Transcript for:
Introduction to Networks Overview

welcome this would be the first video of a series of videos i will be posting based on the cisco netacad or network academy introduction to network course set you can register for these courses through your local academic institution or accredited organizations to obtain cisco netacad certifications it can be ccna or ccnp in this particular slide set we will be learning about introduction to networks module 1 which is part of the ccna in this module we will learn about how network affect our lives and explain how network can be useful or being used in our daily lives the network components explain how the host network and devices are used the network representations and topologies in other words how the networks are represented on paper and on electronic documents common types of networks and their characteristics the internet connections such as lands and vans and how they interconnect reliable networks which describe the four basic requirements of a reliable network the network trends such as how the bring your own device online collaboration video cloud computing such those new concepts come into play network security some of the basic security threats and solutions that we have in our systems and finally the it professional which explains some employment opportunities in the networking field you will be most likely taking these courses hoping to find a job in the network engineering or network analyst sector so that what we will discuss at the very end a little bit in this particular module network affect our lives the communication is almost as important to us as air water food or shelter especially with the global pandemic that we have experienced last two years with kobe 19 affecting in-person workforces a lot of people you probably work from home because of it as a result all of us even who are not in the it industry probably been exposed more to the i.t industry and network engineering last two years we are connected like never before our future generations will be more connected than our current generations and we are more connected than our previous generations especially during the kobe 19 what had happened is actually this type of interconnections through network systems have gone into override as more and more companies have been forced to send their workforce home and yet have the ability for those workforce to contribute from home is based on the network systems and communication infrastructures we use today the network system therefore allow us to create a world without boundaries it creates global communities and it it creates human networks you could work from anywhere in the world for some companies where you can connect it to their network through vpn and other services and you'll you'd just be as working if you were working from their head office for example imagine you have a company in calgary alberta canada but imagine you are in houston texas you can access your calgary head office through a vpn system and basically you have taken down global world boundaries you can be part of the same workforce as the calgary workforce even though you are located in houston texas so that one of the things the network systems can do today the network has some network systems have some components these components are defined based on our ability to understand the infrastructure of networks and how we have decided to put together the global communication network systems the network components includes things like host roles so that every computer on a network is called a host or a end device servers on the other hand are computers that are provided that provide information to the end device servers can be email servers web servers and file servers another typical identification of what define a server a server is that servers are typically accessed by multiple clients while the client computers that send requests to the servers to retrieve information these could be web pages from a web server such as an http or https request an email from an email server email servers run emails server software therefore the clients and the client software can access those emails while the web servers can run web sites with that particular software modules where the clients can request http or https request to that web server and take that and get that web page displayed on the end while the file servers stored information in specific or multiple different file formats that the end user can access in a one particular server you could have multiple of these service services running you could have one single server with the email web and file all three services running at the same time and we will go into depth in our on our future videos on how that works another network component is client and server how they interact with each other a computing model where the server software runs on a dedicated computers are called servers such that the server computer component contained those email servers web servers and file servers while the clients uh as i mentioned on my previous slide are the one that actually requesting those information so that is a really good definition so you shouldn't remember that a computer meeting model where server software runs on a dedicated computers and those dedicated services that providing those services such as email and web and file servers are called servers while the client are the end devices that requesting those services from these servers another network components called peer-to-peer networks peer-to-peer networks uh pretty much have no control uh by a central authority there's no central control in that peer-to-peer networks no privilege over anyone and it's varied uh some and usually unsafe and unsecured the reason why the most corporate networks will not use peer-to-peer system is basically the security and the control is not there the peer-to-peer must have the exact same operating system in order for them to communicate with each other in terms of scaling the peer-to-peer network cannot be scaled up typically are only used for sending data directly to a printer or directly to a particular end device that specifically need that peer-to-peer connection in modern day most organizations and companies would not use it however they do have some advantages as i mentioned it is easy to set up less complex it costs far less than running a server and it can be used for simple tasks disadvantages as mentioned here is there's no centralized administration it's not secure not scalable and slower performance the end devices the network components that are considered as end devices is where messages originates from or where it is received if you are sitting in front of a computer right now and it is connected to a network such as your home network or your office network you are actually using an end device which is defined by network engineers as an end device to access data the data originate with an end device flows through the network and arrive at another end device when you submit that data across the system for example if this user send an email from his end device it goes through this network and email servers and eventually will arrive at the intended recipient which also will be using an end device which going to be a computer or a laptop the next network components could be categorized as the inter mediatory network