SlideShare uma empresa Scribd logo
1 de 49
Chapter 1:
Exploring the Network

Introduction to Networks

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

1
Chapter 1: Objectives
Students will be able to:
 Explain how multiple networks are used in everyday
life.
 Explain the topologies and devices used in a small to
medium-sized business network.
 Explain the basic characteristics of a network that
supports communication in a small to medium-sized
business.
 Explain trends in networking that will affect the use of
networks in small to medium-sized businesses.
Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

2
Chapter 1
1.1 Globally Connected
1.2 LANs, WANs, and the Internet
1.3 The Network as a Platform

1.4 The Changing Network Environment
1.5 Summary

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

3
Networking Today

Networks in Our Past and Daily Lives

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

4
Networking Today

The Global Community

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

5
Interconnecting our Lives

Networking impacts in our daily lives
 Networks Support the Way We Learn
 Networks Support the Way We Communicate
 Networks Support the Way We Work
 Networks Support the Way We Play

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

6
Providing Resources in a Network

Networks of Many Sizes

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

7
Providing Resources in a Network

Clients and Servers

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

8
Providing Resources in a Network

Peer-to-Peer

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

9
LANs, WANs, and Internets

Components of a Network
There are three categories of network components:
 Devices
 Media
 Services

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10
Components of a Network

End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11
Components of a Network

Network Infrastructure Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access
points)

 Internetworking Devices (routers)
 Security Devices (firewalls)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12
Components of a Network

Network Media

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13
Components of a Network

Network Representations

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14
Components of a Network

Topology Diagrams

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15
LANs and WANs

Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).

Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

16
LANs and WANs

Local Area Networks (LAN)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17
LANs and WANs

Wide Area Networks (WAN)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18
LANs, WANs, and Internets

The Internet

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19
The Internet

Intranet and Extranet

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

20
LANs, WANs, and Internets

Internet Access Technologies

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

21
Connecting to the Internet

Connecting Remote Users to the Internet

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

22
Connecting to the Internet

Connecting Businesses to the Internet

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

23
Converged Networks

The Converging Network

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

24
Converged Networks

Planning for the Future

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

25
Reliable Network

Supporting Network Architecture
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures need to
address in order to meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)

 Security

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

26
Reliable Network

Fault Tolerance in Circuit Switched Network

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

27
Reliable Network

Packet-Switched Networks

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

28
Reliable Network

Scalable Networks

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

29
Reliable Network

Providing (QoS)
Examples of priority decisions for an organization might
include:
 Time-sensitive communication - increase priority for services
like telephony or video distribution.
 Non time-sensitive communication - decrease priority for web
page retrieval or email.
 High importance to organization - increase priority for
production control or business transaction data.
 Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

30
Reliable Network

Providing Network Security

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

31
Network Trends

New trends
Some of the top trends include:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

32
Network Trends

Bring Your Own Device (BYOD)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

33
Network Trends

Online Collaboration

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

34
Network Trends

Video Communication

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

35
Network Trends

Cloud Computing
There are four primary types of clouds:
 Public clouds
 Private clouds
 Custom clouds
 Hybrid clouds

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

36
Network Trends

Data Centers
A data center is a facility used to house computer systems and
associated components including:
 Redundant data communications connections

 High-speed virtual servers (sometimes referred to as server
farms or server clusters)
 Redundant storage systems (typically uses SAN technology)

 Redundant or backup power supplies
 Environmental controls (e.g., air conditioning, fire
suppression)
 Security devices
Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

37
Networking Technologies for the Home

Technology Trends in the Home

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

38
Networking Technologies for the Home

Powerline Networking

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

39
Networking Technologies for the Home

Wireless Broadband

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

40
Future of Networking

Network Security

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

41
Network Security

Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

42
Network Security

Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

43
Network Architectures

Cisco Network Architectures

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

44
Network Architectures

Cisco Certified Network Associate (CCNA)

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

45
Exploring the Networking

Summary
In this chapter, you learned:
 Networks and the Internet have changed the way we
communicate, learn, work, and even play.

