SlideShare uma empresa Scribd logo
1 de 41
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 2: Connecting
to the WAN
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2
2.0 Introduction
2.1 WAN Technologies Overview
2.2 Selecting a WAN Technology
2.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Objectives
 Describe the purpose of a WAN.
 Describe WAN operations.
 Describe WAN services available.
 Compare various private WAN technologies.
 Compare various public WAN technologies.
 Select the appropriate WAN protocol and service for a specific
network requirement.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
2.1 WAN Technologies
Overview
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Why Choose a WAN?
 Operates beyond the
geographic scope of a
LAN
 Used to interconnect
the enterprise LAN to
remote LANs in branch
sites and telecommuter
sites
 Owned by a service
provider
 Organization must pay
a fee to use the
provider’s services to
connect sites
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Are WANs Necessary?
Businesses require communication among geographically separated
sites. Examples include:
 Regional or branch offices must be able to communicate and share data.
 Organizations must share information with other customer organizations.
 Mobile workers must access information that resides on corporate
networks.
Home computer users must send and receive data across
increasingly larger distances. Examples include:
 Consumers communicate over the Internet with banks, stores, and a
variety of providers of goods and services.
 Students do research by accessing library indexes and publications
located in other parts of the country and in other parts of the world.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks
 Companies expect their networks to perform optimally and to be able
to deliver an ever increasing array of services and applications to
support productivity and profitability.
 SPAN Engineering – example used in the curriculum
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Small Office
SPAN Engineering – Environmental Consulting Firm
 Been in business for four years, has grown to include 15 employees:
six engineers, four computer-aided drawing (CAD) designers, a
receptionist, two senior partners, and two office assistants
 Uses a single LAN to share information between computers, and to
share peripherals, such as a printer, a large-scale plotter, and fax
equipment
 Upgraded LAN to provide inexpensive VoIP service to save on the
costs of separate phone lines for their employees
 Connection to the Internet is through a common broadband service
called DSL
 Uses support services purchased from the DSL provider
 Uses a hosting service rather than purchasing and operating its own
FTP and email servers
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Campus Network
SPAN Engineering – Environmental Consulting Firm
 Five years later has grown rapidly.
 Contracted to design and implement a full-sized waste conversion
facility.
 Won other projects in neighboring municipalities and in other parts of
the country.
 Hired more staff and leased more office space with several hundred
employees, organized itself into functional departments.
 Network now consists of several subnetworks, each devoted to a
different department.
 Multiple LANs are joined to create a company-wide network or
campus, which spans several floors of the building.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Small Office – Campus Network
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Branch Networks
 Another six years later, SPAN Engineering demand for its services
has skyrocketed.
 To manage those projects, the company has opened small branch
offices closer to the project sites.
 SPAN Engineering now has a data center, which houses the various
databases and servers of the company. They must now implement a
WAN.
 For its branch offices that are in nearby cities, the company decides
to use private dedicated lines through their local service provider.
 For those offices that are located in other countries, the Internet is an
attractive WAN connection option.
 Although connecting offices through the Internet is economical, it
introduces security and privacy issues that the IT team must
address.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Branch Networks (cont.)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Distributed Networks
 SPAN Engineering has now been in business for 20 years and has
grown to thousands of employees distributed in offices worldwide.
 Cost of the network and its related services is a big expense.
 Looking to provide the best network services at the lowest cost.
 Encouraging teleworking and virtual teams, web-based applications
are being used to increase productivity and reduce costs.
 Site-to-site and remote access Virtual Private Networks (VPNs)
enable the company to use the Internet to connect easily and
securely with employees and facilities around the world.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Distributed Networks (cont.)
 Network requirements can change dramatically as the company
grows.
 Distributing employees saves costs in many ways, but it puts
increased demands on the network.
 Network must be able to adapt and grow as the company changes.
 Network designers and administrators meet these challenges by
carefully choosing network technologies, protocols, and service
providers, and by optimizing their networks.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Distributed Networks (cont.)
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
WANs in the OSI Model
WAN access standards
typically describe both
physical layer delivery
methods and data link layer
requirements, including
