Soumettre la recherche
Mettre en ligne
Itn instructor ppt_chapter1 exploring the network smartskills
•
Télécharger en tant que PPTX, PDF
•
1 j'aime
•
917 vues
Tiago Monteiro
Suivre
Chapter1 Exploring the Network
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 88
Télécharger maintenant
Recommandé
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
United International University
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
Hamza Malik
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
ccna1 v5 cap2
ccna1 v5 cap2
lvstarodub
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
Irsandi Hasan
Recommandé
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
United International University
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
Hamza Malik
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
ccna1 v5 cap2
ccna1 v5 cap2
lvstarodub
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
Irsandi Hasan
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
Irsandi Hasan
Chapter 01 - Exploring the Network
Chapter 01 - Exploring the Network
Yaser Rahmati
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
Irsandi Hasan
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
Irsandi Hasan
IT Essentials Chapter 9
IT Essentials Chapter 9
Pacific Coast School
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
Irsandi Hasan
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
Nil Menon
VMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Irsandi Hasan
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
Hamza Malik
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
sirajmohammed35
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
AbdisayidkhalifTahir
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Mustapha Kohili
Contenu connexe
Tendances
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
Irsandi Hasan
Chapter 01 - Exploring the Network
Chapter 01 - Exploring the Network
Yaser Rahmati
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
Irsandi Hasan
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
Irsandi Hasan
IT Essentials Chapter 9
IT Essentials Chapter 9
Pacific Coast School
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
Nil Menon
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
Irsandi Hasan
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
Irsandi Hasan
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
Nil Menon
VMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Irsandi Hasan
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
Hamza Malik
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
Tendances
(17)
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
Chapter 01 - Exploring the Network
Chapter 01 - Exploring the Network
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
IT Essentials Chapter 9
IT Essentials Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
VMware vShield - Overview
VMware vShield - Overview
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Similaire à Itn instructor ppt_chapter1 exploring the network smartskills
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
sirajmohammed35
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
AbdisayidkhalifTahir
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Mustapha Kohili
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
teknetir
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
KennedyRodriguez10
ccna1_v5_capitulo1
ccna1_v5_capitulo1
Luda Starodub
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
Hamza Malik
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
Vuz Dở Hơi
Chapter 11 : It’s a network
Chapter 11 : It’s a network
teknetir
Chapter 11 - It’s a Network
Chapter 11 - It’s a Network
Yaser Rahmati
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
Yaser Rahmati
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1
limenih muluneh
Similaire à Itn instructor ppt_chapter1 exploring the network smartskills
(20)
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
ccna1_v5_capitulo1
ccna1_v5_capitulo1
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
Chapter 11 : It’s a network
Chapter 11 : It’s a network
Chapter 11 - It’s a Network
Chapter 11 - It’s a Network
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1
Dernier
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Dernier
(20)
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Itn instructor ppt_chapter1 exploring the network smartskills
1.
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks
2.
Presentation_ID 2© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives Students will be able to: Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic characteristics of a network that supports communication in a small to medium-sized business. Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
3.
Presentation_ID 3© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.1 Globally Connected 1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform 1.4 The Changing Network Environment 1.5 Summary and review Questions
4.
Presentation_ID 4© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Today Networks in Our Past and Daily Lives
5.
Presentation_ID 5© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Today The Global Community
6.
Presentation_ID 6© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives How do you define communication?
7.
Presentation_ID 7© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives Establishing the Rules
8.
Presentation_ID 8© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives Establishing the Rules
9.
Presentation_ID 9© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives Establishing the Rules
10.
Presentation_ID 10© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Quality of Communications Communication – An essential part of our lives For data networks, we use the same basic criteria to judge success. As a message moves through the network, many factors can prevent the message from reaching the recipient or distort its intended meaning. These factors can be either external or internal. External Factors 1. The quality of the pathway between the sender and the recipient 2. The number of times the message has to change form 3. The number of times the message has to be redirected or readressed 4. The number of other messages being transmitted simultaneously on the communication network 5. The amount of time allotted for successful communication
11.
Presentation_ID 11© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Quality of Communications Communication – An essential part of our lives Different types of messages may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that they are delivered and understood by the recipient. Internal Factors 1. The size of the message 2. The complexity of the message 3. The importance of the message Large messages may be interrupted or delayed at different points within the network. A message with a low importance or priority could be dropped if the network becomes overloaded.
12.
Presentation_ID 12© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives Networks Support the Way We Learn
13.
Presentation_ID 13© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives Networks Support the Way We Communicate
14.
Presentation_ID 14© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives Networks Support the Way We Work
15.
Presentation_ID 15© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives Networks Support the Way We Play
16.
