SlideShare une entreprise Scribd logo
1  sur  88
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 1:
Exploring the Network
Introduction to Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
Students will be able to:
 Explain how multiple networks are used in everyday
life.
 Explain the topologies and devices used in a small to
medium-sized business network.
 Explain the basic characteristics of a network that
supports communication in a small to medium-sized
business.
 Explain trends in networking that will affect the use of
networks in small to medium-sized businesses.
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform
1.4 The Changing Network Environment
1.5 Summary and review Questions
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Today
Networks in Our Past and Daily Lives
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Today
The Global Community
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
 How do you define communication?
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
 Establishing the Rules
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
 Establishing the Rules
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Living in a Network-Centric World
Communication – An essential part of our lives
 Establishing the Rules
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quality of Communications
Communication – An essential part of our lives
For data networks, we use the same basic criteria to judge
success. As a message moves through the network, many
factors can prevent the message from reaching the recipient or
distort its intended meaning. These factors can be either
external or internal.
 External Factors
1. The quality of the pathway between the sender and the recipient
2. The number of times the message has to change form
3. The number of times the message has to be redirected or readressed
4. The number of other messages being transmitted simultaneously on the
communication network
5. The amount of time allotted for successful communication
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quality of Communications
Communication – An essential part of our lives
Different types of messages may vary in complexity and
importance. Clear and concise messages are usually easier to
understand than complex messages. Important
communications require more care to ensure that they are
delivered and understood by the recipient.
 Internal Factors
1. The size of the message
2. The complexity of the message
3. The importance of the message
Large messages may be interrupted or delayed at different
points within the network. A message with a low importance or
priority could be dropped if the network becomes overloaded.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Learn
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Communicate
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Work
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Play
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Networks of Many Sizes
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Clients and Servers
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Providing Resources in a Network
Peer-to-Peer
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access
points)
 Internetworking Devices (routers)
 Security Devices (firewalls)
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Media
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Network Representations
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a Network
Topology Diagrams
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Internet Access Technologies
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Local Area Networks (LAN)
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs and WANs
Wide Area Networks (WAN)
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
The Internet
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
Intranet and Extranet
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Internet
Intranet and Extranet
Intranets, private networks in use by just one company, enable
businesses to communicate and perform transactions among
global employee and branch locations.
Companies develop extranets, or extended internetworks, to
provide suppliers, vendors, and customers limited access to
corporate data to check order status, inventory, and parts lists.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LANs, WANs, and Internets
Popular Communication Tools
The existence and broad adoption of the Internet has ushered
in new forms of communication that empower individuals to
create information that can be accessed by a global audience.
 Instant Messaging
 Weblogs (blogs)
 Wikis
 Podcasting
 Collaboration Tools
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting to the Internet
Connecting Businesses to the Internet
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
The Converging Network
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
The Converging Network
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converged Networks
Planning for the Future
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance
 The expectation that the Internet is always available to the
millions of users who rely on it requires a network
architecture that is designed and built to be fault tolerant. A
fault tolerant network is one that limits the impact of a
hardware or software failure and can recover quickly when
such a failure occurs.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance in Circuit Switched Network
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Packet-Switched Networks
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalability
 A scalable network can expand quickly to support new users
and applications without impacting the performance of the
service being delivered to existing users. The ability of the
network to support these new interconnections depends on a
hierarchical layered design for the underlying physical
infrastructure and logical architecture.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Tier 1
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Tier 2
