SlideShare une entreprise Scribd logo
1  sur  27
Connecting to the
     Internet Through an ISP



              Networking for Home and Small Businesses – Chapter
              4




Version 4.0                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   1
Objectives
   Explain “what is the Internet?” and how we connect to
    the Internet using an Internet Service Provider (ISP).
   Explain how information is sent across the Internet
    through an ISP.
   Describe and identify the components of an ISP
    Network Operations Center.
   Identify the different types of cables and connectors
    for connecting the devices in a Network Operations
    Center.
   Construct and terminate twisted pair cables and
    determine type of cable needed

                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   2
The Internet and How We Connect to It Using
an ISP
 Explain what the Internet is




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   3
The Internet and How We Connect to It Using
an ISP
 Define an Internet Service Provider and its purpose




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   4
The Internet and How We Connect to It Using
an ISP
 Describe how you connect to the Internet through the
  ISP and the ISP’s relationship to the Internet




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   5
The Internet and How We Connect to It Using
an ISP
 Identify and describe the different connection options
  that ISPs can provide




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   6
The Internet and How We Connect to It Using
an ISP
 Identify and describe the levels of service offered by an
  ISP




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   7
How Information is Sent When Using an ISP
 Define and explain that the most important
  protocol of the Internet is the Internet Protocol
  (IP).




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   8
How Information is Sent When Using an ISP
 The IP Packet




                     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   9
How Information is Sent When Using an ISP
 Explain how the ISP NOC handles packets
  from your home network




                     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   10
How Information is Sent When Using an ISP
 Describe how the ISP forwards packets across
  the Internet




                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   11
The Internet Cloud
 Identify and describe the concept of the Internet
  cloud.




                         © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   12
Components of an ISP Network Operations
Center
 Identify and describe the network devices used
  in a NOC within the Internet cloud




                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   13
Components of an ISP Network Operations
Center
 Physical requirements of a home network
  versus an ISP




                     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   14
Types of Cables and Connectors Used in
Networking
 Identify and describe common types of cables




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   15
Types of Cables and Connectors Used in
Networking
 Describe twisted pair cables, common terminations,
  and when they are used




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   16
Types of Cables and Connectors Used in
Networking
 Describe Coax cable, common terminations, and when
  they are used




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   17
Types of Cables and Connectors Used in
Networking
 Describe optical fiber cables, common terminations,
  and when they are used




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   18
Construct and Terminate Twisted Pair Cables
 Define cable standards and state their purpose




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   19
Construct and Terminate Twisted Pair Cables
 Identify and describe the cross-over and straight through cable pinouts
  and color codes




                                      © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   20
Construct and Terminate Twisted Pair Cables
 Describe how to terminate UTP cables




                          © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   21
Construct and Terminate Twisted Pair Cables
 Describe how to punch down wires to patch panel and
  wall jacks.




                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   22
Construct and Terminate Twisted Pair Cables
 Describe how to test cable termination and functionality
  (Cable testing).




                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   23
Construct and Terminate Twisted Pair Cables
 Define Attenuation
 Define Crosstalk




                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   24
Construct and Terminate Twisted Pair Cables
 Describe cabling best practices




                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   25
Summary
 The Internet is a worldwide collection of computer networks,
  accessed through ISPs.
 Internet Protocol (IP) controls the structure and addressing of data
  packets for transport through the Internet cloud.
 ISP Network Operations Centers (NOCs) utilize high-end, high-
  speed devices with redundancy.
 Home networks feature multi-function devices which perform
  switching and routing.
 Networks use physical cabling media which must conform to
  standards in construction and termination.
 Cabling best practices are designed to reduce attenuation and
  crosstalk.



                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   26
© 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   27

Contenu connexe

Tendances

CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7Irsandi Hasan
 
CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8Irsandi Hasan
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1Ali Kamil
 
CCNA Discovery 1 - Chapter 2
CCNA Discovery 1 - Chapter 2CCNA Discovery 1 - Chapter 2
CCNA Discovery 1 - Chapter 2Irsandi Hasan
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8Irsandi Hasan
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2Irsandi Hasan
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1Irsandi Hasan
 
CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9Irsandi Hasan
 
CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9Irsandi Hasan
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6Irsandi Hasan
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6Irsandi Hasan
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 
Discovery smb isp_chapter1
Discovery smb isp_chapter1Discovery smb isp_chapter1
Discovery smb isp_chapter1idzwanpsis
 

Tendances (20)

CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7CCNA Discovery 2 - Chapter 7
CCNA Discovery 2 - Chapter 7
 
CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8CCNA Discovery 1 - Chapter 8
CCNA Discovery 1 - Chapter 8
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
CCNA Discovery 1 - Chapter 2
CCNA Discovery 1 - Chapter 2CCNA Discovery 1 - Chapter 2
CCNA Discovery 1 - Chapter 2
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 2
 
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 1
 
CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9
 
CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 
Discovery smb isp_chapter1
Discovery smb isp_chapter1Discovery smb isp_chapter1
Discovery smb isp_chapter1
 

En vedette

CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsAhmed Habib
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 

En vedette (20)

OSPF v3
OSPF v3OSPF v3
OSPF v3
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
ITE - Chapter 2
ITE - Chapter 2ITE - Chapter 2
ITE - Chapter 2
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
CCNA Security - Chapter 8
CCNA Security - Chapter 8CCNA Security - Chapter 8
CCNA Security - Chapter 8
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 

Similaire à CCNA Discovery 1 - Chapter 4

Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10r82093403
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptssuser7c54e61
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1jdb1979
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewlulunannisa
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2r82093403
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptNukriTskvitaia
 
CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8Irsandi Hasan
 
Working at a Small-to-Medium Business.ppt
Working at a Small-to-Medium Business.pptWorking at a Small-to-Medium Business.ppt
Working at a Small-to-Medium Business.pptUjjwalKumarTiwari4
 
Exploration network
Exploration networkExploration network
Exploration networkchtiiara
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1r82093403
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6r82093403
 
CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2Irsandi Hasan
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7Irsandi Hasan
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6Irsandi Hasan
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5Irsandi Hasan
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5r82093403
 
Exploration_Network_Chapter_1.ppt
Exploration_Network_Chapter_1.pptExploration_Network_Chapter_1.ppt
Exploration_Network_Chapter_1.pptssuserdfffa2
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5Irsandi Hasan
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8Irsandi Hasan
 

Similaire à CCNA Discovery 1 - Chapter 4 (20)

Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.ppt
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
 
CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8
 
Working at a Small-to-Medium Business.ppt
Working at a Small-to-Medium Business.pptWorking at a Small-to-Medium Business.ppt
Working at a Small-to-Medium Business.ppt
 
Exploration network
Exploration networkExploration network
Exploration network
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6
 
CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
Exploration_Network_Chapter_1.ppt
Exploration_Network_Chapter_1.pptExploration_Network_Chapter_1.ppt
Exploration_Network_Chapter_1.ppt
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
 

Plus de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 

Plus de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

CCNA Discovery 1 - Chapter 4

  • 1. Connecting to the Internet Through an ISP Networking for Home and Small Businesses – Chapter 4 Version 4.0 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Explain “what is the Internet?” and how we connect to the Internet using an Internet Service Provider (ISP).  Explain how information is sent across the Internet through an ISP.  Describe and identify the components of an ISP Network Operations Center.  Identify the different types of cables and connectors for connecting the devices in a Network Operations Center.  Construct and terminate twisted pair cables and determine type of cable needed © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. The Internet and How We Connect to It Using an ISP  Explain what the Internet is © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. The Internet and How We Connect to It Using an ISP  Define an Internet Service Provider and its purpose © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. The Internet and How We Connect to It Using an ISP  Describe how you connect to the Internet through the ISP and the ISP’s relationship to the Internet © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. The Internet and How We Connect to It Using an ISP  Identify and describe the different connection options that ISPs can provide © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. The Internet and How We Connect to It Using an ISP  Identify and describe the levels of service offered by an ISP © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. How Information is Sent When Using an ISP  Define and explain that the most important protocol of the Internet is the Internet Protocol (IP). © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. How Information is Sent When Using an ISP  The IP Packet © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. How Information is Sent When Using an ISP  Explain how the ISP NOC handles packets from your home network © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. How Information is Sent When Using an ISP  Describe how the ISP forwards packets across the Internet © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. The Internet Cloud  Identify and describe the concept of the Internet cloud. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Components of an ISP Network Operations Center  Identify and describe the network devices used in a NOC within the Internet cloud © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Components of an ISP Network Operations Center  Physical requirements of a home network versus an ISP © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Types of Cables and Connectors Used in Networking  Identify and describe common types of cables © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Types of Cables and Connectors Used in Networking  Describe twisted pair cables, common terminations, and when they are used © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Types of Cables and Connectors Used in Networking  Describe Coax cable, common terminations, and when they are used © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Types of Cables and Connectors Used in Networking  Describe optical fiber cables, common terminations, and when they are used © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Construct and Terminate Twisted Pair Cables  Define cable standards and state their purpose © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Construct and Terminate Twisted Pair Cables  Identify and describe the cross-over and straight through cable pinouts and color codes © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Construct and Terminate Twisted Pair Cables  Describe how to terminate UTP cables © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Construct and Terminate Twisted Pair Cables  Describe how to punch down wires to patch panel and wall jacks. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Construct and Terminate Twisted Pair Cables  Describe how to test cable termination and functionality (Cable testing). © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. Construct and Terminate Twisted Pair Cables  Define Attenuation  Define Crosstalk © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. Construct and Terminate Twisted Pair Cables  Describe cabling best practices © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Summary  The Internet is a worldwide collection of computer networks, accessed through ISPs.  Internet Protocol (IP) controls the structure and addressing of data packets for transport through the Internet cloud.  ISP Network Operations Centers (NOCs) utilize high-end, high- speed devices with redundancy.  Home networks feature multi-function devices which perform switching and routing.  Networks use physical cabling media which must conform to standards in construction and termination.  Cabling best practices are designed to reduce attenuation and crosstalk. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27