Presentation_ID 16© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Networks of Many Sizes
17.
Presentation_ID 17© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Clients and Servers
18.
Presentation_ID 18© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Peer-to-Peer
19.
Presentation_ID 19© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Components of a Network There are three categories of network components: Devices Media Services
20.
Presentation_ID 20© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network End Devices Some examples of end devices are: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones TelePresence endpoint Security cameras Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
21.
Presentation_ID 21© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Infrastructure Devices Examples of intermediary network devices are: Network Access Devices (switches, and wireless access points) Internetworking Devices (routers) Security Devices (firewalls)
22.
Presentation_ID 22© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Media
23.
Presentation_ID 23© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Representations
24.
Presentation_ID 24© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Topology Diagrams
25.
Presentation_ID 25© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Internet Access Technologies
26.
Presentation_ID 26© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN)
27.
Presentation_ID 27© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Local Area Networks (LAN)
28.
Presentation_ID 28© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Wide Area Networks (WAN)
29.
Presentation_ID 29© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets The Internet
30.
Presentation_ID 30© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential The Internet Intranet and Extranet
31.
Presentation_ID 31© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential The Internet Intranet and Extranet Intranets, private networks in use by just one company, enable businesses to communicate and perform transactions among global employee and branch locations. Companies develop extranets, or extended internetworks, to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists.
32.
Presentation_ID 32© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Popular Communication Tools The existence and broad adoption of the Internet has ushered in new forms of communication that empower individuals to create information that can be accessed by a global audience. Instant Messaging Weblogs (blogs) Wikis Podcasting Collaboration Tools
33.
Presentation_ID 33© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Remote Users to the Internet
34.
Presentation_ID 34© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Businesses to the Internet
35.
Presentation_ID 35© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks The Converging Network
36.
Presentation_ID 36© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks The Converging Network
37.
Presentation_ID 37© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Planning for the Future
38.
Presentation_ID 38© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security
39.
Presentation_ID 39© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance The expectation that the Internet is always available to the millions of users who rely on it requires a network architecture that is designed and built to be fault tolerant. A fault tolerant network is one that limits the impact of a hardware or software failure and can recover quickly when such a failure occurs.
40.
Presentation_ID 40© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance in Circuit Switched Network
41.
Presentation_ID 41© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Packet-Switched Networks
42.
Presentation_ID 42© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalability A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The ability of the network to support these new interconnections depends on a hierarchical layered design for the underlying physical infrastructure and logical architecture.
43.
Presentation_ID 43© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Tier 1
44.
Presentation_ID 44© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Tier 2
45.
Presentation_ID 45© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Tier 3
46.
Presentation_ID 46© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Hierarchical
47.
Presentation_ID 47© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Distributed
48.
Presentation_ID 48© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks - Peers
49.
Presentation_ID 49© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS)
50.
Presentation_ID 50© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS) Examples of priority decisions for an organization might include: Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or email. High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment
51.
Presentation_ID 51© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS)
52.
Presentation_ID 52© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS)
53.
Presentation_ID 53© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security
54.
Presentation_ID 54© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security Security measures taken in a network should: Prevent unauthorized disclosure or theft of information Prevent unauthorized modification of information Prevent Denial of Service Means to achieve these goals include: Ensuring confidentiality Maintaining communication integrity Ensuring availability
55.
Presentation_ID 55© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security Ensuring Confidentiality Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data. Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information.
56.
Presentation_ID 56© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security Maintaining Communication Integrity Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - willfully or accidentally - before the intended recipient receives it. Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient. The use of digital signatures, hashing algorithms and check sum mechanisms are ways to provide source and data integrity across a network to prevent unauthorized modification of information.
57.
Presentation_ID 57© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security Ensuring Availability Ensuring confidentiality and integrity are irrelevant if network resources become over burdened, or not available at all. Availability means having the assurance of timely and reliable access to data services for authorized users. Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network infrastructures, with few single points of failure, can reduce the impact of these threats.
58.
Presentation_ID 58© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security
59.
Presentation_ID 59© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends Information Technology and networking careers are growing and evolving as fast as the underlying technologies and services. As networks increase in sophistication, the demand for people with networking skills will continue to grow. Traditional IT positions like programmers, software engineers, data base administrators and network technicians are now joined by new titles, such as network architect, e-Commerce site designer, information security officer, and home integration specialist. As students of networking technology, we examine the components of data networks and the roles they play in enabling communication. This course,is designed to empower you with the networking knowledge to build and manage these evolving networks.
60.
Presentation_ID 60© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends
61.
Presentation_ID 61© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends Some of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video Cloud computing
62.
Presentation_ID 62© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Bring Your Own Device (BYOD)
63.
Presentation_ID 63© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Online Collaboration
64.
Presentation_ID 64© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Video Communication
65.
Presentation_ID 65© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Cloud Computing There are four primary types of clouds: Public clouds Private clouds Custom clouds Hybrid clouds
66.
Presentation_ID 66© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Data Centers A data center is a facility used to house computer systems and associated components including: Redundant data communications connections High-speed virtual servers (sometimes referred to as server farms or server clusters) Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices
67.
Presentation_ID 67© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Technology Trends in the Home
68.
Presentation_ID 68© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Powerline Networking
69.
Presentation_ID 69© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Wireless Broadband
70.
Presentation_ID 70© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Future of Networking Network Security
71.
Presentation_ID 71© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Threats The most common external threats to networks include: Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft
72.
Presentation_ID 72© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Solutions Network security components often include: Antivirus and antispyware Firewall filtering Dedicated firewall systems Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)
73.
Presentation_ID 73© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Architectures Cisco Network Architectures
74.
Presentation_ID 74© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Architectures Cisco Certified Network Associate (CCNA)
75.
Presentation_ID 75© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned: Networks and the Internet have changed the way we communicate, learn, work, and even play. Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices. The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
76.
Presentation_ID 76© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned: The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media. Networks must be reliable. Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
77.
Presentation_ID 77© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned: The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.
78.
Presentation_ID 78© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review Describe the external factors that impact network communication. External factors affecting the quality of communication are related to the processes that devices use to talk to each other and include: • Whether a confirmation of the message was returned to the sender. • The quality of the pathway between the sender and the recipient. • The number of times the message has to change form. • The number of other messages in the communication network. • The number of times the message is reformatted. • The amount of time allotted for successful communication.
79.
Presentation_ID 79© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review Describe the Internal factors that impact network communication. Internal factors that interfere with communication are related to the nature of the communication itself. The communication may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that the meaning is received properly. Internal factors affecting the quality of communication include: • The size of the message • The complexity of the message • The importance of the message
80.
Presentation_ID 80© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review Describe network-supported technologies that impact how people learn, work, and play. Includes instant messaging, weblogs, podcasting, collaboration tools using text, graphic, audio and video technologies over both fixed and mobile data networks.
81.
Presentation_ID 81© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review What is data? What is a data network? What is a converged network? Data is the pieces of information, such as files, audio, phone calls and video shared across the network. A data network consists of: • Devices that communicate with each other • A means of connecting these devices together – a medium that can transport messages from one device to another • The digital messages or units of information that will travel from one device to another • Rules of agreements to govern how the messages are sent, directed, and received.
82.
Presentation_ID 82© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review What is a converged network? Traditionally telephone, data communications between computers, radio, and television each had separate networks and each required a different technology to carry its particular communication signal. Additionally, each service had its own set of rules and standards to ensure the successful communication of its service across a specific medium. Technology can now consolidate these disparate networks into one platform – a platform we define as the converged network. The flow of voice, radio, video, and data travelling over the same network eliminates the need to create and maintain separate networks. As converged networks become more common, businesses and individual users can use a single network for its services.
83.
Presentation_ID 83© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review Why does Quality of Service matter on a data network? Converged networks carry multiple types of communication. Data network resources, however are always constrained by budgets, physical limitations, and technology. The existence of these limitations means that decisions must be made regarding the priority of different types of communication. The management of different types of communication involves balancing both the traffic´s importance and its characteristics. Both of these factors are considered when developing a Quality of Service (QoS) strategy for managing data in a given data network.
84.
Presentation_ID 84© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review What happens without a properly designed and implemented QoS mechanism? Without properly designed and implemented QoS mechanisms, data packets will be dropped without consideration of the application characteristics or priority.
85.
Presentation_ID 85© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review What does security mean in the context of data networks? Data network security has two aspects: • Interception of data communications – data encryption can negate such interceptions. • Unauthorized access to the network and its data – User authentication (usernames, passwords and classifications are tools to prevent this - In addition to physical security) Intruders may desire to gain access to information for monetary gain. They steal financial records or sell trade secrets to competitors. For others stealing data is merely a game about which they can brag, often boast about it their latest online conquests. Many have limited computer and network skills and do this just for fun. Some change, destroy or just disrupt. Some are disgruntled employees to wreak havoc.
86.
Presentation_ID 86© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Lab: Skills Integration Challenge: Introduction to PT
87.
Presentation_ID 87© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Lab: Skills Integration: Use of TCP/IP in PT demo Exploring the Networking
88.
Presentation_ID 88© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential
Télécharger maintenant