Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 1: EXPLORING THE NETWORK - Coggle Diagram
CHAPTER 1: EXPLORING THE NETWORK
Components of a Network
Media
Service
Device
Network Representations
Intermediary Device
Router
Multilayer Switch
LAN Switch
Firewall Appliance
Wireless Router
Network Media
LAN Media
WAN Media
Wireless Media
End Device
Printer
IP Phone
Laptop
Wireless Tablet
Desktop Computer
TelePresence Endpoint
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
A network sending a home, building or campus is considered a Local Area Network (LAN)
Wide Area Network (WAN).
LANs separated by geographic distance are connected by a network known as a Wide Area Network (WAN)
Other types of networks include:
Wireless LAN (WLAN)
Storage Area Network (SAN)
Metropolitan Area Network (MAN)
The Internet
LANs and WANs may be connected info internetworks
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:
Scalability
Quality of Service (QoS)
Fault Tolerance
Security
Fault Tolerance in Circuit Switched Network
Once a call is established, all communication takes place on this path, or circuit. A circuit is dedicated to this call for the duration of the call
Many paths are possible but only one path is selected per call
The circuit stay active, even if no one is speaking
Providing (QoS)
Examples of priority decisions for an organization might
include:
Non time-sensitive communication - decrease priority for web
page retrieval or email
High importance to organization - increase priority for
production control or business transaction data.
Time-sensitive communication - increase priority for services like telephony or video distribution.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live entertainment
Providing Network Security
Cheat
Criminal
Competitor
Identity Thief
Fraudster
Firewall
Data Encryption
Access Policy
Security Threats
Hacker attacks
Denial of service attacks
Zero-day attacks, also called zero-hour attacks
Spyware and adware
Data interception and theft
Viruses, worms, and Trojan horses
Identity theft
Security Solutions
Dedicated firewall systems
Access control lists (ACL)
Firewall filtering
Intrusion prevention systems (IPS)
Antivirus and antispyware
Virtual Private Networks (VPNs)