 Networks come in all sizes. They can range from simple
networks consisting of two computers, to networks
connecting millions of devices.
 The Internet is the largest network in existence. In fact, the
term Internet means a ‘network of networks. The Internet
provides the services that enable us to connect and
communicate with our families, friends, work, and interests.

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

46
Exploring the Networking

Summary
In this chapter, you learned:
 The network infrastructure is the platform that supports the
network. It provides the stable and reliable channel over
which communication can occur. It is made up of network
components including end devices, intermediate device, and
network media.
 Networks must be reliable.

 Network security is an integral part of computer networking,
regardless of whether the network is limited to a home
environment with a single connection to the Internet, or as
large as a corporation with thousands of users.

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

47
Exploring the Networking

Summary
In this chapter, you learned:
 The network infrastructure can vary greatly in terms of size,
number of users, and number and types of services that are
supported on it. The network infrastructure must grow and
adjust to support the way the network is used. The routing
and switching platform is the foundation of any network
infrastructure.

Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

48
Presentation_ID

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

49

Mais conteúdo relacionado

Mais procurados

CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingVuz Dở Hơi
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 

Mais procurados (20)

CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
Snmp
SnmpSnmp
Snmp
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 

Destaque

CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
Itn instructor ppt_chapter5
Itn instructor ppt_chapter5Itn instructor ppt_chapter5
Itn instructor ppt_chapter5Cesar Aguirre
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IPraymondkao
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection pptDasarathi Dash
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Distributed Systems: scalability and high availability
Distributed Systems: scalability and high availabilityDistributed Systems: scalability and high availability
Distributed Systems: scalability and high availabilityRenato Lucindo
 

Destaque (8)

CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Itn instructor ppt_chapter5
Itn instructor ppt_chapter5Itn instructor ppt_chapter5
Itn instructor ppt_chapter5
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Distributed Systems: scalability and high availability
Distributed Systems: scalability and high availabilityDistributed Systems: scalability and high availability
Distributed Systems: scalability and high availability
 

Semelhante a Itn instructor ppt_chapter1 - exploring the network

ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxsirajmohammed35
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Hamza Malik
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Networkteknetir
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxKennedyRodriguez10
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a networkteknetir
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Hamza Malik
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 

Semelhante a Itn instructor ppt_chapter1 - exploring the network (20)

ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
ccna1_v5_capitulo1
ccna1_v5_capitulo1ccna1_v5_capitulo1
ccna1_v5_capitulo1
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Itn instructor ppt_chapter1 - exploring the network