physical addressing, flow
control, and encapsulation.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
WAN Devices
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
Circuit Switching
The two most common types of circuit-switched WAN
technologies are the public switched telephone network (PSTN)
and the Integrated Services Digital Network (ISDN).
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
Packet Switching
Splits traffic data into packets that are routed over a shared network.
Packet-switching allow many pairs of nodes to communicate over the
same channel.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
2.2 Selecting a WAN
Technology
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Services
WAN Link Connection Options
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Services
Service-Provided Network Infrastructure
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Leased Lines
Advantages:
 Simplicity
 Quality
 Availability
Disadvantages:
 Cost
 Limited flexibility
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Dialup Advantages:
 Simplicity
 Availability
 Low implementation cost
Disadvantages:
 Low data rates
 Relatively long
connection time
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
ISDN
ISDN BRI ISDN PRI
Sample ISDN Topology
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Frame Relay
 PVCs carry both voice
and data traffic.
 PVCs are uniquely
identified by a data-link
connection identifier
(DLCI).
 PVCs and DLCIs ensure
bidirectional
communication from one
DTE device to another.
 R1 uses DLCI 102 to
reach R2 while R2 uses
DLCI 201 to reach R1.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
ATM
Built on a cell-based architecture, rather than on a frame-based
architecture. ATM cells are always a fixed length of 53 bytes.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Ethernet WAN
Features and Benefits of
Ethernet WAN include:
 Reduced expenses and
administration
 Easy integration with existing
networks
 Enhanced business
productivity
 Service providers now offer
Ethernet WAN service using
fiber-optic cabling.
 Known as Metropolitan
Ethernet (MetroE), Ethernet
over MPLS (EoMPLS), and
Virtual Private LAN Service
(VPLS).
Note: Commonly used to replace the
traditional Frame Relay and ATM WAN
links.
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
MPLS
Multiprotocol Label Switching (MPLS) is a multiprotocol high-
performance WAN technology that directs data from one router
to the next, based on short path labels rather than IP network
addresses.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
VSAT
Very small aperture
terminal (VSAT) - a
solution that creates a
private WAN using
satellite
communications.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
DSL
 Always-on connection
technology that uses
existing twisted-pair
telephone lines to
transport high-
bandwidth data, and
provides IP services
to subscribers.
 A DSL modem
converts an Ethernet
signal from the user
device to a DSL
signal, which is
transmitted to the
central office.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Cable
 Network access is
available from
some cable
television networks.
 Cable modems
provide an always-
on connection and
a simple
installation.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Wireless
New developments in
broadband wireless
technology:
 Municipal Wi-Fi – Many
cities have begun setting
up municipal wireless
 WiMAX – Worldwide
Interoperability for
Microwave Access
(WiMAX) is a new
technology that is just
beginning to come into
use.
 Satellite Internet
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
3G/4G Cellular
Common cellular industry terms include:
 3G/4G Wireless – Abbreviation for 3rd generation and 4th
generation cellular access. These technologies support wireless
Internet access.
 Long-Term Evolution (LTE) – A newer and faster technology,
considered to be part of the 4th generation (4G) technology.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
VPN Technology
VPN is an encrypted
connection between private
networks over a public
network.
Benefits:
 Cost savings
 Security
 Scalability
 Compatibility with
broadband technology
Two types of VPN:
 Site-to-site VPNs
 Remote-access VPNs
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Selecting WAN Services
Choosing a WAN Link Connection
Answer the following questions when choosing a WAN Connection:
 What is the purpose of the WAN?
 What is the geographic scope?
 What are the traffic requirements?
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Selecting WAN Services
Choosing a WAN Link Connection
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38
2.3 Summary
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Summary
 A business can use private lines or the public network infrastructure
for WAN connections.
 WAN access standards operate at layers 1 and 2 of the OSI model,
and are defined and managed by the TIA/EIA, ISO, and IEEE.
 A WAN may be circuit-switched or packet-switched.
 There is common terminology used to identify the physical
components of WAN connections and who, the service provider or
the customer, is responsible for which components.
 Service provider networks are complex and the service provider’s
backbone networks consist primarily of high-bandwidth fiber optic
media.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Summary (cont.)
 Permanent, dedicated point-to-point connections are provided by
using leased lines.
 Public infrastructure connections include DSL, cable, wireless, and
3G/4G cellular.
 Security over public infrastructure connections can be provided by
using remote-access or site-to-site VPNs.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mais conteúdo relacionado