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Tier 3
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Hierarchical
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks – Distributed
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Scalable Networks - Peers
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
 Time-sensitive communication - increase priority for services
like telephony or video distribution.
 Non time-sensitive communication - decrease priority for web
page retrieval or email.
 High importance to organization - increase priority for
production control or business transaction data.
 Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing (QoS)
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Security measures taken in a network should:
 Prevent unauthorized disclosure or theft of information
 Prevent unauthorized modification of information
 Prevent Denial of Service
Means to achieve these goals include:
 Ensuring confidentiality
 Maintaining communication integrity
 Ensuring availability
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
 Ensuring Confidentiality
Data privacy is maintained by allowing only the intended and authorized
recipients - individuals, processes, or devices - to read the data.
Having a strong system for user authentication, enforcing passwords
that are difficult to guess, and requiring users to change them
frequently helps restrict access to communications and to data stored
on network attached devices. Where appropriate, encrypting content
ensures confidentiality and minimizes unauthorized disclosure or theft
of information.
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
 Maintaining Communication Integrity
Data integrity means having the assurance that the information has not
been altered in transmission, from origin to destination. Data integrity
can be compromised when information has been corrupted - willfully or
accidentally - before the intended recipient receives it.
Source integrity is the assurance that the identity of the sender has
been validated. Source integrity is compromised when a user or device
fakes its identity and supplies incorrect information to a recipient.
The use of digital signatures, hashing algorithms and check sum
mechanisms are ways to provide source and data integrity across a
network to prevent unauthorized modification of information.
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
 Ensuring Availability
Ensuring confidentiality and integrity are irrelevant if network resources
become over burdened, or not available at all. Availability means
having the assurance of timely and reliable access to data services for
authorized users.
Resources can be unavailable during a Denial of Service (DoS) attack
or due to the spread of a computer virus. Network firewall devices,
along with desktop and server anti-virus software can ensure system
reliability and the robustness to detect, repel, and cope with such
attacks.
Building fully redundant network infrastructures, with few single points of
failure, can reduce the impact of these threats.
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Reliable Network
Providing Network Security
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Information Technology and networking careers are growing and
evolving as fast as the underlying technologies and services. As
networks increase in sophistication, the demand for people with
networking skills will continue to grow.
Traditional IT positions like programmers, software engineers,
data base administrators and network technicians are now joined
by new titles, such as network architect, e-Commerce site
designer, information security officer, and home integration
specialist.
As students of networking technology, we examine the
components of data networks and the roles they play in enabling
communication. This course,is designed to empower you with the
networking knowledge to build and manage these evolving
networks.
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
New trends
Some of the top trends include:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Bring Your Own Device (BYOD)
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Online Collaboration
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Video Communication
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Cloud Computing
There are four primary types of clouds:
 Public clouds
 Private clouds
 Custom clouds
 Hybrid clouds
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Trends
Data Centers
A data center is a facility used to house computer systems and
associated components including:
 Redundant data communications connections
 High-speed virtual servers (sometimes referred to as server
farms or server clusters)
 Redundant storage systems (typically uses SAN technology)
 Redundant or backup power supplies
 Environmental controls (e.g., air conditioning, fire
suppression)
 Security devices
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Technology Trends in the Home
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Powerline Networking
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Networking Technologies for the Home
Wireless Broadband
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Future of Networking
Network Security
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Security
Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Network Architectures
Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Architectures
Cisco Certified Network Associate (CCNA)
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
 Networks and the Internet have changed the way we
communicate, learn, work, and even play.
 Networks come in all sizes. They can range from simple
networks consisting of two computers, to networks
connecting millions of devices.
 The Internet is the largest network in existence. In fact, the
term Internet means a ‘network of networks. The Internet
provides the services that enable us to connect and
communicate with our families, friends, work, and interests.
Presentation_ID 76© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
