Exploring the Network

NETWORK COMPONENTS

  • Devices
    • End Devices
    • Intermediary Devices
  • Media
    • Copper
    • Fibre Optic
    • Wireless
  • Services
    • Software
    • Procedures
    • Processes

Network Infrastructure Devices

  • Network Access Devices (switches, and wireless access points)
  • Internetworking Devices (routers)
  • Security Devices (firewalls)

Network Infrastructure Types

  • Local Area Network (LAN)
    • A network serving a home, building, or campus is considered a LAN.
  • Wide Area Network (WAN)
    • LANs separated by geographic distance are connected by a network known as a Wide Area Network.
  • Other Types
    • Metropolitan Area Network (MAN)
    • Wireless Local Area Network (WLAN)
    • Storage Area Network (SAN)

Supporting Network Architecture

  • Fault Tolerance (circuit switching, packet switching)
  • Scalability (Tier 1 ISP = global service, Tier 2 ISP = regional service Tier 3 ISP = local service)
  • Quality of Service (Time-sensitive communication, Priority to organization, Undesirable communication)
  • Security (access policy, data encryption, firewall)
  • Supporting Network Architecture
    • Effectiveness : Fit-for-purpose (How well it works)
    • Efficiency : Fit-for-use
    • Reliability

NEW TRENDS

  • Bring Your Own Device (BYOD)
    • Mobility
    • Internet of things
    • Internet of everything
  • Online Collaboration
    • IP Communication
    • Telepresence
    • Online Conferencing
    • Messaging
    • Mobile Applications
  • Video
    • 2012 - Internet video accounts for 40% of all consumer Internet traffic
    • 2016 - Internet video will become 62% of all consumer Internet traffic
  • Cloud Computing
    • Organizational flexibility
    • Agility and rapid deployment
    • Reduced cost of infrastructure
    • Refocus of IT resources
    • Creation of new business models
  • Big Data (Data Warehouse Reloaded)
    A data centre is a facility used to house computer systems and associated computer components including:
    • Redundant data communications connections
    • High-speed virtual servers (sometimes referred to as server farms or server clusters)
    • Redundant storage systems (typically uses SAN technology)
    • Redundant or backup power supplies
    • Environmental controls (e.g., air condition, fire suppression)
    • Security devices

NETWORK SECURITY

  • Security Threats
    • Viruses, worms, Trojan horses
    • Spyware and adware
    • Zero-day attacks, also called zero-hour attacks
    • Hacker attacks
    • Denial of service (DoS) attacks
    • Data inception and theft
    • Identity theft
  • Security Solutions
    • Antivirus and antispyware
    • Firewall filtering
    • Dedicated firewall systems
    • Access control lists (ACL)
    • Intrusion prevention systems (IPS)
    • Virtual Private Networks (VPNs)