CISCO Cap 1 TRADUCIDO PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 61

Machine Translated by Google

Chapter 1: Exploring the Network


Instructor Materials

CCNA routing y switching


Introduction to networks 6.0
Machine Translated by Google

1.1 Globally connected

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 15
Machine Translated by Google

networks today
networks in everyday life
ÿ Welcome to a world where we are more powerful together than apart.

ÿ Welcome to the human network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 16
Machine Translated by Google

networks today
technology then and now
ÿ We live in a world that we could not have imagined 20 years ago.

ÿ What would we lack if we did not have Internet?

ÿ What will be possible in the future when using the network as a platform?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 17
Machine Translated by Google

networks today
Unlimited
ÿ Advances in network technologies are helping to create a world without limits.

ÿ The immediate nature of Internet communications fosters global communities.

ÿ Cisco refers to the impact of the Internet and networks on people as the "human network."

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 18
Machine Translated by Google

networks today
Networks support the way we learn
ÿ Do you remember sitting in a classroom like this?

ÿ They no longer have to be at school to take classes. They also don't have to be in a classroom to
have a teacher.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 19
Machine Translated by Google

networks today
Networks support the way we work
ÿ The globalization of the Internet
gives people the ability to create
information that can be
accessed by everyone.
ÿ Forms of communication:

• Text messages
• Social networks
• Collaboration tools
• Entries
• Wikis
• Podcasting

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 20
Machine Translated by Google

networks today
Networks support the way we work

ÿ Data networks have become


become an important
endorsement of the way we
work.
ÿ Online learning opportunities decrease costly
and lengthy transportation.

ÿ Employee training is becoming more profitable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 21
Machine Translated by Google

networks today
Networks support the way we play
ÿ We listen to music, watch
movies, read books and
download material for future
offline access.

ÿ Networks enable online gaming


in ways that were not possible 20
years ago.

ÿ Networks have also enhanced offline


activities, as they include global
communities for a wide variety of
hobbies and interests.

ÿ How do you play online?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 22
Machine Translated by Google

networks today
Lab - Investigating Network Collaboration Tools

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 23
Machine Translated by Google

Provisioning resources in a network


networks of many sizes

ÿ Small home networks connect


some computers with each other and with the Internet.

ÿ Small offices and offices in the


home office allow a computer within a home office or
remote office to connect to a corporate network.

ÿ Medium to large networks include many places with


hundreds or thousands of interconnected computers.

ÿ Global networks connect hundreds of


millions of computers around the world, such as the
Internet.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 24
Machine Translated by Google

Provisioning resources in a network


clients and servers
ÿ Each computer connected to a
network is called a host or terminal.
ÿ Servers are computers that
provide information to network terminals.
For example, email servers, web servers, or
file servers.

ÿ Clients are computers that send requests to


servers to retrieve information, such as a
web page from a web server or email from
an email server.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 25
Machine Translated by Google

Provisioning resources in a network


Between peers

ÿ Client software and server software typically run on computers


different.

ÿ However, in small businesses or at home, it is common for a customer to also


perform the role of server. These networks are called peer-to-peer networks.

ÿ Advantages of the peer-to-peer network: it is easy to set up, it is less complex, and it costs less.

ÿ Disadvantages: it does not have centralized administration, it is not as secure, it is not scalable and
it has slower performance.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 26
Machine Translated by Google

1.2 LAN, WAN and Internet

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 27
Machine Translated by Google

network components
Overview of network components

A network can be as simple as a


single cable connecting two computers or
as complex as a set of networks that spans
the globe.
The network infrastructure contains three
categories of network components:
• Devices
• Media
• Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 28
Machine Translated by Google

LAN, WAN and Internet


network components

ÿ Terminals

• A terminal is the point


where a message
originates or is received.
• Data originates with an end
device, flows through the
network, and arrives at an
end device.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 29
Machine Translated by Google

network components
Intermediary network devices
An intermediary device interconnects terminals on a network. Examples include: switches,
wireless access points, routers, and firewalls.

ÿ Managing data as it flows on a network is also the function of an intermediary device,


including the following:
• Regenerate and transmit the data signals. • Keep
information about the routes that exist through the network and internetwork. • Notify other
devices of errors and communication failures.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 30
Machine Translated by Google

network components
network media

ÿ Communication through a network is


carried out through a medium that
allows a message to travel from the
source to the destination.

ÿ Networks typically use three types of


media:
• Metallic wires within cables, such as
copper
• Glass, such as fiber optic cables

• Wireless transmission

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 31
Machine Translated by Google

network components
network representations

ÿ Network diagrams, often called topology


diagrams, use symbols to represent
the devices within the network.

ÿ In addition to the device representations


to the right, it is important to remember
and understand the following terms:

• Network Interface Card (NIC)


• Physical port

• Interface

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 32
Machine Translated by Google

network components
topology diagrams
ÿ Note the key differences between the two topology diagrams (physical location of devices versus
port and network addressing schemes).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 33
Machine Translated by Google

LAN and WAN networks

Types of networks

The two most common types of networks


are:
• Local area network (LAN) - encompasses a
a small geographic area that is owned and
operated by one person or an IT department.

• Wide Area Network (WAN): Covers a large


geographic area, typically served by a
telecommunications service provider.

• Other types of networks:


• Metropolitan Area Network (MAN)
• Wireless LAN (WLAN)
• Storage Area Network (SAN)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 34
Machine Translated by Google

LAN and WAN networks

Local area networks

ÿ Three characteristics of networks


AND:
• Cover a small area
geographic, such as a house,
a place of study, an office
building or a campus.
• Generally, administration is carried
out by a single organization or
person. • They provide high-
speed bandwidth to terminals and
intermediary devices within the
network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 35
Machine Translated by Google

LAN and WAN networks

wide area networks

ÿ Three characteristics of WAN networks:

• WANs interconnect LANs across large geographic areas; For example,


between cities, states or countries.
• Generally, administration is handled by several service providers. • Typically, WANs
provide slower speed links between LANs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 36
Machine Translated by Google

Internet, intranet networks and extranet networks

Internet
The Internet is a worldwide set of
interconnected LAN and WAN networks.

LANs are connected to each other


through WAN networks.

ÿ In turn, WAN networks connect


each other through copper wires, fiber optic cables,
and wireless transmissions.

The Internet does not belong to one person or


one group. However, the following groups
were created to help maintain the structure:

• IETF
• ICANN
• IAB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 37
Machine Translated by Google

Internet, intranet networks and extranet networks

Intranet networks and extranet networks

Unlike the Internet, a network


intranet is a private set of LAN and
WAN networks internal to an
organization that can only be
accessed by members of the
organization or other authorized
persons.

ÿ An organization can use an extranet to


provide secure access to its network by
people who work for another organization
and who need access to their data on its
network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 38
Machine Translated by Google

Internet connections
Internet access technologies
There are several ways to connect
Internet users and organizations:
• The most widely used services for home users
and small offices include wired broadband,
digital subscriber line (DSL) broadband,
wireless WANs, and mobile services.

• Organizations need faster connections to support


IP phones, video conferencing, and data center
storage.

• Enterprise-grade interconnects are typically


provided by Service Providers (SPs) and
may include enterprise DSL, leased lines, and
Metro Ethernet network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 39
Machine Translated by Google

Internet connections
Internet connections for small offices and home offices
ÿ Cable: high bandwidth, always
On, Internet connection offered by cable
television service providers.

ÿ DSL: High-bandwidth, always-on, Internet


connection running over a phone line.

ÿ Cellular network: Use a mobile phone network


to connect to the Internet. It is only available
where you can have a cellular network signal.

ÿ Satellite: greater benefit to rural areas without


Internet service providers.

ÿ Dial-up Internet: A low-cost broadband


option that works with a modem.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 40
Machine Translated by Google

Internet connections
Business Internet Connections ÿ Corporate business connections
may require higher bandwidth, dedicated
connections, or managed services.

Most common connection options for


companies:
• Dedicated leased lines: circuits
Reserved within the service provider's network
that connect remote offices with voice
communications networks or private data
networks.
• Ethernet WAN: Extends LAN access technology
to a WAN.
• DSL: Enterprise DSL is available at
various formats, including Symmetrical Digital
Subscriber Line (SDSL).
• Satellite – Can provide a connection when
no cable connection solutions are available.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 41
Machine Translated by Google

Internet connections
Packet Tracer:
Navigation Help and Tips
ÿ Overview of the Packet
Tracer program
ÿ Packet Tracer is a fun software
program that will help you
with your CCNA studies and
will allow you to experiment
with network behaviors, create
networks, and find the answers
to your “what if…” questions.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 42
Machine Translated by Google

Internet connections
Packet Tracer:
network representation

ÿ In this activity, you will explore


how Packet Tracer serves as
a modeling tool for network
representations.

ÿ The network model in this


activity includes many of the
technologies you will need
to master in your CCNA
studies.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 43
Machine Translated by Google

1.3 The network as a platform

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 44
Machine Translated by Google

converged networks
Separate traditional networks

ÿ An example of multiple networks


can be a school 30 years ago.
Some classrooms had cable
connections for data networks.
Those same classrooms had
wired connections for telephone
networks and separate wired
connections for video.

Each of these networks


it used different technologies
to carry the communication
signals and a different set of
rules and regulations.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 45
Machine Translated by Google

converged networks
the converged network

ÿ Converged data networks


They carry multiple services on a
single link, including data, voice, and
video.

ÿ Unlike dedicated networks, converged


networks can provide data, voice,
and video between different types of
devices over the same network
infrastructure.

ÿ The network infrastructure uses the


same set of rules and regulations.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 46
Machine Translated by Google

converged networks
Lab - Investigating Converged Network Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 47
Machine Translated by Google

A reliable network
network architecture

ÿ Network architecture refers to the


technologies that support the infrastructure
that moves data across the network.

There are four basic characteristics that the


underlying architectures must address to
meet user expectations:

• Fault tolerance

• Scalability

• Quality of service (QoS) • Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 48
Machine Translated by Google

reliable network

fault tolerance ÿ A fault-tolerant network


lessens the impact of a failure by
limiting the number of affected
devices.

ÿ For fault tolerance, multiple paths are


needed.

ÿ Reliable networks provide redundancy by


implementing a packet-switched network.
Packet switching divides traffic into packets that
are routed through a network. In theory, each
packet can take a different route to the destination.

ÿ This is not possible with circuit-switched


networks that establish dedicated circuits.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 49
Machine Translated by Google

reliable network
scalability

ÿ A scalable network can


easily and quickly expand to support
new users and new applications
without affecting the performance of
current users' services.

ÿ Network designers follow accepted


standards and protocols to make
networks scalable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 50
Machine Translated by Google

reliable network
Quality of service
ÿ Live voice and video transmissions
require higher expectations for the
services that are provided.

ÿ Have you ever watched a live video


with constant interruptions and pauses?
This happens when there is a higher
demand for bandwidth than is available
and QoS is not configured.

ÿ Quality of Service (QoS) is the


primary mechanism used to ensure
reliable delivery of content to all users.

ÿ By implementing a QoS policy, the


router can more easily manage the
flow of voice and data traffic.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 51
Machine Translated by Google

reliable network There are two main types of


Network security to be addressed:
Security
• Security of the network infrastructure
• Physical security of network devices
• Prevent unauthorized access to management
software on such devices
• Information security
• Protection of information or data
transmitted over the network

ÿ Three objectives of network security:


• Confidentiality: only the intended recipients
can read the data
• Integrity: guarantee that the data has not been
altered during transmission
• Availability: guarantee of access
reliable and timely access to data by
authorized users

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 52
Machine Translated by Google

1.4 The changing network environment

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 53
Machine Translated by Google

network trends
New tendencies
ÿ The network function must continually
adjust and transform in order to keep
up with new technologies and new
end-user devices as they are
constantly being released to the
market.

ÿ Many new network trends that will


affect organizations and consumers:

• Bring your own device (BYOD)


• Online collaboration
• Video communications
• Cloud computing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 54
Machine Translated by Google

network trends
bring your own device
ÿ Bring Your Own Device (BYOD) is a
major global trend that allows users to
use their own devices and provides
them with more opportunities and
greater flexibility.

ÿ BYOD allows end users the freedom


to use personal tools to communicate
and access information through the
following devices:

• Laptops
• Netbooks
• Tablets
• Smartphones
• e-book readers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 55
Machine Translated by Google

network trends
online collaboration

People want to collaborate and


work with other people through the
network in joint projects.
ÿ Collaboration tools, including Cisco
WebEx (shown in the figure), give
users a way to connect, interact,
and achieve their goals immediately.

ÿ Collaboration is a priority
very high for companies and
education.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 56
Machine Translated by Google

network trends
video communication
ÿ Cisco TelePresence powers a new work model in which everyone can be more
productive in any environment thanks to face-to-face collaboration.

ÿ Every day, around the world, we transform organizations through the transformation of the
experiences of our clients.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 57
Machine Translated by Google

network trends
Cloud Computing ÿ Cloud computing is a global trend that allows
us to store personal files or back up our data
on servers over the Internet.

ÿ Through the cloud, you can also access


word processing and photo editing applications,
among others.

ÿ In addition, cloud computing allows companies to


extend their capabilities on demand and
automatically deliver to any device anywhere in the
world.

ÿ Cloud computing is possible thanks to data


centers. Smaller companies that cannot afford
their own data centers lease server and storage
services from organizations with larger data
centers in the cloud.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 58
Machine Translated by Google

network trends
Cloud Computing (cont'd)
ÿ Four types of clouds:
• Public clouds
• Services and applications are made available
available to the general public through a pay-per-
use model or for free.

• Private clouds
• Applications and services are intended for a specific
organization or entity, such as the government.

• Hybrid clouds
• Are composed of two or more types of clouds; for
example, half custom and half public.
Each part is still a separate object, but both are
connected with the same architecture.

• Custom clouds

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 59
Machine Translated by Google

network trends
Tech trends at home
• Smart home technology is
a growing trend that allows technology
to be integrated into the devices that
are used daily, allowing them to
interconnect with other devices. • Ovens
may recognize when to cook a meal for
you by communicating with your calendar
to know when you are scheduled to
return home.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 60
Machine Translated by Google

network trends
Power line networks
• Powerline networks can allow devices
to connect to a LAN where data
network cables or wireless
communications are not a viable
option.

• With a standard powerline adapter,


devices can connect to the LAN
wherever there is an electrical outlet
by sending data on certain frequencies.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 61
Machine Translated by Google

network trends
wireless broadband • In addition to DSL and cable, wireless is
another option used to connect homes
and small businesses to the Internet.

• Most often found in rural settings, a


Wireless Internet Service Provider
(WISP) is an ISP that connects
subscribers to hotspots or designated
access points.

• Wireless broadband is another


solution for home and small business.

• It uses the same cellular network technology


that a Smartphone uses.
• An antenna is installed outside the home,
providing wired or wireless connectivity to
devices in the home.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 62
Machine Translated by Google

network security
security threats
• Network security is a part
fundamental of the network regardless
of its size.
• The security of the network that is
It implements it must be aware of the
environment and protect the data, but, at
the same time, it must allow the quality of
service that is expected from the network.
• Network protection includes
many protocols, technologies,
devices, tools, and techniques to
protect data and mitigate
threats.

• Threat vectors can be external or


internal.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 63
Machine Translated by Google

Network
Security Security Threats (cont.)
• External threats:
• Viruses, Worms and Trojan Horses
• Spyware y adware
• Zero-day attacks, also called "zero-hour
attacks"
• Hacker attacks
• Denial of service attacks
• Interception and theft of data
• Identity Theft

• Internal threats:
• Whether intentional or not, many studies show
that internal network users commit the most
security breaches.

• With BYOD strategies, corporate data is


more vulnerable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 64
Machine Translated by Google

network security
security solutions

• Security must be implemented in


multiple layers and more than one
security solution must be used. •
Network security components
for home office or small office network:

• Antivirus and antispyware software must


be installed on the terminals.
• Firewall filtering is used to block unauthorized
access to the network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 65
Machine Translated by Google

Network
Security Security Solutions (cont.)
• Larger networks have
additional security requirements:
• Dedicated firewall system for
provide more advanced firewall
functionality.
• Access Control Lists (ACLs) to filter
access and forward traffic.
• Intrusion prevention systems
(IPS) to identify rapidly expanding threats,
such as zero-day attacks.
• Virtual Private Networks (VPN) to
provide secure access for remote
workers.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 66
Machine Translated by Google

network architecture
Cisco Network Architecture
• For networks to function and
To effectively support connections of
people, devices, and information in a
converged, media-rich environment,
the network must be built on a standard
network architecture.

• Network architecture refers to the


devices, connections, and products
that are integrated to support the
necessary technologies and applications.

• The foundation of all network


architectures, including the Internet,
are routers and switches.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 67
Machine Translated by Google

network architecture
CCENT and CCNA certification

• Cisco Certified Network Associate (CCNA) •


Routing and switching certification • Two
exams must be passed:
• Primer examen: Cisco Certified Entry Network
Technician (CCENT)
• Second exam: focuses on IPv4 routing and
IPv6 and WAN technologies, as well as
LAN switching and infrastructure maintenance
and services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 68
Machine Translated by Google

network architecture
Lab - Investigating IT and Networking Job Opportunities

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 69
Machine Translated by Google

1.5 Chapter Summary

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 70
Machine Translated by Google

Conclusion
network warriors
ÿ The animated video below will help you visualize networking concepts.

ÿ http://www.warriorsofthe.net/

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 71
Machine Translated by Google

Conclusion

network scan ÿ Networks and the Internet have a strong


impact on our lives.

A network can consist of two


devices or it can be as big as the
Internet, consisting of millions of
devices.

The network infrastructure is the


platform that supports the network.

The network must be:


• Fault tolerant
• Scalable
• Demanding with the quality of service
• Safe

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 72
Machine Translated by Google

Chapter 1

New terms and commands


• Peer-to-peer file sharing • Logical topology diagram • • Network bandwidth
application • Small offices Local area network (LAN) • Wide • BYOD (Bring Your Own Device) •
and offices in area network (WAN) • Internet Collaboration
home or SOHO •
• Cloud computing • Private
Medium to large network • Intranet clouds • Hybrid clouds
• Server
• Extranet
• Client
• service provider • Public clouds •
• Peer-to-peer Internet (ISP) Custom clouds • Data
networks • End device • Converged networks • center
• Intermediary device • Network architecture • • Smart home technology • Powerline
Medium Fault tolerant network networks • Service provider of
• Network Interface Card (NIC) • • Packet-switched network •
Physical port Circuit-switched network • Wireless Internet (WISP) •
• Interface Scalable network Network architecture
• Physical topological diagram • Quality of service (QoS)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Information. 74
Machine Translated by Google

You might also like