At its most fundamental level, a network can be divided into four elements:
For today’s exam topics, we will focus on the devices used in today’s networks, the media used to interconnect those devices, and the different types of network topologies.
In today’s networks, switches are almost exclusively used to connect end devices to a single LAN. On occasion, you might see a hub connecting end devices. But hubs are really legacy devices. The following describes the difference between a hub and a switch:
When choosing a switch, the main factors to consider are the following:
Access layer switches facilitate the connection of end devices to the network. Features of access layer switches include the following:
Distribution layer switches receive the data from the access layer switches and forward it to the core layer switches. Features of distribution layer switches include the following:
Core layer switches make up the backbone and are responsible for handling the majority of data on a switched LAN. Features of core layer switches include the following:
Routers are the primary devices used to interconnect networks—LANs, WANs, and WLANs. When choosing a router, the main factors to consider are the following:
Figure 31-1 shows a Cisco 1941 router, which provides the following connections:
Also shown in Figure 31-1 are two 4GB compact flash slots to provide increased storage space.
Before any network communications can occur, a wired or wireless physical connection must be established. The type of physical connection depends on the network setup. In larger networks, switches and wireless access points (WAP) are often two separate dedicated devices. In a very small business (three or four employees) or home network, integrated service routers (ISR) are usually implemented. These ISRs offer a switching component with multiple ports and a WAP, which allows wireless devices to connect as well. Figure 31-2 shows the Linksys E2500, a typical small network ISR.
There are three basic forms of network media:
Messages are encoded and then placed on the media. Encoding is the process of converting data into patterns of electrical, light, or electromagnetic energy so that it can be carried on the media.
Table 31-1 summarizes the three most common networking media in use today.
Each media type has its advantages and disadvantages. When choosing the media, consider each of the following:
Table 31-2 summarizes media standards for LAN cabling.
End devices are those pieces of equipment that are either the original source or the final destination of a message. Intermediary devices connect end devices to the network to assist in getting a message from the source end device to the destination end device.
Connecting devices in a LAN is usually done with unshielded twisted-pair (UTP) cabling. Although many newer devices have an automatic crossover feature that allows you to connect either a straight-through or crossover cable, you should still know the following basic rules:
Use straight-through cables for the following connections:
Use crossover cable for the following connections:
A local area network (LAN) is a network of computers and other components located relatively close together in a limited area. LANs can vary widely in size from one computer connected to a router in a home office to hundreds of computers in a corporate office; however, in general, a LAN spans a limited geographical area. The fundamental components of a LAN include the following:
A wide area network (WAN) generally connects LANs that are geographically separated. A collection of LANs connected by one or more WANs is called an internetwork—thus, we have the Internet. The term intranet is often used to refer to a privately owned connection of LANs and WANs.
Depending on the type of service, connecting to the WAN is normally done in one of four ways:
With the growing number of teleworkers, enterprises have an increasing need for secure, reliable, and cost-effective ways to connect people working in small offices or home offices (SOHO) or other remote locations to resources on corporate sites. Remote connection technologies to support teleworkers include the following:
Components needed for teleworker connectivity include the following:
Before you can interpret networking diagrams or topologies, you first must understand the symbols or icons used to represent different networking devices and media. The icons shown in Figure 31-3 are the most common networking symbols for CCNA studies.
Network diagrams are more often referred to as topologies. A topology graphically displays the interconnection methods used between devices.
Physical topologies refer to the physical layout of devices and how they are cabled. There are seven basic physical topologies, as shown in Figure 31-4.
Logical topologies refer to the way that a signal travels from one point on the network to another and are largely determined by the access method—deterministic or nondeterministic. Ethernet is a nondeterministic access method. Logically, Ethernet operates as a bus topology. However, Ethernet networks are almost always physically designed as a star or extended star.
Other access methods use a deterministic access method. Token Ring and Fiber Distributed Data Interface (FDDI) both logically operate as ring, passing data from one station to the next. Although these networks can be designed as a physical ring, like Ethernet, they are often designed as a star or extended star. But logically, they operate like a ring.
Figure 31-5 illustrates the Cisco Borderless Network architecture, which uses a tiered approach to virtually collapse the network into a single borderless network. The topology uses several devices that are beyond the scope of a CCNA candidate. However, you can see that a large collection of routers and switches play a major role in the design. Also notice the presence of multilayer switches at the core of the network.
The Cisco Borderless Network is a next-generation network architecture that allows organizations to connect anyone, anywhere, anytime, and on any device—securely, reliably, and seamlessly.
Hierarchical network design involves dividing the network into discrete layers. Each layer provides specific functions that define its role within the overall network. By separating the various functions that exist on a network, the network design becomes modular, which facilitates scalability and performance. The hierarchical design model is broken up into three layers as follows:
Figure 31-6 shows an example of the three-tiered hierarchical campus network design. For smaller networks, the core is often collapsed into the distribution layer for a two-tiered designed. And for very small networks and home networks, all three tiers can be seen in one device, such as the ISR shown earlier in Figure 31-2.
Documentation for your network should include, at a minimum, the following major categories:
More often than not, a network’s documentation is less than complete. To complete the documentation, you might have to gather information directly from the devices. Commands that are useful to this process include the following:
User applications can be classified into three broad categories of network impact:
There are basically two types of user interactions with a network application:
The following list briefly describes the most common network applications:
Besides all the common applications we discuss in networking studies, programmers and entrepreneurs are continuously developing applications to take advantage of network resources and the Internet. Today, people create, store, and access information as well as communicate with others on the network using a variety of applications. In addition to the traditional email and web browser applications, people are increasingly using newer forms of communication, including instant messaging, blogs, podcasting, peer-to-peer file sharing, wikis, and collaborative tools that allow viewing and working on documents simultaneously. The online gaming industry has grown exponentially over the last decade. All of these applications and online experiences place great demands on the network infrastructure and resources. One way of handling the sheer volume of data is to rank packets based on the quality of service that the source application needs—especially considering the increased use of the network in general and the recent rise of voice and video applications that have a very low tolerance for delay and jitter.
The priority and guaranteed level of service to the flow of data through the network are increasingly important as new applications place greater demands on the processing power and bandwidth of the networks we use. When we place a call over an IP phone, we want at least as good a service as we receive on a traditional land line. Therefore, networks need to use quality of service (QoS) mechanisms to ensure that limited network resources are prioritized based on traffic content. Without QoS implementation, an email message or web page request crossing a switch or a router will have the same priority as voice or video traffic.
Each type of application can be analyzed in terms of its QoS requirements on the network, so if the network meets those requirements, the application will work well.
Applications have tended to increase the need for more bandwidth while, at the same time, demanding lower delay. Here are some of the types of data applications that have entered the marketplace and their impact on the network:
Currently, voice and video are in the midst of a migration to traditional IP data networks. Before the late 1990s, voice and video used separate networking facilities. Most companies today are either migrating or plan to migrate to IP phones, which pass voice data over the data network inside IP packets using application protocols generally referred to as Voice over IP (VoIP).
Figure 31-7 show a few details of how VoIP works from a home high-speed Internet connection, with a generic voice adapter (VA) converting the analog signal from a normal telephone to an IP packet.
The demand that VoIP places on the data network is not for capacity. A voice call typically consumes less the 30kbps of bandwidth. However, VoIP is sensitive to delay, jitter, and packet loss:
Video over IP has the same performance issues as voice. However, video requires a lot more bandwidth—anywhere from 300kbps to 10Mbps, depending on the quality demanded.
To support the QoS requirements of voice, video, and other quality- or time-sensitive applications, routers and switches can be configured with a wide variety of QoS tools. These configurations are beyond the scope of the CCNA exam topics.
For today’s exam topics, refer to the following resources for more study.