SlideShare a Scribd company logo
The Foundation presents



  Third Thursday:
The Evolving Internet
 and Your Business
           May 17, 2007
Thanks to Dunwoody College




      www.dunwoody.edu
Timeline
• 1992 - Email/FTP
• 1995 - Websites
• 1997 - Web browsing
• 1998 - Google
• 2002 - Intranet (SharePoint - 04-06)
• 2003 - Disaster Recovery Planning
• Broadband and High Bandwidth
• 2004 - VoIP
2007 Maturing of Techs
• Virtualization
• Offsite
• DR
• Remote Backup
• ASP Models
• Online ERP apps
• Sharepont
• Large Pipes
The OSI Model
Data        Application     (telnet, http)

Data        Presentation (e-mail, mime)
Data        Session (named sockets)
Segments    Transport (TCP, UDP)
Packets     Network (IP, IPSec, ARP)
Frames      Data Link (Ethernet, Fibre, 802.11g/n)
Bits        Physical (hubs, 10-BaseT)
Where it’s at - Layers 1-3
 Packets         Network (IP, IPSec, ARP)
 Frames          Data Link (Ethernet, Fibre, 802.11g/n)
 Bits            Physical (hubs, 10-BaseT)



        • Ethernet - Layers 1,2 - both
           interface and transport
        • Switches are at Layer 2
        • Routers are at Layer 3
Switches




Frames   Data Link (Ethernet, Fibre, 802.11g/n)
What is a switch, really?
• Larry’s definition: Creates one or many
  independent networks, enables concurrent
  communication at different speeds
• Focuses on the MAC address level
• Decides path for frames
• Allows full-duplexing - talking at the same time
Isn’t that just like a hub?
• A hub is a Layer 1 device
• Permits physical connection, but offers no traffic
  discretion
• Traffic can be seen and/or collide from all ports
  in any direction
• The ultimate in unmanaged networking
Types of switches
• Unmanaged - No configuration interface or
  options
• Managed - Wide variety of configuration
  options
• Smart - Limited version of managed switch
• Gigabit - Highest wire-based speed for
  commercial applications. Highest collision
  probability too!
What can I do with
          a (good)switch?
• Use Ethernet, Fibre Channel, wireless
• Seamlessly traverse all of these mediums
• Set port priority
• Filter traffic per device
• Create VLAN’s (Virtual Local Access Networks)
• Use spanning trees to detect your network
  construction
• Monitor links using SNMP
• Bonding/Trunking
Switches handle Frames

 80 00 20 7A 3F 3E              80 00 20 20 3A AE       80 00
 Destination MAC Address           Source MAC Address   EtherType


                           MAC Header
                                  (14 bytes)



                               IP, ARP, etc.
                                   Payload

                                  Data
                                (46-1500 bytes)



                              00 20 20 3A
                           CRC Checksum (4 Bytes)

                 Ethernet Type III Frame
                                (64-1518 bytes)
Component parts of a Frame
Setting port priority
• Used in tandem with other policies to ensure quality of
  service
• There is a business need for certain groups to have a
  data priority
• Certain physical ports assigned to purposes greater than
  others
• Best use: Bandwidth needed at all costs (VoIP, graphics
  team)
Making a VLAN
• Used in tandem with other policies to ensure quality of
  service
• Carves up the network into traffic groups
• Common uses: storage areas,VoIP
• Ports are tagged with a VLAN identifier across switches
A simple VLAN
Trunking
• Used in tandem with other policies to ensure quality of
  service
• At the simplest level, allows you to bundle VLANs and
  ports together - benefits of aggregation
• Focus on distribution of resources for optimal network
  function
A simple trunk
Why are good switches
             important?
• In combination with power and cabling, the basis of your
  communication
• 80% of network failures occur in Layers 1-3
• Detection not possible on low-end switches
• Assuring quality connections becomes possible
• Can replace many other devices in a single management
  center
• Port negotiation issues between vendors - code updates
  across the board - standardization helps network
  support as well.
Routers




Packets   Network (IP, IPSec, ARP)
Routers are intersections
What is a router, really?
• Larry’s definition: A junction between one or
  more networks
• Focuses on the IP address level
• Decides path for packets
• Edge or core: Home users are familiar with
  edge routers that connect to the Internet, core
  routers work within a network
What can I do with a router?