devices these intermediate network devices interconnects end devices these include switches wireless access points routers and firewalls they are used for management of data as its flow through the network is also the role of the intermediary devices they are used as a devices that do management of data as is flow through a network they also include actions of their they also inc does things like they also do things like regenerate and transmit data signals maintain information about what pathways exist in the network and notify other devices of errors and communication failures on our future videos we will look into how the network tables work and how they switch packets between these devices but for now just remember these intermediary devices are very important because they basically manage the data as it will flow through the network and it makes sure that the end user from one end will get exactly what they want and then use on the other end will receive exactly that being sent finally then another network component um that we should be paying attention to and often get forgotten is the network media the network media allow communication across networks through a medium which allow messages to travel between source and the destination in the old days most of the network media was made out of metal wires even today most of the homes have cat5 or cat 6 cables which are made out of metal wires modern high speed network communication systems includes also the fiber optics or glass or plastic fibers which is light pulsating across a medium across that glass medium to send digital data they are faster they are more reliable and they are more secured finally another medium that we use today is the wireless transmission they use the modulation of specific frequencies of electromagnetic waves to send data between different clients and end devices wireless data transmission is not as secure as let's say the fiber optics and more prone to errors however they are easy to set up and they are very flexible especially in environments such as if you have a large number of guests arriving at a place such as hockey arena for example it is a really good option to use at home your devices such as your cell phone probably or most likely be using right now the wireless networks to communicate with the outside world let's look at the network representations and topologies network diagrams often call topology diagrams they use symbols to represent devices within the network which make it easier for network engineers and network technicians to understand what's happening within a network the important terms that you should know is the network interface card or nic which is basically a connection a physical connection port that allow you to connect to the network and the physical port itself which contain within typically the network interface card and the interface itself often the terms port and interfaces are used interchangeably because as i mentioned just few seconds ago the physical port is and the interface and all of these items typically associated with the network interface card and if you look at on your right hand side you'll see some common representations of end devices such as desktops and laptops and wireless tablets and intermediary devices such as router switches and the network media such as the lan ethernet connections wireless media and one connections these symbols are typically used on the cisco packet tracer file software and we will look into those that package software on our future videos there is one video posted there's actually a couple of videos posted on my youtube channel that talk about cisco packer tracer you can look into that as well it shows you how you can download the cisco packet tracer and set it up and these are would be the symbols that we'll be using in the cisco packet tracer labs i will be doing in the future when you try to set up lab environments and those lab environments on cisco packet tracer is using the topology diagrams and symbols to represent these different devices the network topology diagrams can be put into two different categories one called the physical topology the other one called the logical topology the physical topology diagrams illustrate the physical location of the intermediary devices and cables installations while the logical topology diagrams illustrate devices ports and addressing schemes of the network i know this can be confusing for someone who is new to network engineering but this is a really important concept that you should understand this is being used almost everywhere to describe different um aspect of your network engineering environment so if you look at the diagrams right here both left and right these are the exact same network configurations but describe slightly differently on the left hand side you see the physical topology diagrams so you have the internet you have a router and you have a bunch of switches and you have end devices such as the email servers web servers printers and users this is a physical topology diagram because the areas are defined based on the types of devices but the highlight here is the physical you know physical location of that device for example we have a switch here router and another switch and bunch of servers but it is located at the server room so we have lumped them all together with this yellow box as a server for that particular those devices and then this this room room 2124 we have a bunch of switches nothing else so we lump them together like that but if you look at the logical diagram on the right hand side this network is separate from this network it is separated by this router so even though this router is located in the exact same server room as the these switches sorry this switch and these end servers logically this router has separated this section of the devices from that section and all of that section as well and this router also separated this section from rest of the sections right here on the left hand side and this separation start right here instead of start starting here because these switches are within the this side of the router so for example this g01 is part of the you know g01 contain the s3 switch as well as this in device but g0 sorry g11 contain this s4 switch and this end device and the primary responsibility of this particular offer router is actually to logically separate these different sect sections i will discuss and go into depth into how routers separate network topologies uh in other on our future videos but for now just remember a physical topology based on the actual physical location of the device and the logical topology is based on how the router or a particular network device separates the other devices regardless regardless of where the device is located and we'll go into the next topic which will be the common types of networks so what are the common types of networks you will come across in 2022 the modern day there are a couple of common types of networks that we typically identify they are home small home networks soho networks or small office small office home office networks medium to large networks seen typically on private companies small companies as well as government agencies with a particular specific location and worldwide networks such as a large interconnected global networks such as probably like shipping companies for example