  • 1. Chapter 1: Exploring the Network Introduction to Networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 1: Objectives Students will be able to:  Explain how multiple networks are used in everyday life.  Explain the topologies and devices used in a small to medium-sized business network.  Explain the basic characteristics of a network that supports communication in a small to medium-sized business.  Explain trends in networking that will affect the use of networks in small to medium-sized businesses. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 1 1.1 Globally Connected 1.2 LANs, WANs, and the Internet 1.3 The Network as a Platform 1.4 The Changing Network Environment 1.5 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Networking Today Networks in Our Past and Daily Lives Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Networking Today The Global Community Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Interconnecting our Lives Networking impacts in our daily lives  Networks Support the Way We Learn  Networks Support the Way We Communicate  Networks Support the Way We Work  Networks Support the Way We Play Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Providing Resources in a Network Networks of Many Sizes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Providing Resources in a Network Clients and Servers Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Providing Resources in a Network Peer-to-Peer Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. LANs, WANs, and Internets Components of a Network There are three categories of network components:  Devices  Media  Services Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Components of a Network End Devices Some examples of end devices are:  Computers (work stations, laptops, file servers, web servers)  Network printers  VoIP phones  TelePresence endpoint  Security cameras  Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit / credit card readers and barcode scanners) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Components of a Network Network Infrastructure Devices Examples of intermediary network devices are:  Network Access Devices (switches, and wireless access points)  Internetworking Devices (routers)  Security Devices (firewalls) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Components of a Network Network Media Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Components of a Network Network Representations Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Components of a Network Topology Diagrams Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. LANs and WANs Types of Networks The two most common types of network infrastructures are:  Local Area Network (LAN)  Wide Area Network (WAN). Other types of networks include:  Metropolitan Area Network (MAN)  Wireless LAN (WLAN)  Storage Area Network (SAN) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. LANs and WANs Local Area Networks (LAN) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. LANs and WANs Wide Area Networks (WAN) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. LANs, WANs, and Internets The Internet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. The Internet Intranet and Extranet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. LANs, WANs, and Internets Internet Access Technologies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Connecting to the Internet Connecting Remote Users to the Internet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Connecting to the Internet Connecting Businesses to the Internet Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Converged Networks The Converging Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Converged Networks Planning for the Future Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:  Fault Tolerance  Scalability  Quality of Service (QoS)  Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Reliable Network Fault Tolerance in Circuit Switched Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Reliable Network Packet-Switched Networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Reliable Network Scalable Networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Reliable Network Providing (QoS) Examples of priority decisions for an organization might include:  Time-sensitive communication - increase priority for services like telephony or video distribution.  Non time-sensitive communication - decrease priority for web page retrieval or email.  High importance to organization - increase priority for production control or business transaction data.  Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Reliable Network Providing Network Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Network Trends New trends Some of the top trends include:  Bring Your Own Device (BYOD)  Online collaboration  Video  Cloud computing Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Network Trends Bring Your Own Device (BYOD) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Network Trends Online Collaboration Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Network Trends Video Communication Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Network Trends Cloud Computing There are four primary types of clouds:  Public clouds  Private clouds  Custom clouds  Hybrid clouds Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Network Trends Data Centers A data center is a facility used to house computer systems and associated components including:  Redundant data communications connections  High-speed virtual servers (sometimes referred to as server farms or server clusters)  Redundant storage systems (typically uses SAN technology)  Redundant or backup power supplies  Environmental controls (e.g., air conditioning, fire suppression)  Security devices Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Networking Technologies for the Home Technology Trends in the Home Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Networking Technologies for the Home Powerline Networking Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Networking Technologies for the Home Wireless Broadband Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Future of Networking Network Security Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. Network Security Security Threats The most common external threats to networks include:  Viruses, worms, and Trojan horses  Spyware and adware  Zero-day attacks, also called zero-hour attacks  Hacker attacks  Denial of service attacks  Data interception and theft  Identity theft Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. Network Security Security Solutions Network security components often include:  Antivirus and antispyware  Firewall filtering  Dedicated firewall systems  Access control lists (ACL)  Intrusion prevention systems (IPS)  Virtual Private Networks (VPNs) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
  • 44. Network Architectures Cisco Network Architectures Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
  • 45. Network Architectures Cisco Certified Network Associate (CCNA) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
  • 46. Exploring the Networking Summary In this chapter, you learned:  Networks and the Internet have changed the way we communicate, learn, work, and even play.  Networks come in all sizes. They can range from simple networks consisting of two computers, to networks connecting millions of devices.  The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The Internet provides the services that enable us to connect and communicate with our families, friends, work, and interests. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
  • 47. Exploring the Networking Summary In this chapter, you learned:  The network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which communication can occur. It is made up of network components including end devices, intermediate device, and network media.  Networks must be reliable.  Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet, or as large as a corporation with thousands of users. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
  • 48. Exploring the Networking Summary In this chapter, you learned:  The network infrastructure can vary greatly in terms of size, number of users, and number and types of services that are supported on it. The network infrastructure must grow and adjust to support the way the network is used. The routing and switching platform is the foundation of any network infrastructure. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
  • 49. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49