• NAT (Network address translation)
• Route IP traffic between different networks
• Move traffic between VLAN’s
• VPN (Virtual Private Network)
NAT explained
• Converts real world addresses to local addresses
• Acts as a natural firewall to prevent incoming requests
• Tracks destinations and ports - different NAT types
  allow/restrict more heavily
• Problem services that must be addressed: FTP, IPSec
  (VPN), VoIP
Route IP Between Networks
• Enables you to get from point A to point B. Even
  though it’s often more like point A to point Z.
• A well-honed configuration table keeps paths well
  defined.
• In smaller networks, an important traffic cop for
  intelligent handling of communication
1 Destination - 11 hops
                    Example of IP routing
 1 10.55.93.1 (10.55.93.1) 2.142 ms 2.445 ms 4.400 ms
 2 71.5.110.1 (71.5.110.1) 117.125 ms 122.690 ms 120.718 ms
 3 71.5.107.161 (71.5.107.161) 123.949 ms 134.323 ms 130.106 ms
 4 67.109.64.93.ptr.us.xo.net (67.109.64.93) 127.231 ms 139.356 ms
144.822 ms
 5 p6-3-0-0.mar2.chicago-il.us.xo.net (207.88.84.61) 159.507 ms 149.822 ms
 6 p4-2-0-0.rar2.chicago-il.us.xo.net (65.106.6.205) 168.493 ms 164.606 ms
 7 p1-0.ir1.chicago2-il.us.xo.net (65.106.6.138) 169.688 ms 182.233 ms
 8 206.111.2.14.ptr.us.xo.net (206.111.2.14) 244.645 ms 342.918 ms
 9 yahoo-4.ar2.dca3.gblx.net (64.208.110.122) 227.710 ms 214.968 ms
10 ge-1-0-0-p110.msr2.dcn.yahoo.com (216.115.108.45) 231.577 ms ge-1-0-0-
p100.msr1.dcn.yahoo.com (216.115.108.41) 111.548 ms 140.541 ms
11 ge3-1.bas1-m.dcn.yahoo.com (216.109.120.149) 151.243 ms ge10-2.bas2-
m.dcn.yahoo.com (216.109.120.249) 186.563 ms ge7-2.bas1-m.dcn.yahoo.com
(216.109.120.201) 197.609 ms
Intra-VLAN Routing
VPN
• Router acts a traffic cop as always
• Defines and limits access to certain areas on local
  network from outside
• Builds a bridge from outside/inside or from network
  to network
• If you’re on a pleasure trip, take a ferry. If you’re on
  mission, you need a submarine.
• Replaces/augements leased lines (i.e., dedicated T1)
Big World VPN
Why do I need a decent router?
• What’s better than having a traffic light? An intelligent
  cop at every corner
• 80% of network failures occur in Layers 1-3
• Today’s routers are like mini-computers, running
  programs, encrypting traffic, etc.
• Working with decent switches, networks can gain
  complexity and maintain their zip
• Business needs: secure private connections, FTP, mail
  servers, wireless
The Big Picture
• The basis of your business begins at power
• How you connect to that power (your wires)
• What interfaces your wires use to get to your desktop
  (routers and switches)
• Using this model start at layer one and work up
• Big companies and small alike build mansions on dirt
  roads
• Pick a single vendor and save yourself trouble
THE FOUNDATION
311 7th Avenue North Mpls, MN
        612-465-0700
    www.fndtn.com

More Related Content

What's hot

9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)
Jeff Green
 
Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)
BalaMurugan948
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
NetProtocol Xpert
 
Mpls
MplsMpls
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
Javier H
 
Chapter10
Chapter10Chapter10
Chapter10
Muhammad Ahad
 
MPLS
MPLSMPLS
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
Thesis Scientist Private Limited
 
Janet access solutions
Janet access solutionsJanet access solutions
Janet access solutions
Jisc
 
Chapter05
Chapter05Chapter05
Chapter05
Muhammad Ahad
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network Readiness
rAVe [PUBS]
 
IPQ QoS
IPQ QoSIPQ QoS
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
NetProtocol Xpert
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
APNIC
 
Whitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best PracticesWhitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best Practices
Eric Wong
 
Software Defined Networking: Primer
Software Defined Networking: Primer Software Defined Networking: Primer
Software Defined Networking: Primer
Bangladesh Network Operators Group
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
Eric Vanderburg
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
Ripan Kumar Ray
 
Chapter13
Chapter13Chapter13
Chapter13
Muhammad Ahad
 

What's hot (20)

9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)
 
Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)
 
Mpls
MplsMpls
Mpls
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Mpls
MplsMpls
Mpls
 
Presentacion qos-
Presentacion qos-Presentacion qos-
Presentacion qos-
 
Chapter10
Chapter10Chapter10
Chapter10
 
MPLS
MPLSMPLS
MPLS
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Janet access solutions
Janet access solutionsJanet access solutions
Janet access solutions
 
Chapter05
Chapter05Chapter05
Chapter05
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network Readiness
 