have them out all the way to credit card companies and the internet small home networks connect a few computers to each other and the internet such as your desktop computer your laptop your cell phone through your router and through your modem connect get connected to the internet small office or home and home office or show host networks enable computer within a home or remote office to connect to a corporate network it is very important you understand the distinction the small home networks connect a few computers to each other and directly to the internet small office home office or soho networks enable computer within a home or remote office to connect to a corporate network it could be multiple computers or multiple devices it just let those devices within a home or remote office to a connect to a corporate network this is a very important concept that you understand the difference the difference between the small home networks as well as the home office network this question often shows up on your cisco netacad exams as well as ccna and ccnp exams so make sure that you understand the concept the differences between the small homo networks and small office home office networks the next one is the medium to large networks which are many locations with hundreds of thousands of interconnected computers would connect together would result in a medium to large networks for example if you have a company in calgary and you have offices in edmonton and you have another office in vancouver interconnecting them together would create a medium to large network and then finally we have the worldwide networks which can connect hundreds of millions of computers worldwide as i mentioned before such as credit card companies and global shipping companies for example they have their networks worldwide but that also include the internet itself the common types of networks can be categorized into two different categories one called the lands the other one called the vans lan stand for local area network one stand for wide area network just just exactly what it sounds like it provide the network infrastructure to either smaller area or a wider area the network infrastructure vary greatly in terms of the size and the area covered the number of users connected the number and the types of services available such as web services internet email or just one of those services or multiple an area of responsibility such as within a country within a city within your own company within your home most two common types as i mentioned before is the lan and ones and the differentiation between the lan and the van can be put together in like a network diagram format on the right just like this on the right hand side so the van will be like that the cloud network that connecting everything and the land would be those each site such as the home office branch and the central that could be your land segments so not lands against lands so a lan is a network infrastructure that span a small geographical area you have the end user or you have the end devices you have a router or switch in the middle and then it's connected to another device so typically it's a switch when routers are involved where it's routing data between two different routers between two branches for example it becomes a van so remember a lan is a network infrastructure that span a small geographical area and the van is a network infrastructure that span a wide geographical area lan interconnect a limited number of devices in a limited area administered typically by a single organization or individual and provide very good high speed bandwidth to internal devices when interconnect lands over a wide geographical area typically administered by one or more service providers and typically provide slower speeds links between the the lands the last point may be slowly changing right now with the advancement of fiber optics with a very um cheap fiber optic networks coming out uh in 2020 and 2022's for example uh but it's typically one is always going to be slower than lan because remember you can have a local land network completely connected with fiber optics for cheaper than to try to connect large areas of networks with fiber only fiber optics between different sites using the van so they are typically slower speeds but they are getting better the common types of networks also include the internet the internet is a worldwide collection of interconnected lands and vans and lands are connected to each other using vans and the vans may use copper wires fiber optic cables and even wireless transmission to communicate with each other some people have asked me like how often the wireless transmissions are used when you go to the internet while we do have global network of fiber optics systems across multiple different cities countries the wireless transmission is also being used to communicate between different sites and communities even today even satellite communication systems that sometimes connect multiple different countries can be considered as a type of wireless network so if you are accessing the internet if you are watching this video you may have fiber optics high speed internet connection but at some point on your network it may be using all the types of communication mediums copper wires fiber optic cables and wireless transmission you may be using copper wires to access this video but your service provider or internet company may be using fiber optics to transmit your request and data back and forth between you and their data centers and maybe using a wireless communication systems including satellite communication systems to reach the google servers that contain this video on youtube systems so when you accessing the internet you may be using all of the mediums to access that particular document file or video or any other information the internet is not owned by an individual group however the following groups were involved in developing and maintaining the structures on the internet uh they include the ietf ican and iab for example ietf is the internet engineering task force and they were responsible for standardizing most of the network infrastructure i can is the internet corporation for assigned names and numbers uh they were responsible for things like the ip address signing as well as the global world wide web web addresses such as for example sanjuja.com is and the sanjay.ca all of these things are signed by i can or i can accredited organizations this will allow this kind of standardization will allow us to communicate globally without having any conflicts between different network systems so what you need to remember is the internet is not owned by any individual group but however we do have groups that maintain structures on the internet so that we all can communicate without having conflicts between different systems the common types of networks include the intranet which only have the access between the company communication devices extranet which includes the customers suppliers collaborators which may not be in the same area same geographical area as your company and the internet which is the world wide web the intranet is a private collection of lands and vans which is internal to the organization that is meant to be accessible only to the organization's members or others within the or within with the authorization you can think of it as