture should meet up. Figure 1 explains fault tolerance that is redundant connections allows for alternative paths if a device or link fails. The user experience is unexpected. Figure 2 explains scalability that is additional users and whole networks can be connected to the internet without degrading the performance for existing users. Figure 3 explains quality of service, managed by router; ensure that priorities are matched with the type of communication and its importance to the organization. Web pages can usually receive a lower priority. Streaming media will need a priority to maintain a smooth uninterrupted user experience. Figure 4 talks about security. Administrators can protect the network with software and hardware security and by preventing physical access to network devices. Security measure protects the network from unauthorized access. 1.3.2 Reliable network>1.3.2.2 Fault tolerance in circuit switched networksThe figure explains a circuit switching in telephone network. Two telephones are connected by a number of telephone switches in between. Many paths are possible but only one path is selected per call. Once a call is established, all communication takes place on this path or circuit. A circuit is dedicated to this call for the duration of the call. The circuit stays active, even if no one is speaking. There are many, many circuits, but a finite number. During peak periods, some calls may be denied. 1.3.2 Reliable network>1.3.2.3 Fault tolerance is packet-switched networksThe figure demonstrates packet switching in a data network. In this network there are quite number of routers between the source and destination In a packet switching network many paths maybe used for a single communication as individual packets are routed to a destination. No fixed paths is established .Packets are routed according to the best path available at the time. Prior to the transmission, each communication is broken into packets which are addressed and numbered. Each packet has three blocks that is, source address, destination address and sequence number. At the destination packets maybe reassembled into order according to their sequence number. During peak periods, communication maybe delayed, but not denied. 1.3.2 Reliable network>1.3.2.4 Scalable networksThe figure explains the hierarchical nature of the network.
Peer connections between networks at the same level provide direct connections, bypassing longer routes and preventing congestion on the backbone. The point where ISP’s interconnect is often called a border.
1.3.2 Reliable network>1.3.2.5 Providing QoSFigure 1 explains different type of traffic and content carried by converged networks.
Figure 2 explain using queue to prioritize communication In the figure content from a telephone, a PC and web server is passed to a router. The contents are Voice over IP, financial transaction and web page respectively. Router prioritizes the three contents accordingly Voice Over IP is managed as high priority queue, financial transaction from PC is treated as medium priority queue and finally webpage is given low priority queue. All the three communications are passed through a single link from router to the network .All communications has access to the media, but higher priority communication has greater percentage of the packets. Queuing according to data type enables voice data to have priority over transaction data, which has priority over web data. Figure 3 is tabling that compare communication type quality without QoS and with QoS.
1.3.2 Reliable network>1.3.2.6 providing Network SecurityThe figure shows firewall, accessing policy and data encryption are important for security of a network. The communication and information that we would like to be private is protected from those who would make unauthorized use of it. Unauthorized use of our communications data can have severe consequences. 1.3.2 Reliable network>1.3.2.7 Activity – Reliable networksFill the table with appropriate characteristic or feature according to the network architecture requirement.
1.4 The Changing Network Environment1.4.1 Network Trends>1.4.1.1 New trendsSome predictions are written in this picture. They are:
There is video uploaded in this page which says about predictions. The video is uploaded by Cisco in YouTube which can be accessed from the link http://www.youtube.com/watch?v=EZLVOs2oX_M 1.4.1 Network Trends>1.4.1.3 Online collaborationBenefits of incorporating collaboration tools into a business strategy include:
1.4.1 Network Trends>1.4.1.4 Video CommunicationFigure 1 is a graphical representation of trend of video in communication. It says in 2012 internet video accounts to 40% of all consumer internet traffic and it is expected in 2016 internet video will become 62%of all consumer Internet traffic. Figure 2 give a text on drivers for implementing a video strategy:
There is a video uploaded in this page about Cisco telepresence vision. It can be accessed from the link: http://www.youtube.com/results?search_query=cisco+telepresence+vision&oq=cisco+telepresence+vision&gs_l=youtube.12..0.3598.3598.0.4385.1.1.0.0.0.0.441.441.4-1.1.0...0.0...1ac.1.11.youtube.bdk6aGOEweI 1.4.1 Network Trends>1.4.1.5 Cloud ComputingFigure 2 over here represents four types of clouds.
1.4.1 Network Trends>1.4.1.6 Data CentersThe video tells about how big will be the cloud computing by 2015 .The link to the video http://www.youtube.com/watch?v=D34G30lWgg8 1.4.3 Network Security>1.4.3.3 Activity – Network Security TerminologyFill the table with appropriate security terms. The security terms can be chosen are firewall, Zero-day, Virus or Trojan horse, Access control list, Denial of service.
1.4.4 Network Architectures>1.4.4.2 CCNAThe picture shows the level of certifications in Cisco. Totally there are five levels they are: Level 1: Entry Level 2: Associate Level 3: Professional Level 4: Expert Level5: Architect 1.5 Summary1.5.1 Summary>1.5.1.1 Class Activity –Draw your concepts for the Internet nowObjectivesIn this activity you will show how the concepts from chapter 1 are applied to show how network devices connect to and throughout the Internet. After reflecting on your home or small business topology, you will become familiar with the using device icons and knowledge used to visualize network connectivity through the remaining network courses. Background/ScenarioIn this activity you will use the knowledge you have acquired throughout the Chapter 1, and the modelling activity document that you prepared at the beginning of this chapter. You may also refer to the other activities completed in this chapter, including packet tracer activities. Draw a map of internet as you see it now. In your revised drawing you may need to include:
Save your drawing in a hard copy format .Be prepared to share and explain your revised work in the class. Required resources
ReflectionAfter completing chapter 1, are you aware of more devices, cabling, and physical components of a small – to – medium sized network? Explain your answer. |