 The network infrastructure is the platform that supports the
network. It provides the stable and reliable channel over
which communication can occur. It is made up of network
components including end devices, intermediate device, and
network media.
 Networks must be reliable.
 Network security is an integral part of computer networking,
regardless of whether the network is limited to a home
environment with a single connection to the Internet, or as
large as a corporation with thousands of users.
Presentation_ID 77© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
In this chapter, you learned:
 The network infrastructure can vary greatly in terms of size,
number of users, and number and types of services that are
supported on it. The network infrastructure must grow and
adjust to support the way the network is used. The routing
and switching platform is the foundation of any network
infrastructure.
Presentation_ID 78© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 Describe the external factors that impact network
communication.
External factors affecting the quality of communication are related to the
processes that devices use to talk to each other and include:
• Whether a confirmation of the message was returned to the sender.
• The quality of the pathway between the sender and the recipient.
• The number of times the message has to change form.
• The number of other messages in the communication network.
• The number of times the message is reformatted.
• The amount of time allotted for successful communication.
Presentation_ID 79© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 Describe the Internal factors that impact network
communication.
Internal factors that interfere with communication are related to the
nature of the communication itself. The communication may vary in
complexity and importance. Clear and concise messages are usually
easier to understand than complex messages. Important
communications require more care to ensure that the meaning is
received properly.
Internal factors affecting the quality of communication include:
• The size of the message
• The complexity of the message
• The importance of the message
Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 Describe network-supported technologies that impact how
people learn, work, and play.
Includes instant messaging, weblogs, podcasting, collaboration tools
using text, graphic, audio and video technologies over both fixed and
mobile data networks.
Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 What is data? What is a data network? What is a converged
network?
Data is the pieces of information, such as files, audio, phone calls and
video shared across the network.
A data network consists of:
• Devices that communicate with each other
• A means of connecting these devices together – a medium that can
transport messages from one device to another
• The digital messages or units of information that will travel from one
device to another
• Rules of agreements to govern how the messages are sent, directed,
and received.
Presentation_ID 82© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 What is a converged network?
Traditionally telephone, data communications between computers,
radio, and television each had separate networks and each required a
different technology to carry its particular communication signal.
Additionally, each service had its own set of rules and standards to
ensure the successful communication of its service across a specific
medium.
Technology can now consolidate these disparate networks into one
platform – a platform we define as the converged network. The flow of
voice, radio, video, and data travelling over the same network
eliminates the need to create and maintain separate networks. As
converged networks become more common, businesses and individual
users can use a single network for its services.
Presentation_ID 83© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 Why does Quality of Service matter on a data network?
Converged networks carry multiple types of communication. Data
network resources, however are always constrained by budgets,
physical limitations, and technology. The existence of these limitations
means that decisions must be made regarding the priority of different
types of communication.
The management of different types of communication involves
balancing both the traffic´s importance and its characteristics. Both of
these factors are considered when developing a Quality of Service
(QoS) strategy for managing data in a given data network.
Presentation_ID 84© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 What happens without a properly designed and implemented
QoS mechanism?
Without properly designed and implemented QoS mechanisms, data
packets will be dropped without consideration of the application
characteristics or priority.
Presentation_ID 85© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Summary
Review
 What does security mean in the context of data networks?
Data network security has two aspects:
• Interception of data communications – data encryption can negate
such interceptions.
• Unauthorized access to the network and its data – User
authentication (usernames, passwords and classifications are tools
to prevent this - In addition to physical security)
Intruders may desire to gain access to information for monetary gain.
They steal financial records or sell trade secrets to competitors. For
others stealing data is merely a game about which they can brag, often
boast about it their latest online conquests. Many have limited computer
and network skills and do this just for fun. Some change, destroy or just
disrupt. Some are disgruntled employees to wreak havoc.
Presentation_ID 86© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Exploring the Networking
Lab: Skills Integration Challenge: Introduction to PT
Presentation_ID 87© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Lab: Skills Integration: Use of TCP/IP in PT demo
Exploring the Networking
Presentation_ID 88© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Contenu connexe

