Intro Network Technologies

Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

What is a Computer Network?

Components of a Computer Network


Technologies That Comprise a Network.
Computer Networking Job Roles
Computer Networking Job Specialties
Where Do I Go From Here?
A network is nothing more than two or more computing devices connected by a cable
or by a wireless radio connection so that they can exchange information

1. Prior to networking, individual users…SNEAKERNET!

2. Phones had their own network, now we have IP phones.

3. All of those host devices are cabled into what we call the network infrastructure

4. You’ll probably also have users and devices that utilize WiFi to connect to
infrastructure

5. Your company may also have a datacenter (explain the term)

6. Lastly, don’t forget the internet connection.


Common Terms/Vocabulary
-
Any device that is connected to the network is called a node
When you download a new app for your phone or tablet, it’s the network that makes
that possible.
-
Resources:
----Printers
----Networked home devices (like DVRs)
----
NICs, Switches, Routers, Firewalls and IPS devices
Today, most of what we do on our laptops, PCs, tablets and smartphones requires
pulling data from another device. Such as Retrieving a website, an online calendar,
downloading music files and videos.
-
You can't tell just by looking at something if it is a LR or a NR. A printer sitting next to
you could also be on the network.

In the past, networking consisted of accessing shared resources on the local network
(shared printers, network drives, shared folders, etc) and also accessing the Internet
(primarily for research or entertainment) Today, many tasks that used to utilize shared
resources (such as Email, File Storage and Calendaring) now make use of Internet
resources instead (Gmail, DropBox, Google Calendar).
LAN / Ethernet NICs and cables on this page. Others on next page.
Coaxial Cable

Connector type is called an SMA (SubMiniature version A) which come in Male and
Female versions. There are other types of connectors as well.
Wi-Fi NICs are frequently built-in and can’t be seen.
-
Guts of a Tablet (Nexus 7) are shown.
Cisco Nexus 9508 start around $50k
Cisco 2801 ISR

Externally a router may not look much different than a switch.


-
Talk about Hardware vs Software-based features. Routers are more SW-based and
so can do more things.
Many controllers also have integrated features such as Firewalls, ACLs and other
security features.

The Cisco 9800 series WLAN controllers are shown here.


Intent based networking: a new approach to networking, where special software
helps to plan, design and automatically implement on the fly changes to the network,
improving its availability and agility.

The idea here is that before a single end-user or application touches your network,
you have pre-planned how the network should respond to these things when they DO
get connected. Your “intent” (what resources users should have access to, QoS
policies for different applications, etc) is given to the Controller which then, in turn,
translates that intent into usable configurations that are pushed down to network
devices.
Whiteboard each of these.
Whiteboard each of these.
Whiteboard each of these.
Whiteboard each of these.
Some architectures will require that you must utilize the services of a 3rd party such as
an ISP or WAN Service Provider. The costs of implementing these services, planning
for their failure, and accounting for any latency they might introduce must all be
factored into your planning.
The 2-Tier network has also been called the “Collapsed Core” architecture.

Some of the characteristics of this type of architecture:


---Utilizes several different types of devices at the Access Layer in order to
accommodate a wide variety of host devices (access points with multiple radios,
switches with several kinds of interfaces).
---Implement access-layer security protocols to allow only authorized access to the
network.
---Quick and easy connectivity to end-user devices is a primary concern
This type of architecture is best suited for data center traffic that is more likely to move
east-to-west rather than north-to-south.

Typically connections between all switches will be Layer-3 in order to prevent bridging
loops and the delays induced by using Spanning-Tree (or other similar loop-
prevention technologies).

Some of the characteristics of this type of architecture:


---Utilizes the highest speed links possible between devices (10Gbps and up)
---Resiliency and redundancy are a major factor. These types of networks are
designed to almost NEVER go down.
---The switches used here are more expensive than your typical Enterprise/Campus
switches because they utilize higher-speed connections, and have many redundant
hw/sw features built-in
Some of the characteristics of this type of architecture:
---Available bandwidth is much less than Enterprise LAN bandwidth
---This network is out of your control. You can’t monitor it, view its health or fix it
when it goes down.
---Almost always the actual cables that are transporting your data are also used to
transport data from other customers as well.
---Privacy of your data as it traverses these types of network is a major concern.
On-premises characteristics:
-----Majority (if not all) of resources that end-users need physically reside within the
enterprise.
-----The network admin has control (and responsibility) for end-to-end reachability
between end-users and the resources they need.
-----An almost endless supply of options available for controlling the network and
security implementations.

Cloud-based characteristics:
----Responsibility for cloud-based resource uptime shifted to cloud-provider
----From the perspective of the customer, choices are very limited with regards to
cloud network segmentation and security.
----Confidentiality of data sent to/from the cloud a major concern
Time and cost: Less cables have to be run through walls, around cabinets, into
ceilings, etc.

Flexibility: Now, if you can run an Ethernet cable to a location you can also run power
to that same location.

Safety: POE delivery is intelligent, and designed to protect network equipment from
overload, underpowering, or incorrect installation.

Reliability: POE power comes from a central and universally compatible source,
rather than a collection of distributed wall adapters. Without PoE you have to be
concerned with obtaining a power cable that has the correct pinouts and plugs for
your particular country. And what if you want to move that device to a different
country? By using PoE you don’t have to worry about that. Also, PoE power-
supplying-equipment can be backed-up by an uninterruptible power supply, or
controlled to easily disable or reset devices.

Scalability: You don’t have to worry about being limited to only a handful of power
outlets in a room. With a PoE switch in that room you now have dozens of
connections that can provide power.
Shown here are some examples of PoE injectors. You would use these when you
have a PD that is ONLY capable of being powered by PoE but your network switch
doesn’t support PoE. In this case, you’re not really reaping any benefits from PoE
because you still need to plug a PoE injector into an AC outlet.
Here you can see that there are various PoE standards. Depending on whichever
standard(s) your PSE supports will dictate the maximum power that device can
deliver.

UPoE stands for “Universal Power Over Ethernet”.

Keep in mind that each type of switch that can provide power has something called a
“Power Budget” which is the TOTAL amount of power that can be delivered via PoE.
Many switches do not have the capability to deliver maximum PoE levels across each
and every switchport.
The graphic shown here demonstrates how UPoE delivers 60W over Category5e
twisted pair ethernet cable.

There is an IEEE equivalent to Cisco’s UPoE which is called IEEE 802.3bt (also
called 4PPoE). This is also capable of delivering up to 90W of power by using all four
pairs of UTP cabling to deliver power.
Further steps for power negotiation
----After PD is receiving the minimum power it needs, it can send a LLDP or CDP
message to PSE
----LLD-MED option is used to indicate the actual amount of power the PD requires
----CDP can also be used for this same purpose
In this output the “Power Drawn” represents the maximum required power for this
phone, which is 10250 milliwatts (10.25 W)
However this phone has also advertised that is capable of operating with reduced
screen brightness at 6.3 W
The output of this command shows the total power budget (total power available to
be delivered) by each switch in this switch stack (grouping of switches) and how
much has been consumed so far.

You might also like