Mais procurados

CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerVuz Dở Hơi
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPVuz Dở Hơi
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingVuz Dở Hơi
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 

Mais procurados (20)

CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 

Semelhante a CCNAv5 - S4: Chapter2 Connecting To The Wan

CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1Chaing Ravuth
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1Waqas Ahmed Nawaz
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4Waqas Ahmed Nawaz
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxRahafKhalid14
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyesThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdfSaurabh Chauhan
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Networkteknetir
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxKennedyRodriguez10
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1Waqas Ahmed Nawaz
 

Semelhante a CCNAv5 - S4: Chapter2 Connecting To The Wan (20)

CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
 
CCCNP ROUTE v6_ch07
CCCNP ROUTE  v6_ch07CCCNP ROUTE  v6_ch07
CCCNP ROUTE v6_ch07
 

Mais de Vuz Dở Hơi

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 

Mais de Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

CCNAv5 - S4: Chapter2 Connecting To The Wan

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 2: Connecting to the WAN Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2 2.0 Introduction 2.1 WAN Technologies Overview 2.2 Selecting a WAN Technology 2.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Objectives  Describe the purpose of a WAN.  Describe WAN operations.  Describe WAN services available.  Compare various private WAN technologies.  Compare various public WAN technologies.  Select the appropriate WAN protocol and service for a specific network requirement.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 2.1 WAN Technologies Overview
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Why Choose a WAN?  Operates beyond the geographic scope of a LAN  Used to interconnect the enterprise LAN to remote LANs in branch sites and telecommuter sites  Owned by a service provider  Organization must pay a fee to use the provider’s services to connect sites
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Are WANs Necessary? Businesses require communication among geographically separated sites. Examples include:  Regional or branch offices must be able to communicate and share data.  Organizations must share information with other customer organizations.  Mobile workers must access information that resides on corporate networks. Home computer users must send and receive data across increasingly larger distances. Examples include:  Consumers communicate over the Internet with banks, stores, and a variety of providers of goods and services.  Students do research by accessing library indexes and publications located in other parts of the country and in other parts of the world.
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks  Companies expect their networks to perform optimally and to be able to deliver an ever increasing array of services and applications to support productivity and profitability.  SPAN Engineering – example used in the curriculum
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Small Office SPAN Engineering – Environmental Consulting Firm  Been in business for four years, has grown to include 15 employees: six engineers, four computer-aided drawing (CAD) designers, a receptionist, two senior partners, and two office assistants  Uses a single LAN to share information between computers, and to share peripherals, such as a printer, a large-scale plotter, and fax equipment  Upgraded LAN to provide inexpensive VoIP service to save on the costs of separate phone lines for their employees  Connection to the Internet is through a common broadband service called DSL  Uses support services purchased from the DSL provider  Uses a hosting service rather than purchasing and operating its own FTP and email servers
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Campus Network SPAN Engineering – Environmental Consulting Firm  Five years later has grown rapidly.  Contracted to design and implement a full-sized waste conversion facility.  Won other projects in neighboring municipalities and in other parts of the country.  Hired more staff and leased more office space with several hundred employees, organized itself into functional departments.  Network now consists of several subnetworks, each devoted to a different department.  Multiple LANs are joined to create a company-wide network or campus, which spans several floors of the building.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Small Office – Campus Network
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Branch Networks  Another six years later, SPAN Engineering demand for its services has skyrocketed.  To manage those projects, the company has opened small branch offices closer to the project sites.  SPAN Engineering now has a data center, which houses the various databases and servers of the company. They must now implement a WAN.  For its branch offices that are in nearby cities, the company decides to use private dedicated lines through their local service provider.  For those offices that are located in other countries, the Internet is an attractive WAN connection option.  Although connecting offices through the Internet is economical, it introduces security and privacy issues that the IT team must address.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Branch Networks (cont.)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Distributed Networks  SPAN Engineering has now been in business for 20 years and has grown to thousands of employees distributed in offices worldwide.  Cost of the network and its related services is a big expense.  Looking to provide the best network services at the lowest cost.  Encouraging teleworking and virtual teams, web-based applications are being used to increase productivity and reduce costs.  Site-to-site and remote access Virtual Private Networks (VPNs) enable the company to use the Internet to connect easily and securely with employees and facilities around the world.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Distributed Networks (cont.)  Network requirements can change dramatically as the company grows.  Distributing employees saves costs in many ways, but it puts increased demands on the network.  Network must be able to adapt and grow as the company changes.  Network designers and administrators meet these challenges by carefully choosing network technologies, protocols, and service providers, and by optimizing their networks.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Distributed Networks (cont.)