Tendances

CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2Irsandi Hasan
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 

Tendances (17)

CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 

Similaire à Itn instructor ppt_chapter1 exploring the network smartskills

CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxsirajmohammed35
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Networkteknetir
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxKennedyRodriguez10
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a networkteknetir
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Hamza Malik
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1limenih muluneh
 

Similaire à Itn instructor ppt_chapter1 exploring the network smartskills (20)

CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
 
ccna1_v5_capitulo1
ccna1_v5_capitulo1ccna1_v5_capitulo1
ccna1_v5_capitulo1
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1
 

Dernier

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Itn instructor ppt_chapter1 exploring the network smartskills

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives Students will be able to:  Explain how multiple networks are used in everyday life.  Explain the topologies and devices used in a small to medium-sized business network.  Explain the basic characteristics of a network that supports communication in a small to medium-sized business.  Explain trends in networking that will affect the use of networks in small to medium-sized businesses.
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.1 Globally Connected 1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform 1.4 The Changing Network Environment 1.5 Summary and review Questions
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Today Networks in Our Past and Daily Lives
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Today The Global Community
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives  How do you define communication?
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives  Establishing the Rules
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives  Establishing the Rules
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Living in a Network-Centric World Communication – An essential part of our lives  Establishing the Rules
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quality of Communications Communication – An essential part of our lives For data networks, we use the same basic criteria to judge success. As a message moves through the network, many factors can prevent the message from reaching the recipient or distort its intended meaning. These factors can be either external or internal.  External Factors 1. The quality of the pathway between the sender and the recipient 2. The number of times the message has to change form 3. The number of times the message has to be redirected or readressed 4. The number of other messages being transmitted simultaneously on the communication network 5. The amount of time allotted for successful communication
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quality of Communications Communication – An essential part of our lives Different types of messages may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that they are delivered and understood by the recipient.  Internal Factors 1. The size of the message 2. The complexity of the message 3. The importance of the message Large messages may be interrupted or delayed at different points within the network. A message with a low importance or priority could be dropped if the network becomes overloaded.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives  Networks Support the Way We Learn
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives  Networks Support the Way We Communicate
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives  Networks Support the Way We Work
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Interconnecting our Lives Networking impacts in our daily lives  Networks Support the Way We Play
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Networks of Many Sizes
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Clients and Servers
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Providing Resources in a Network Peer-to-Peer
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Components of a Network There are three categories of network components:  Devices  Media  Services
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network End Devices Some examples of end devices are:  Computers (work stations, laptops, file servers, web servers)  Network printers  VoIP phones  TelePresence endpoint  Security cameras  Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners)
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Infrastructure Devices Examples of intermediary network devices are:  Network Access Devices (switches, and wireless access points)  Internetworking Devices (routers)  Security Devices (firewalls)
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Media
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Network Representations
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a Network Topology Diagrams
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Internet Access Technologies
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Types of Networks The two most common types of network infrastructures are:  Local Area Network (LAN)  Wide Area Network (WAN). Other types of networks include:  Metropolitan Area Network (MAN)  Wireless LAN (WLAN)  Storage Area Network (SAN)
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Local Area Networks (LAN)
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs and WANs Wide Area Networks (WAN)
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets The Internet
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Internet Intranet and Extranet
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Internet Intranet and Extranet Intranets, private networks in use by just one company, enable businesses to communicate and perform transactions among global employee and branch locations. Companies develop extranets, or extended internetworks, to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists.
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LANs, WANs, and Internets Popular Communication Tools The existence and broad adoption of the Internet has ushered in new forms of communication that empower individuals to create information that can be accessed by a global audience.  Instant Messaging  Weblogs (blogs)  Wikis  Podcasting  Collaboration Tools
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Remote Users to the Internet
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting to the Internet Connecting Businesses to the Internet
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks The Converging Network
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks The Converging Network
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converged Networks Planning for the Future
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:  Fault Tolerance  Scalability  Quality of Service (QoS)  Security
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance  The expectation that the Internet is always available to the millions of users who rely on it requires a network architecture that is designed and built to be fault tolerant. A fault tolerant network is one that limits the impact of a hardware or software failure and can recover quickly when such a failure occurs.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance in Circuit Switched Network
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Packet-Switched Networks
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalability  A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. The ability of the network to support these new interconnections depends on a hierarchical layered design for the underlying physical infrastructure and logical architecture.
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Tier 1
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Tier 2
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Tier 3
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Hierarchical
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks – Distributed
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Scalable Networks - Peers
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS)
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS) Examples of priority decisions for an organization might include:  Time-sensitive communication - increase priority for services like telephony or video distribution.  Non time-sensitive communication - decrease priority for web page retrieval or email.  High importance to organization - increase priority for production control or business transaction data.  Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS)
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing (QoS)
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security Security measures taken in a network should:  Prevent unauthorized disclosure or theft of information  Prevent unauthorized modification of information  Prevent Denial of Service Means to achieve these goals include:  Ensuring confidentiality  Maintaining communication integrity  Ensuring availability
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security  Ensuring Confidentiality Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data. Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information.
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security  Maintaining Communication Integrity Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - willfully or accidentally - before the intended recipient receives it. Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient. The use of digital signatures, hashing algorithms and check sum mechanisms are ways to provide source and data integrity across a network to prevent unauthorized modification of information.
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security  Ensuring Availability Ensuring confidentiality and integrity are irrelevant if network resources become over burdened, or not available at all. Availability means having the assurance of timely and reliable access to data services for authorized users. Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network infrastructures, with few single points of failure, can reduce the impact of these threats.
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Reliable Network Providing Network Security
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends Information Technology and networking careers are growing and evolving as fast as the underlying technologies and services. As networks increase in sophistication, the demand for people with networking skills will continue to grow. Traditional IT positions like programmers, software engineers, data base administrators and network technicians are now joined by new titles, such as network architect, e-Commerce site designer, information security officer, and home integration specialist. As students of networking technology, we examine the components of data networks and the roles they play in enabling communication. This course,is designed to empower you with the networking knowledge to build and manage these evolving networks.
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends
  • 61. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends New trends Some of the top trends include:  Bring Your Own Device (BYOD)  Online collaboration  Video  Cloud computing
  • 62. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Bring Your Own Device (BYOD)
  • 63. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Online Collaboration
  • 64. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Video Communication
  • 65. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Cloud Computing There are four primary types of clouds:  Public clouds  Private clouds  Custom clouds  Hybrid clouds
  • 66. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Trends Data Centers A data center is a facility used to house computer systems and associated components including:  Redundant data communications connections  High-speed virtual servers (sometimes referred to as server farms or server clusters)  Redundant storage systems (typically uses SAN technology)  Redundant or backup power supplies  Environmental controls (e.g., air conditioning, fire suppression)  Security devices
  • 67. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Technology Trends in the Home
  • 68. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Powerline Networking
  • 69. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Networking Technologies for the Home Wireless Broadband
  • 70. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Future of Networking Network Security
  • 71. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Threats The most common external threats to networks include:  Viruses, worms, and Trojan horses  Spyware and adware  Zero-day attacks, also called zero-hour attacks  Hacker attacks  Denial of service attacks  Data interception and theft  Identity theft
  • 72. Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Security Security Solutions Network security components often include:  Antivirus and antispyware  Firewall filtering  Dedicated firewall systems  Access control lists (ACL)  Intrusion prevention systems (IPS)  Virtual Private Networks (VPNs)
  • 73. Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Architectures Cisco Network Architectures
  • 74. Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Architectures Cisco Certified Network Associate (CCNA)
  • 75. Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned:  Networks and the Internet have changed the way we communicate, learn, work, and even play.  Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.  The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests.
  • 76. Presentation_ID 76© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned:  The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media.  Networks must be reliable.  Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users.
  • 77. Presentation_ID 77© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary In this chapter, you learned:  The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure.
  • 78. Presentation_ID 78© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  Describe the external factors that impact network communication. External factors affecting the quality of communication are related to the processes that devices use to talk to each other and include: • Whether a confirmation of the message was returned to the sender. • The quality of the pathway between the sender and the recipient. • The number of times the message has to change form. • The number of other messages in the communication network. • The number of times the message is reformatted. • The amount of time allotted for successful communication.
  • 79. Presentation_ID 79© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  Describe the Internal factors that impact network communication. Internal factors that interfere with communication are related to the nature of the communication itself. The communication may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that the meaning is received properly. Internal factors affecting the quality of communication include: • The size of the message • The complexity of the message • The importance of the message
  • 80. Presentation_ID 80© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  Describe network-supported technologies that impact how people learn, work, and play. Includes instant messaging, weblogs, podcasting, collaboration tools using text, graphic, audio and video technologies over both fixed and mobile data networks.
  • 81. Presentation_ID 81© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  What is data? What is a data network? What is a converged network? Data is the pieces of information, such as files, audio, phone calls and video shared across the network. A data network consists of: • Devices that communicate with each other • A means of connecting these devices together – a medium that can transport messages from one device to another • The digital messages or units of information that will travel from one device to another • Rules of agreements to govern how the messages are sent, directed, and received.
  • 82. Presentation_ID 82© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  What is a converged network? Traditionally telephone, data communications between computers, radio, and television each had separate networks and each required a different technology to carry its particular communication signal. Additionally, each service had its own set of rules and standards to ensure the successful communication of its service across a specific medium. Technology can now consolidate these disparate networks into one platform – a platform we define as the converged network. The flow of voice, radio, video, and data travelling over the same network eliminates the need to create and maintain separate networks. As converged networks become more common, businesses and individual users can use a single network for its services.
  • 83. Presentation_ID 83© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  Why does Quality of Service matter on a data network? Converged networks carry multiple types of communication. Data network resources, however are always constrained by budgets, physical limitations, and technology. The existence of these limitations means that decisions must be made regarding the priority of different types of communication. The management of different types of communication involves balancing both the traffic´s importance and its characteristics. Both of these factors are considered when developing a Quality of Service (QoS) strategy for managing data in a given data network.
  • 84. Presentation_ID 84© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  What happens without a properly designed and implemented QoS mechanism? Without properly designed and implemented QoS mechanisms, data packets will be dropped without consideration of the application characteristics or priority.
  • 85. Presentation_ID 85© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Summary Review  What does security mean in the context of data networks? Data network security has two aspects: • Interception of data communications – data encryption can negate such interceptions. • Unauthorized access to the network and its data – User authentication (usernames, passwords and classifications are tools to prevent this - In addition to physical security) Intruders may desire to gain access to information for monetary gain. They steal financial records or sell trade secrets to competitors. For others stealing data is merely a game about which they can brag, often boast about it their latest online conquests. Many have limited computer and network skills and do this just for fun. Some change, destroy or just disrupt. Some are disgruntled employees to wreak havoc.
  • 86. Presentation_ID 86© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Exploring the Networking Lab: Skills Integration Challenge: Introduction to PT
  • 87. Presentation_ID 87© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Lab: Skills Integration: Use of TCP/IP in PT demo Exploring the Networking
  • 88. Presentation_ID 88© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential