UNIT 8 SEMINAR Unit 8 Chapter 10, plus Lab 12 Course Name – IT482-02 Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Unit 7 Chapter 9, plus Lab 11 Course Name – IT Network Design
UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT Introduction to Network Security Instructor – Jan McDanolds,
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Cisco Certified Network Associate CCNA Access the WAN Asst.Prof. It-arun.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Welcome to MT140 Introduction to Management. Unit 1 Outcomes Describe the skills needed by managers Understand the expectations of the course.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
10 ITK261 The traditional approach to design Reading: Chapter 10 Oct 9, 11.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Data Network Designing and Evaluation
Introduction & Overview Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Planning a Network Upgrade Working at a Small-to-Medium Business or ISP – Chapter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Chapter 1: Explore the Network
VPN’s & Remote Access Issues David Trepp VP of Technology
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Overview of Network Security. Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
IS3220 Information Technology Infrastructure Security
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
NTC 249 ASSIST Learning for leading/ntc249assistdotcom.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Unit 1 Seminar AB116-Accounting II. Instructor and Seminar Information Name---Joan (JoAnn) Simpson, MBA, MAED
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
IT 482 Network Design Seminar 8 Dr Jeffrey A Robinson.
NTC 362 Week 2 Individual INDP, Part 1 Integrative Network Design Project. Write a 2- to 4-page paper that includes the following based on your chosen.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
NTC 362 RANK Let's Do This /ntc362rank.com
Chapter 1: Explore the Network
NTC 320 Competitive Success-- snaptutorial.com
NTC 320Competitive Success/snaptutorial.com
NTC 320 Education for Service-- snaptutorial.com
NTC 320 RANK Knowledge is divine-- ntc320rank.com.
NTC 320 Teaching Effectively-- snaptutorial.com
NTC 320 Education for Service-- snaptutorial.com
IS4680 Security Auditing for Compliance
Planning a Network Upgrade
UNIT – V NETWORK DESIGN.
Presentation transcript:

UNIT 8 SEMINAR Unit 8 Chapter 10, plus Lab 12 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds – Office Hours: Wednesday 9:00 PM ET and Thursday 5:00 PM ET

UNIT 7 REVIEW Covered last week … Chapter 9 - Security and Privacy Architecture Security – integrated within all areas of the network and impacts all other functions on the network. Network Security - the protection of networks and their services from unauthorized access, modification, destruction and disclosure. Network Privacy – a subset of network security, focusing on protection of networks and their services from unauthorized access or disclosure. Three security considerations: protecting the integrity, confidentiality and availability of the network and system resources and data (CIA) OPNET ITGuru Lab 11 RSVP Resource Reservation Protocol Exercises 1 & 2

UNIT 7 REVIEW Quick check of Unit 7 Chapter 9 Security and Privacy Architecture #1 Physical security – name three areas. #2 A policy for user access should include _________ #3 A threat analysis lists what kind of assets?

UNIT 8 Network Design Chapter 10 – The last chapter where it all comes together! Design Concepts Design Process Vendor, Equipment and Service-Provider Evaluations Network Layout Design Traceability Design Metrics

UNIT 8 Design Concepts Builds upon the analysis and the architecture – adds the physical detail and vendor, product and service selections to the network. Example diagram: Top part – WAN architecture describing general topology Bottom part – design detail showing connections

UNIT 8 Design Concepts Design Products Key products of a network design: Network blueprints – locations, diagrams, etc. A component plan Vendor, vendor equipment, and service-provider selections Traceability Metrics for measuring design success

UNIT 8 Design Concepts Diagrams focus on logical functions of the network Similar to a construction design with foundation, walls, electrical wiring, plumbing, etc. Ex: Security design – integrated into network showing where policies would be applied.

UNIT 8 Design Concepts Architecture and Design Products – feed into the two parts of the design process – evaluations and layout

UNIT 8 Design Process Pg 394 Architecture products: Selected topology, selected technologies, equipment types/classes, supporting material, architectural relationships Analysis products: Requirements, flow specifications, problem statements, and service information See Cisco design white paper in Doc Sharing (Cisco newsoln.pdf)

UNIT 8 Vendor, Equipment and Service-Provider Evaluations Evaluation process

UNIT 8 Evaluation Criteria Assigning weights to design candidates… Once we have the candidates, we can produce RFPs

UNIT 8 Network Layout Logical Diagrams Logical diagram of a communication closet Shows the logical interconnection of devices from across a network.

UNIT 8 Component Plans Overlays line-up at strategic locations

UNIT 8 Design Traceability Example of security perimeter project

UNIT 8 Design Metrics Metrics for design coupled with metrics for requirements

LAB 12 Lab 12 in Experiments Manual Firewalls and VPN Network Security and Virtual Private Networks The objective of this lab is to study the role of firewalls and VPNs in providing security to shared public networks.

UNIT 8 Unit 8 Assignment Network Design 1.Summarize the differences between the two characteristics of broadcast and NBMA technologies: native broadcast support and connection support. 2. List and define four of the important functions and features of various networking technologies that should be considered prior to technology selection. 3. Explain why industry displaced FDDI with 100BaseT. 4.Compare and contrast frame relay vs. business DSL for WAN connectivity 5.Explain the role of network simulation in network design validation 6. Complete Laboratory 12. Create a brief summary explaining the outcome of these labs. Do exercises on page 157. Submit a lab report. 5 points for #1 & #3. 10 points for #2, #4, & #5. 10 points for the lab.