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations WANs in the OSI Model WAN access standards typically describe both physical layer delivery methods and data link layer requirements, including physical addressing, flow control, and encapsulation.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations WAN Devices
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations Circuit Switching The two most common types of circuit-switched WAN technologies are the public switched telephone network (PSTN) and the Integrated Services Digital Network (ISDN).
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations Packet Switching Splits traffic data into packets that are routed over a shared network. Packet-switching allow many pairs of nodes to communicate over the same channel.
  • 20. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 2.2 Selecting a WAN Technology
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Services WAN Link Connection Options
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Services Service-Provided Network Infrastructure
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Leased Lines Advantages:  Simplicity  Quality  Availability Disadvantages:  Cost  Limited flexibility
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Dialup Advantages:  Simplicity  Availability  Low implementation cost Disadvantages:  Low data rates  Relatively long connection time
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures ISDN ISDN BRI ISDN PRI Sample ISDN Topology
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Frame Relay  PVCs carry both voice and data traffic.  PVCs are uniquely identified by a data-link connection identifier (DLCI).  PVCs and DLCIs ensure bidirectional communication from one DTE device to another.  R1 uses DLCI 102 to reach R2 while R2 uses DLCI 201 to reach R1.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures ATM Built on a cell-based architecture, rather than on a frame-based architecture. ATM cells are always a fixed length of 53 bytes.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Ethernet WAN Features and Benefits of Ethernet WAN include:  Reduced expenses and administration  Easy integration with existing networks  Enhanced business productivity  Service providers now offer Ethernet WAN service using fiber-optic cabling.  Known as Metropolitan Ethernet (MetroE), Ethernet over MPLS (EoMPLS), and Virtual Private LAN Service (VPLS). Note: Commonly used to replace the traditional Frame Relay and ATM WAN links.
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures MPLS Multiprotocol Label Switching (MPLS) is a multiprotocol high- performance WAN technology that directs data from one router to the next, based on short path labels rather than IP network addresses.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures VSAT Very small aperture terminal (VSAT) - a solution that creates a private WAN using satellite communications.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures DSL  Always-on connection technology that uses existing twisted-pair telephone lines to transport high- bandwidth data, and provides IP services to subscribers.  A DSL modem converts an Ethernet signal from the user device to a DSL signal, which is transmitted to the central office.
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Cable  Network access is available from some cable television networks.  Cable modems provide an always- on connection and a simple installation.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Wireless New developments in broadband wireless technology:  Municipal Wi-Fi – Many cities have begun setting up municipal wireless  WiMAX – Worldwide Interoperability for Microwave Access (WiMAX) is a new technology that is just beginning to come into use.  Satellite Internet
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures 3G/4G Cellular Common cellular industry terms include:  3G/4G Wireless – Abbreviation for 3rd generation and 4th generation cellular access. These technologies support wireless Internet access.  Long-Term Evolution (LTE) – A newer and faster technology, considered to be part of the 4th generation (4G) technology.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures VPN Technology VPN is an encrypted connection between private networks over a public network. Benefits:  Cost savings  Security  Scalability  Compatibility with broadband technology Two types of VPN:  Site-to-site VPNs  Remote-access VPNs
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Selecting WAN Services Choosing a WAN Link Connection Answer the following questions when choosing a WAN Connection:  What is the purpose of the WAN?  What is the geographic scope?  What are the traffic requirements?
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Selecting WAN Services Choosing a WAN Link Connection
  • 38. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38 2.3 Summary
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Summary  A business can use private lines or the public network infrastructure for WAN connections.  WAN access standards operate at layers 1 and 2 of the OSI model, and are defined and managed by the TIA/EIA, ISO, and IEEE.  A WAN may be circuit-switched or packet-switched.  There is common terminology used to identify the physical components of WAN connections and who, the service provider or the customer, is responsible for which components.  Service provider networks are complex and the service provider’s backbone networks consist primarily of high-bandwidth fiber optic media.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Summary (cont.)  Permanent, dedicated point-to-point connections are provided by using leased lines.  Public infrastructure connections include DSL, cable, wireless, and 3G/4G cellular.  Security over public infrastructure connections can be provided by using remote-access or site-to-site VPNs.
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential