Exploring the Network
NETWORK COMPONENTS
- Devices
- End Devices
- Intermediary Devices
- Media
- Copper
- Fibre Optic
- Wireless
- Services
- Software
- Procedures
- Processes
Network Infrastructure Devices
- Network Access Devices (switches, and wireless access points)
- Internetworking Devices (routers)
- Security Devices (firewalls)
Network Infrastructure Types
- Local Area Network (LAN)
- A network serving a home, building, or campus is considered a LAN.
- Wide Area Network (WAN)
- LANs separated by geographic distance are connected by a network known as a Wide Area Network.
- Other Types
- Metropolitan Area Network (MAN)
- Wireless Local Area Network (WLAN)
- Storage Area Network (SAN)
Supporting Network Architecture
- Fault Tolerance (circuit switching, packet switching)
- Scalability (Tier 1 ISP = global service, Tier 2 ISP = regional service Tier 3 ISP = local service)
- Quality of Service (Time-sensitive communication, Priority to organization, Undesirable communication)
- Security (access policy, data encryption, firewall)
- Supporting Network Architecture
- Effectiveness : Fit-for-purpose (How well it works)
- Efficiency : Fit-for-use
- Reliability
NEW TRENDS
- Bring Your Own Device (BYOD)
- Mobility
- Internet of things
- Internet of everything
- Online Collaboration
- IP Communication
- Telepresence
- Online Conferencing
- Messaging
- Mobile Applications
- Video
- 2012 - Internet video accounts for 40% of all consumer Internet traffic
- 2016 - Internet video will become 62% of all consumer Internet traffic
- Cloud Computing
- Organizational flexibility
- Agility and rapid deployment
- Reduced cost of infrastructure
- Refocus of IT resources
- Creation of new business models
- Big Data (Data Warehouse Reloaded)
A data centre is a facility used to house computer systems and associated computer components including:- Redundant data communications connections
- High-speed virtual servers (sometimes referred to as server farms or server clusters)
- Redundant storage systems (typically uses SAN technology)
- Redundant or backup power supplies
- Environmental controls (e.g., air condition, fire suppression)
- Security devices
NETWORK SECURITY
- Security Threats
- Viruses, worms, Trojan horses
- Spyware and adware
- Zero-day attacks, also called zero-hour attacks
- Hacker attacks
- Denial of service (DoS) attacks
- Data inception and theft
- Identity theft
- Security Solutions
- Antivirus and antispyware
- Firewall filtering
- Dedicated firewall systems
- Access control lists (ACL)
- Intrusion prevention systems (IPS)
- Virtual Private Networks (VPNs)