for tank think of it as a network within a building or network within multiple buildings that is secured so that only people who have access to that building or people who have access to that network have have the ability to interact with it the extranet can be used by uh your organization to provide secure access to their network for individuals who work for a different organization uh an example of this would be imagine you are an oil company in calgary alberta and you have your head office in calgary and you have your workers across the the province and those workers may be using intranet but let's say you have subcontractors working for drilling and you have subcontractors working for geotechnical work and you have subcontractors working for your engineering systems and those subcontractors will get the extranet access so these are two key terms that you should know for your ccna and ccnp exams so make sure you understand the difference between intranet and extranet internet within the company extranet allow outsiders to access your company resources next we will look at the internet connections there are many ways to connect to the internet the most popular services most users at home may be using would be the broadcast sorry the broadband digital subscriber link or dsl wireless van mobile services as well as the the cable internet services organizations that feed faster connections to support ip phones video conferencing and data storage may use a much better connection such as fiber to the site but now in canada some isps do provide fibers directly to your home for home uses and then we have the business class interconnections they are usually provided by service providers and they include business dsl lease lines uh some known as like a t1 t2 lines for example uh metro uh inter uh ethern metro ethernet for example and these definitions between what is being used at home what is being used by organizations what is being used by business class connections uh kind of fluid right now because the technology is moving at a very fast pace and a couple of years ago even like five years ago you would not be able to get fiber to the home in canada but today most parts of most major cities in canada you can get fiber directly all the way to your home so in this particular slide just remember there are different types of ways to connect to the internet but these definitions may slightly change as the time goes by the home and small office internet connections uh can be cable dsl cellular satellite or dial-up phones cable connections which includes the fiber net networks include other types of specialized cables provide high bandwidth always on internet offered by your typically by your television service providers dsl include high bandwidth always on internet connection that runs over a telephone line the cellular networks allow you to have internet connections to your cell phones where there is coverage available which is very versatile especially if you are going uh somewhere outside and you know you're in out of nowhere it's very useful and then satellite networks provide internet connections to rural areas and typically by providing direct satellite connection between the satellite itself and your small office or your home finally the dial up telephone connections very inexpensive inexpensive low bandwidth but it used that dial up connection which is very not very reliable sometimes to access the internet even today there are some parts of the world they still use the dial up internet connections so you should know how dial up networks works and how it it is being used and utilized by different users but in countries like canada where we live most of the internet connections are either cable or dsl and also cellular rural parts of europe as well as rural parts of canada the satellite communication being used as well and with companies such as you know just i think starlink uh you know they have the option for end user to buy the satellite systems that you can just hook it up to your roof or something to get the internet in rural areas so you should know all of these types including the dial ups because they are still being used including the older communication mediums the business internet connections include as i mentioned the dedicated lease lines which are like typically known as the lease lines uh some of them are like t1 or t2 lines for example there are reserve circuits within the service providers network that connects distance officers with private voice and data networking they are more expensive to buy but is provide very high bandwidth and very high availability then we have the ethernet van which extend the lan access technology into the van allowing communication between two different sites belong to the same organization for example business dsl is also a an option which allow symmetric digital subscriber lines which is sdsl systems to communicate business data between different sites and finally we have also satellite which also provide a very good connections where it is either needed or required due to remote locations and what make a corporate business connections unique is that most of these corporate networks as opposed to home users require higher bandwidth dedicated connections and typically have managed services such as they will have a specific maybe dedicated line uh for wipe only or a dedicated line for web access or web systems or whether particular software systems the converging network before converge networks an organization would have been separately cable for telephone video and data so you'll have a separate video line you have a separate telephone line you have a separate data line each of these networks would use different technologies to carry the signal each of these technologies would use a different set of rules and standards as well it would be really hard for these technologies in the old days to interconnect between them for example you can't have a voice or a video system communicating with the data system but today we have what we call the converged data network that carry multiple services on a one link so you could have one single data link like a physical link that include data voice and video converge networks can deliver all of them on the same network infrastructure the network infrastructure use the same set of rules and standards but how we actually make this thing work is we use things like vlan we'll use acl access control list and we use bunch of other methodologies or methods to make sure that all of this data is delivered according to how it should be delivered like for example if you have a one link to deliver data voice or video we always give priority to video and voice over data because a delay packet in data may not cause a major problem but delay package in voice and video definitely will create a problem such as for example a one user may be speaking on this phone and if the data is delayed to the next user that who is listening that user may respond before the message being sent across so we will look into depth how we use things like uh you know qos you know data tagging vlans to separate this network even though we are using a one link in our future modules but for now just know that the modern network use converging systems in this particular course you will be using the cisco packet tracer because this course is designed by