IPQ QoS
IPQ QoSIPQ QoS
IPQ QoS
 
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
 
Whitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best PracticesWhitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best Practices
 
Software Defined Networking: Primer
Software Defined Networking: Primer Software Defined Networking: Primer
Software Defined Networking: Primer
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Chapter13
Chapter13Chapter13
Chapter13
 

Similar to The Evolving Internet Fndtn

Gaurab Ixp Tutorial
Gaurab Ixp TutorialGaurab Ixp Tutorial
Gaurab Ixp Tutorial
Tariq Mustafa
 
LAN Demo
LAN DemoLAN Demo
LAN Demo
alcsoft
 
There and back again
There and back againThere and back again
There and back again
Jon Spriggs
 
Simplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 TeachersSimplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 Teacherswebhostingguy
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
Ryan Furlough, BSCPE CPAS
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Riverbed Within Local Gov
Riverbed Within Local GovRiverbed Within Local Gov
Riverbed Within Local Gov
michaelking
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerHolger Winkelmann
 
Basic networking
Basic networkingBasic networking
Ccna report
Ccna reportCcna report
Ccna report
Surender Singh
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardwareisma ishak
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
YashShinde96
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
FarhanAli951243
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
Dr.Florence Dayana
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
ULLPTT
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
ULLPTT
 

Similar to The Evolving Internet Fndtn (20)

Gaurab Ixp Tutorial
Gaurab Ixp TutorialGaurab Ixp Tutorial
Gaurab Ixp Tutorial
 
LAN Demo
LAN DemoLAN Demo
LAN Demo
 
There and back again
There and back againThere and back again
There and back again
 
Simplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 TeachersSimplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 Teachers
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Riverbed Within Local Gov
Riverbed Within Local GovRiverbed Within Local Gov
Riverbed Within Local Gov
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow Controller
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Ccna report
Ccna reportCcna report
Ccna report
 
Document
DocumentDocument
Document
 
Net Basics
Net BasicsNet Basics
Net Basics
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

The Evolving Internet Fndtn

  • 1. The Foundation presents Third Thursday: The Evolving Internet and Your Business May 17, 2007
  • 2. Thanks to Dunwoody College www.dunwoody.edu
  • 3. Timeline • 1992 - Email/FTP • 1995 - Websites • 1997 - Web browsing • 1998 - Google • 2002 - Intranet (SharePoint - 04-06) • 2003 - Disaster Recovery Planning • Broadband and High Bandwidth • 2004 - VoIP
  • 4. 2007 Maturing of Techs • Virtualization • Offsite • DR • Remote Backup • ASP Models • Online ERP apps • Sharepont • Large Pipes
  • 5. The OSI Model Data Application (telnet, http) Data Presentation (e-mail, mime) Data Session (named sockets) Segments Transport (TCP, UDP) Packets Network (IP, IPSec, ARP) Frames Data Link (Ethernet, Fibre, 802.11g/n) Bits Physical (hubs, 10-BaseT)
  • 6. Where it’s at - Layers 1-3 Packets Network (IP, IPSec, ARP) Frames Data Link (Ethernet, Fibre, 802.11g/n) Bits Physical (hubs, 10-BaseT) • Ethernet - Layers 1,2 - both interface and transport • Switches are at Layer 2 • Routers are at Layer 3
  • 7. Switches Frames Data Link (Ethernet, Fibre, 802.11g/n)
  • 8. What is a switch, really? • Larry’s definition: Creates one or many independent networks, enables concurrent communication at different speeds • Focuses on the MAC address level • Decides path for frames • Allows full-duplexing - talking at the same time
  • 9. Isn’t that just like a hub? • A hub is a Layer 1 device • Permits physical connection, but offers no traffic discretion • Traffic can be seen and/or collide from all ports in any direction • The ultimate in unmanaged networking
  • 10. Types of switches • Unmanaged - No configuration interface or options • Managed - Wide variety of configuration options • Smart - Limited version of managed switch • Gigabit - Highest wire-based speed for commercial applications. Highest collision probability too!
  • 11. What can I do with a (good)switch? • Use Ethernet, Fibre Channel, wireless • Seamlessly traverse all of these mediums • Set port priority • Filter traffic per device • Create VLAN’s (Virtual Local Access Networks) • Use spanning trees to detect your network construction • Monitor links using SNMP • Bonding/Trunking
  • 12. Switches handle Frames 80 00 20 7A 3F 3E 80 00 20 20 3A AE 80 00 Destination MAC Address Source MAC Address EtherType MAC Header (14 bytes) IP, ARP, etc. Payload Data (46-1500 bytes) 00 20 20 3A CRC Checksum (4 Bytes) Ethernet Type III Frame (64-1518 bytes)
  • 14. Setting port priority • Used in tandem with other policies to ensure quality of service • There is a business need for certain groups to have a data priority • Certain physical ports assigned to purposes greater than others • Best use: Bandwidth needed at all costs (VoIP, graphics team)
  • 15. Making a VLAN • Used in tandem with other policies to ensure quality of service • Carves up the network into traffic groups • Common uses: storage areas,VoIP • Ports are tagged with a VLAN identifier across switches
  • 17. Trunking • Used in tandem with other policies to ensure quality of service • At the simplest level, allows you to bundle VLANs and ports together - benefits of aggregation • Focus on distribution of resources for optimal network function
  • 19. Why are good switches important? • In combination with power and cabling, the basis of your communication • 80% of network failures occur in Layers 1-3 • Detection not possible on low-end switches • Assuring quality connections becomes possible • Can replace many other devices in a single management center • Port negotiation issues between vendors - code updates across the board - standardization helps network support as well.
  • 20. Routers Packets Network (IP, IPSec, ARP)
  • 22. What is a router, really? • Larry’s definition: A junction between one or more networks • Focuses on the IP address level • Decides path for packets • Edge or core: Home users are familiar with edge routers that connect to the Internet, core routers work within a network
  • 23. What can I do with a router? • NAT (Network address translation) • Route IP traffic between different networks • Move traffic between VLAN’s • VPN (Virtual Private Network)
  • 24. NAT explained • Converts real world addresses to local addresses • Acts as a natural firewall to prevent incoming requests • Tracks destinations and ports - different NAT types allow/restrict more heavily • Problem services that must be addressed: FTP, IPSec (VPN), VoIP
  • 25. Route IP Between Networks • Enables you to get from point A to point B. Even though it’s often more like point A to point Z. • A well-honed configuration table keeps paths well defined. • In smaller networks, an important traffic cop for intelligent handling of communication
  • 26. 1 Destination - 11 hops Example of IP routing 1 10.55.93.1 (10.55.93.1) 2.142 ms 2.445 ms 4.400 ms 2 71.5.110.1 (71.5.110.1) 117.125 ms 122.690 ms 120.718 ms 3 71.5.107.161 (71.5.107.161) 123.949 ms 134.323 ms 130.106 ms 4 67.109.64.93.ptr.us.xo.net (67.109.64.93) 127.231 ms 139.356 ms 144.822 ms 5 p6-3-0-0.mar2.chicago-il.us.xo.net (207.88.84.61) 159.507 ms 149.822 ms 6 p4-2-0-0.rar2.chicago-il.us.xo.net (65.106.6.205) 168.493 ms 164.606 ms 7 p1-0.ir1.chicago2-il.us.xo.net (65.106.6.138) 169.688 ms 182.233 ms 8 206.111.2.14.ptr.us.xo.net (206.111.2.14) 244.645 ms 342.918 ms 9 yahoo-4.ar2.dca3.gblx.net (64.208.110.122) 227.710 ms 214.968 ms 10 ge-1-0-0-p110.msr2.dcn.yahoo.com (216.115.108.45) 231.577 ms ge-1-0-0- p100.msr1.dcn.yahoo.com (216.115.108.41) 111.548 ms 140.541 ms 11 ge3-1.bas1-m.dcn.yahoo.com (216.109.120.149) 151.243 ms ge10-2.bas2- m.dcn.yahoo.com (216.109.120.249) 186.563 ms ge7-2.bas1-m.dcn.yahoo.com (216.109.120.201) 197.609 ms
  • 28. VPN • Router acts a traffic cop as always • Defines and limits access to certain areas on local network from outside • Builds a bridge from outside/inside or from network to network • If you’re on a pleasure trip, take a ferry. If you’re on mission, you need a submarine. • Replaces/augements leased lines (i.e., dedicated T1)
  • 30. Why do I need a decent router? • What’s better than having a traffic light? An intelligent cop at every corner • 80% of network failures occur in Layers 1-3 • Today’s routers are like mini-computers, running programs, encrypting traffic, etc. • Working with decent switches, networks can gain complexity and maintain their zip • Business needs: secure private connections, FTP, mail servers, wireless
  • 31. The Big Picture • The basis of your business begins at power • How you connect to that power (your wires) • What interfaces your wires use to get to your desktop (routers and switches) • Using this model start at layer one and work up • Big companies and small alike build mansions on dirt roads • Pick a single vendor and save yourself trouble
  • 32. THE FOUNDATION 311 7th Avenue North Mpls, MN 612-465-0700 www.fndtn.com