the cisco for ccna and ccnp i will leave a link below to introduction to packet tracer video that i created few weeks ago that you can watch to learn how the packet tracer work so i will just skip this slide and if you want to know about packet tracer how to download it and some basic configurations you can check out that video link posted below the packet tracer software allow you to create network representation using those symbols that we discussed previously and if you are registered for ccna or ccnp studies you will have some module you know labs that you can do to learn how it works i will not show that in this particular video but in the future videos i may go into those you know examples of some some of the packet trace activities so that you can learn some network systems and network engineering and as mentioned before when we do those labs you know it's not important that you understand everything at the beginning but as we move forward you should be able to understand everything so we'll move on to the next next section in this module which will be reliable networks the reliable network architecture is based on how multiple concepts coming together to build a better system so that's the best way i can explain it so it's a network so basically the network affiliate architecture refers to the technologies that support the infrastructure that moves data across the network and using four basic characteristics underlying that network architecture we can create a reliable network those are those characteristics or concepts are fault tolerance scalability quality of service or qos and security and on our next few slides we will look into each one of them them separately so that you will understand how all of these four concepts or characteristics come together to build a reliable network architecture fault tolerance the first concepts uh in the architecture for reliable networks so the fault tolerance network limits the impact of a failure by limiting the number of affected devices by providing multiple parts that are that can be used to communicate between each other each other reliable networks provide redundancy by implementing a packet switch network because in packet switching it can split traffic into packets that can be routed over multiple channels or multiple parts providing redundancy so basically each packet could theoretically take different parts to reach the destination so imagine you are an end user uh right here for example on the left hand side and you send an email that email may have multiple packets so in a circuit switch network it will go find one single path and it will go like this and then go to the end user like that or go like this and go to the end user like that but in a packet switch network what's going to happen is that data gets split into different packets and it will take this route and then reach the end user like that and then the next packet can go in a different route and next packet can go in a different route so imagine if this router was taken down or malfunction but the first packet went through that router that's okay because the next packet will reach this router it can't go any further so it will actually go find the next router and go through this connection and reach the end user this is not possible with the circuit switch network because it will be connected straight one line and then there's only one one path between the end users so packet switch network increase fault tolerance by route splitting the traffic into multiple packets and sending those packets into different uh sending those packet to the same destination using different parts the next characteristic of a reliable network is the scalability a scalable network can expand quickly and easily to support new uses and applications also end users and in devices without impacting the performance of the services to existing users this is a very important concept this shows up on exams all the time so the scalability is not just plugging in a new device and it just works the sk but the scalability also include that it is quick easy to add that end device or my intermediate devices without impacting the performance and services of existing users that's what define what makes the scalability scalable so the network designers follow accepted standards and protocols in order to make the network scalable so for example we have this network and the additional uses and whole networks can be added to this particular network by simply adding a switch onto the router and that switch providing multiple ports for the end users we'll go into depth in our future modules but just for now just remember the scalability is not just adding just plugging in a device any device or a intermediate device into a system but then impacting all the users on existing users scalable proper properly built scalable network will allow you to add those users and devices without impacting the performance or services currently being used by the existing user that is a very important concept and the next one is the quality of service quality of service is very important to services that cannot take less latency or cannot tolerate latency or you know drop packets these typically include the voice and live video transmissions that require higher expectations for those services being delivered so if you if you and i are speaking to each other on a vip telephone and couple of packets get lost uh not only you may not be able to comprehend what i have to say uh the transmission may be like completely useless like it's not only create confusion between like iphone users it could actually be like completely useless at all like you know uh so for example you know have you ever watched a live video with uh constant breaks and process i for for example if you are accessing this youtube video on your cell phone using a 2g or 3g network in a remote area in canada it may be buffering right so that because this is because it caused by you know high demand for bandwidth than the available availability of the bandwidth in that particular system and the qos isn't properly implemented on uh on some of the networks which also resulted in the same thing so for example you will be down watching a video then suddenly someone in your house decided to download a large file and if the qos is not implemented in your home router or modem what's gonna happen is all those packets uh gonna be delivered uh between your video and the person who's downloading the uh downloading that large file so your bandwidth will be split basically randomly but however the quality of service is one of the primary mechanism that used to ensure the reliable uh delivery of those container content for all users with the qos policy in place uh your home router or your business router can uh provide more manage flow of the data and the voice traffic so it can prioritize uh your video or you can prioritize your wipe telecommunication messages over somebody downloading a large file on the same network and this is on the right hand side it shows a small diagram it shows the quality of service managed by a router when a voip communication is started it gives the priority to that voice packet over somebody who is browsing the website because website packages packets can be delayed that should not have a major impact on your end user but if the voice packets are delayed like i said it will be useless for communicating voice across the system another category that within the reliable network that is very important is the network security there are two main types of network security that must be addressed uh they include the network infrastructure security physical security of the network devices like such as you know the infrastructure includes anything physical and it also prevent unauthorized access to those devices so that could be a server room with a lock on it or a server room with a special access control or security data centers for example used by governments and credit card companies for example they have military officers and security with even guns and you know very tough security to make sure that those data infrastructures are physically protected even google data centers across the world have a very high security with physical security personnel so that would be the network infrastructure security and then the the second type is called the information security which is the protection of information or data transmitted over the network the protection of those data can be used uh can be done using things like encryption uh and authentication uh for you know for making sure the data is accessed only by the persons who should be accessing and then data when they they've been sent over a network that have been encrypted and properly handled so that would be the information security side of things the three goals of network security is confidentiality which on which means as i mentioned it's only intended uh the only intended recipe and can read that data and also write that data as well integrity in other words it assures that the data has not been tampered or altered during the transmission and then availability such as that the data that needed to be accessed can be accessed a timely and reliable manner by all the authorized users so for example imagine you have a ems emergency services network right so you need your ems personalized to access all the medical data on the field so if you make it super secured and super you know highly um you know highly secured but the the data availability is very slow and can access in an emergency somebody having a heart attack for example and you need to know their medical history doesn't matter all the security is there the availability is not there right if that's the case we will send mail between the ems you know work site and the major hospital so instead we need to not only have that confidentiality integrity but we also need to have have that thing balanced with the availability of that data otherwise that would be useless right so how this can be managed is by administrators protecting the software and hardware using like encryption as well as like a logging authentication systems shown on the left hand side of this slide next we're going to talk about the network trends so recent trends uh in 2022 um especially with the global pandemic we saw the role of network have adjusted continually especially during the last few years to transform in order to be able to keep up with the new technologies and end users devices as well as the requirements so the global pandemic provided us a really great example of how fast technologies have adapted to changing environments several new network networking trends that affect organizations and consumers in modern day would be the bring your own device or byod where you can bring your own cell phone but connected to the corporate network to access corporate resources including corporate software as well as specific applications online collaboration where multiple users worldwide globally or in a you know it could be within a country also collaborating with each other using an online platform video communications such as conferences especially during the global pandemic during the kobe 19 we had few network engineering conferences as well as geotechnical and engineering conferences done on all online where everybody collaborated and then cloud computing which is uh things like you know your gmail for example is cloud it's basically cloud-based uh office 365 from microsoft which is cloud-based you can buy cloud services instead of having your own physical data centers for example if you have a small company it may be beneficial for you to go with office 365 in 2022 rather than actually trying to run a email server physically on your own location uh that would you know give you greater reliability greater availability and also give you data protection uh in case of things like in a fire or something like that so let's look at the bring your own device uh which allows users to use their own devices uh giving them opportunities and greater flexibility bring your own device allow users to have the freedom to use their personal tools to access information and communicate using their laptops netbooks tablets smartphones even e-readers byod means that any device with any ownership any can be used by anyone anywhere else anywhere on your network as long as they have the authorizations and authentications to access resources within your network the other one is the online collaborations which allow collaborate and work with others over network on joint projects this is actually how the internet first started when in the united states a bunch of universities get together and they connected their network to collaborate uh on research projects uh scientific research projects that's how basically how the internet started and collaboration tools uh in modern day includes like cisco webex which is shown on the left hand side right here and it can be ms teams microsoft teams uh office 365 another great examples where everybody can edit the same file at the same time that gives the users to instantly connect and interact so it's not only just you know just the video audio platform such as you know this cisco webex but also like you know collaborative documents for example such as office 365. collaboration is a very high priority for businesses in modern day but also in educational research sector cisco webex teams is a multi-functional collaborative tools developed by cisco the company that provide this educational module and it can send instant messages post messages post videos and links and cisco webex is used by large companies large government organizations and institutions and it has all the security and other systems built into it so it's easy to use and easy to deployed by most network administrators and system administrators video communication the video communication is now becoming more important as we are working mostly from remotely uh so basically there are video calls made to anyone regardless of where they are located and video conferencing is a powerful tool for communication with communicating with others especially when you are doing research with other countries or you have um a company that located in calgary but you have branches in united states for example video is becoming more critical requirement for effective collaboration sometimes because you may have charts diagrams and actual physical devices or data that you need to show to the person on the other end and cisco telepresence is one of the one of those tools that allow you to do that type of video communication if you like to look at a quick video on how cisco webex works like a basic like a advertisement kind of video you can check it out on the cisco official youtube channel and i will leave a link below and that's the link here but i will leave it in the description as well and most modern upcoming i would say network trend is the cloud computing it allow us to store our personal files or backup our data on servers over the internet applications can be used to access using cloud allow businesses to deliver to any device anywhere in the world in this particular module i will not go into depth of cloud computing uh i will discuss that in depth uh in a different module but what you need to remember in cloud computing is that cloud computing made possible by data centers instead of smaller companies having their own small data centers or servers like i mentioned before such as a email server located in calgary in your own office versus having the email uh in the cloud with office 365 for example so smaller companies that can afford their own data center they can lease those servers um and it allows their storage services and you know in large data centers uh google microsoft ibm they all have cloud services and for this particular module only thing you need to remember is it increase the reliability it allows the smaller companies to outsource pretty much you know to give that uh service to the cloud infrastructure so get that service from that cloud infrastructure so that they don't have to worry about running their own data centers and physical service and there are a couple of different types of cloud computing public clouds which available to general public through uh pay-per-use module or for free and then we have private clouds which are intended for specific organizations or entities such as governments uh or uh university of calgary you know engineering or research networks that could be considered as a private cloud then we have the hybrid clouds which are made out of two or more cloud types uh for example uh custom you know part custom and part public each part remain distinctive object but both are interconnected using the semi architecture actually the university of calgary example would be a type of hybrid cloud so you will have the unicity cal initiative calgary professors and researchers interacting on part of their custom cloud and then you have a public cloud where university of calgary have opened up to the general public and everybody else to access the hybrid cloud system to collaborate with the university uh professors and researchers custom clouds uh which are built to meet the needs of the specific industry such as healthcare media or oil and gas industry for example if you have a drilling site in northern alberta and you have your head office in calgary alberta and you need to access that data you can create a custom cloud network instead of just a direct link which allow high relia which allow you to have a higher reliability and those custom clouds can be both private and public a prior public custom cloud could be a small ruler town uh i saw just on the other day on the news in uh rural town in japan they decided to create a custom public cloud uh to allow uh public schools to access uh information within their networks so that would be a small you know custom cloud and in terms of technology trends in the home uh smart homes technology is growing trend that allow technology to be integrated to into everyday appliances which allow them to interconnect with other devices i have been automating my home uh with a bunch of automation tools using z-wave compliance systems just to turn on the lights turn off the lights from my cell phone uh i can check if my garage door is open or closed using my cell phone for example and modern day we have ones for example that might know the time to cook a meal for you by communicating with your calendar on what time you're scheduled to be home so you put your food in us one of those samsung or lg sophisticated oven and you leave for work and when you come home it gets start cooking there are also washing machines like that as well and there are other smart home technologies that currently being developed for all rooms within the house pretty much everywhere and next thing we're going to discuss is the uh power line networking powerline networking been here for a long time i would say it's longer than the you know smart home technologies uh that we see today uh it allows devices to connect to a lan uh where with data network cables or wireless communications that are not a viable option so it allows devices to it allow devices that are far away from your network hub or router uh to be connected using power lines already built into your house as opposed to you actually you know running a data cable across the you know living room floor for example it is using a power line standard adapter uh that a device that can connect to the lan uh wherever there is electrical outlet by sending data on a certain frequency so it is using your electrical cables but using a different frequency on that cable to send that data and power line networking is very useful when wireless access points cannot reach all the devices in the home or there are dead spot or you have a concrete thick wall that cannot pass through that wireless signal that is really uh useful too i don't typically use pylon networking in a business environment because it is it is reliable but it you know it's not as reliable as a wired land network but it is a really great option especially for home or where places it is extremely hard to put those wires cables in the next one is the wireless broadband in addition to dsl and cable wireless is another option to use to connect homes and small businesses to the internet the more commonly found like this type of thing is most commonly found in rural environments um and wireless internet service providers known as wisps can use those high powered communication broadband towers to send those signals across a wide area like large area i mean where their clients are at while abroad wireless broadband is another solution in other words for home and small businesses and it uses the same cellular technology used by the smartphones except it may have a higher bandwidth allocated to it so that an antenna can be installed outside of the house providing wireless or wired connectivity within the devices in that house next we will talk about the network security before we talk about network security we need to look at all the security threats we need to understand what are security threats we have on a system so the network security is a very important part of the networking regardless of the size and the network network security that is implemented must take into account the environment while securing the data but still allowing for quality of service that is expected of the network remember that ems on-site responders they need to have access to your medical data if you are having a heart attack as soon as possible but still need to be secure that your personal information is not being leaked so in network security it is not only important that we implement the security but we also need to make sure that the quality of service is not hindered by that the securing a network involves many protocols technologies devices tools and techniques in order to secure data and mitigate threats threat vectors might be external or internal so external threats could be like you know something coming from the internet and internal threat could be someone inside your network uh trying to get gather data or an infected device in inside your internal network is trying to gather data uh it can be considered as an internal threat so external threat as i mentioned uh those are coming from outside there could be viruses worms and turjan horses spyware adware zero day attacks threat actor attacks denial of service attacks data interception and theft and identity theft i will not go into depth of each one of these different external threats in this particular module but i will post another video on these external threats and internal threats later so the internal threats could be lost or stolen devices such as a usb drive accidental misuse by an employee let's say your employee accidentally install a software that is spying on your company and employees who may have intention of harming your organization so those can be considered as internal threats the security solutions for those external and internal threats um can be implemented in multiple layers using more than one security solution network security components for home or small office networks can be anti-viruses and anti-spyware software that can be installed on end devices intermediate devices such as routers can have firewall filtering built into it or you can have a separate firewall device that can be used to block unauthorized access to the network by monitoring ports as well as users large networks have additional security requirements such as a dedicated firewall systems as i mentioned those are such as like the apollo alto firewalls for example or cisco dedicated firewall appliance we can use access control list again we will not go into any depth into what our access control list in this particular module intuition prevention systems and virtual private networks or vpn all of these different areas i will discuss in depth in separate videos and because this this is just the introduction to networking module i will not go into depth of those the study of network security start with a clear understanding of the underlying switching and routing infrastructure and also understanding what are these threats and identifying them finally we will talk about the i.t professional which is you as we as you finish these ccna ccnp courses and obtain those certifications you become the it professionals ccna or cisco certified network associate certification demonstrate that you have a knowledge of fundamental foundational technologies it ensures you stay relevant with skills you needed for adaption of next generation technologies ccna focus on ip foundation and security topics wireless virtualization automation and network programmability the new devnet certifications at the associate specialist and professional levels to validate your software development skills allow you to demonstrate to your employers that you can you know you have the specific knowledge and the understanding of those particular concepts in terms of networking jobs uh you can check it out on the netacad website and you can see the employment opportunities uh you can search on your local websites and local companies and see what kind of opportunities you have in the networking field and you should be able to find opportunities by using talent bridge matching engine by cisco for example um and because this slide set is provided by cisco uh i i understand it's you know it's one of the things that they put it into this slide set but i also found it's pretty helpful like you can go and check it out and you know there are also cisco network academy students and alumni uh you know connections that you can make on their website so if you are registered in the ccna program for this particular course you should be able to do the module practice and the quiz and what you need to remember as a summary is that through the use of networks we are connected like never before all computers that are connected to a network and participate directly in network communication are classified as host diagrams of networks use symbols to represent the different devices and connections that make up a device and remember those two different types of diagrams logical diagram versus the other one diagram provides an easy way to understand how devices connect in a large network the two types of network infrastructures are local area network land and wide area network commands and how they are different from each other you should know that show ho internet connections include cable dsl cellular satellite and dial up telephones business internet connections include dedicated lease lines like t1 lines metro internet um business dsl and satellite and the other things we learned is the network architecture refers to the topologies that support the infrastructure and the program services and rule roles sorry rules or protocols that move data across the network there are four basic characteristics of a network architecture which is fault tolerance scalability qos and security and make sure you know each one of them in detail recent networking trends includes things like bringing your own device or byod online collaboration video communications and cloud computing and know what they are and some of the examples that i mentioned there are several common external and internal threats to network and identifying those threats are very important larger networks and corporate networks use antiviruses anti-spyware and firewall filtering but they also have other security requirements such as dedicated firewall systems access control list acls intuition prevention ips and virtual private networks you just need to know what they are but you don't need to know in depth how they work that is not part of this particular module and the cisco network associate or ccna certification demonstrate your knowledge of foundational technologies and when you obtain ccna and also ccnp you'll get these badges like i have here these are the badges that i have some of the badges that i have i i obtained and it shows uh that you learn the basics of network systems and apply the knowledge of the practical applications uh so the learn whatever you learn in this particular module you can apply to your daily life and you like i mentioned you can obtain the ccna ccnp certifications through doing this module with the registered organization that will administer these courses and exams for you and that's everything for today and i will be posting some [Music] other additional supporting videos in the future as well as the new modules in this series and this slide set was provided by cisco it is copyrighted for to cisco uh company however the information is free to use for educational purposes and that's what exactly uh you know what i did here and it is a very common slide set as i mentioned and i will look into and we will look into the new next couple of modules in this particular series but by listening to different people talk about different network administrators and professionals talking about this particular slide set will allow students like you to gain more uh in-depth knowledge of network systems by just you know understanding the same concepts and try to learn the same concepts in different ways and thank you so much please subscribe and thumbs up and stay tuned for our next module that will be published in few days