SlideShare a Scribd company logo
1 of 15
COMPUTERS IN
OUR DAILY LIFE
The computer has brought about a
quantum leap in our daily life, and
dependence on computer has
increased to occupy an essential
position in every home and every
company. All transactions in various
fields have been shifted to be
digitalized or to be electronic, as
education depends on computers and
technological development to improve
its performance and results, as well as
health fields and other fields.
Computer has become one of the most
important sources of knowledge, as
the computer is connected to the
Internet and browsing all sources of
science and knowledge, whether
written, audio or visual, and they can
be downloaded onto the computer and
find it at any time. The current century
is the age of information revolution, as
the computer has turned into a basic
element of life for humans.
Benefits of Mobile
Applications in the
Everyday Life
2.1 Apps: Their relevance to day-today activities
Applications have made the lives easiest, always there for the rescue to save time, effort, and dependencies.
You want a few transactions; financial apps save you from the bank visit. In need of groceries, an app lets you
shop from home and get everything to your door.
Several segments have successfully launched applications and are looking forward to the betterment and
advancements. Here are a few subjects that made mobile applications the best thing.
• Communication
• Cooking
• Trivia
• Learning
• Entertainment
• Social Media
• Shopping
• Finance and Stocks Related
• Matrimony
And many more!
Some of the advantages that people opt for apps are:
• There are lots of apps focused on productivity like educational apps, exploring informative apps
that sharpen your skills and explore your interests.
• There are applications that make communication easiest. Voice calls, video calls, texting, and
conference calls give access to the connection with people in any corner of the world, all with a
mobile app.
• It ensures comfort to a greater extent. The convenience of shopping, selling, surveying, etc. It
eliminates the long queue waiting for ticket booking and gets a taxi at the doorsteps.
• Making and spending money is also made easiest with mobile applications with full security. It can
get you a loan, count interest, list you the finest policies, and pick for you the most financially
viable firms and other imperative data.
• We cannot miss out on an important idea – the idea of super apps. All the mentioned above welfare
or most of them when served right just with a single app, it’s a bunch of conveniences. There has
been a certain rise in the super apps for this reason and some more.
Applications have tremendously made life painless. Knowing the purpose and the exact way to use it
can serve utter satisfaction and the belonging experience. We are summing up these points for now
though there are rational reasons for the same.
The foundations of
networking: switches,
routers, and wireless
access points
Switches, routers, and wireless access points are the essential networking basics.
Through them, devices connected to your network can communicate with one
another and with other networks, like the Internet. Switches, routers, and wireless
access points perform very different functions in a network.
Switches allow devices on your network to
communicate with each other, as well as with
other networks, creating a network of shared
resources. Through information sharing and
resource allocation, switches save money and
increase productivity.
• A managed on-premises switch lets you
configure and monitor your LAN, giving
you tighter control of your network
traffic.
• Have a small IT team? A cloud-managed
switch can simplify your network
management. You get a simple user
interface, multisite full-stack
management, and automatic updates
delivered directly to the switch.
Routers connect multiple networks together. They also connect computers
on those networks to the Internet. Routers enable all networked computers to
share a single Internet connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network,
chooses the best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from security
threats, and can even decide which computers receive priority over others.
Beyond those basic networking functions, routers come with additional
features to make networking easier or more secure. Depending on your
security needs, for example, you can choose a router with a firewall, a
virtual private network (VPN), or an Internet Protocol (IP) communications
system.
ROUTERS
Access Points
An access point allows devices to connect to the wireless network without cables.
A wireless network makes it easy to bring new devices online and provides flexible
support to mobile workers.
An access point acts like an amplifier for your network. While a router
provides the bandwidth, an access point extends that bandwidth so
that the network can support many devices, and those devices can
access the network from farther away.
But an access point does more than simply extend Wi-Fi. It can also
give useful data about the devices on the network, provide proactive
security, and serve many other practical purposes.
Access points support different IEEE standards. Each standard is an
amendment that was ratified over time. The standards operate on
varying frequencies, deliver different bandwidth, and support
different numbers of channels.
WIRELESS NETWORKING
To create your wireless network, you can choose between three types of
deployment: centralized deployment, converged deployment, and cloud-based
deployment.
1. Centralized deployment
The most common type of wireless network system, centralized
deployments are traditionally used in campuses where buildings and
networks are in close proximity. This deployment consolidates the
wireless network, which makes upgrades easier and facilitates
advanced wireless functionality. Controllers are based on-premises
and are installed in a centralized location.
2. Converged deployment
For small campuses or branch offices, converged deployments offer
consistency in wireless and wired connections. This deployment
converges wired and wireless on one network device—an access
switch—and performs the dual role of both switch and wireless
controller.
3. Cloud-based deployment
This system uses the cloud to manage network devices deployed on-
premises at different locations. The solution requires Cisco Meraki
cloud-managed devices, which provide full visibility of the network
through their dashboards.
Do you have
any questions?
QUIZ
TIME!!!

More Related Content

Similar to Technology in Education Technology Presentation in Blue Peach Illustrative Style.pptx

1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptxAMITKUMARSINGH756828
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxDiptimayeeTripathy1
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe. ShohanaakterKakon
 
Advantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdfAdvantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdflibertyuae uae
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network HealthDellNMS
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network HealthDellNMS
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and IssuesIRJET Journal
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networkingMilan Padariya
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson Latin America
 

Similar to Technology in Education Technology Presentation in Blue Peach Illustrative Style.pptx (19)

1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx1- Mobile Computing Introduction.pptx
1- Mobile Computing Introduction.pptx
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Advantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdfAdvantages Of Wireless Network Installation In Dubai.pdf
Advantages Of Wireless Network Installation In Dubai.pdf
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network Health
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network Health
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
Notacd051
Notacd051Notacd051
Notacd051
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
La3 compnet notes
La3 compnet notesLa3 compnet notes
La3 compnet notes
 
Notacd05
Notacd05Notacd05
Notacd05
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
iot monitoring
iot monitoringiot monitoring
iot monitoring
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Technology in Education Technology Presentation in Blue Peach Illustrative Style.pptx

  • 2. The computer has brought about a quantum leap in our daily life, and dependence on computer has increased to occupy an essential position in every home and every company. All transactions in various fields have been shifted to be digitalized or to be electronic, as education depends on computers and technological development to improve its performance and results, as well as health fields and other fields.
  • 3. Computer has become one of the most important sources of knowledge, as the computer is connected to the Internet and browsing all sources of science and knowledge, whether written, audio or visual, and they can be downloaded onto the computer and find it at any time. The current century is the age of information revolution, as the computer has turned into a basic element of life for humans.
  • 4. Benefits of Mobile Applications in the Everyday Life 2.1 Apps: Their relevance to day-today activities
  • 5. Applications have made the lives easiest, always there for the rescue to save time, effort, and dependencies. You want a few transactions; financial apps save you from the bank visit. In need of groceries, an app lets you shop from home and get everything to your door. Several segments have successfully launched applications and are looking forward to the betterment and advancements. Here are a few subjects that made mobile applications the best thing. • Communication • Cooking • Trivia • Learning • Entertainment • Social Media • Shopping • Finance and Stocks Related • Matrimony And many more!
  • 6. Some of the advantages that people opt for apps are: • There are lots of apps focused on productivity like educational apps, exploring informative apps that sharpen your skills and explore your interests. • There are applications that make communication easiest. Voice calls, video calls, texting, and conference calls give access to the connection with people in any corner of the world, all with a mobile app. • It ensures comfort to a greater extent. The convenience of shopping, selling, surveying, etc. It eliminates the long queue waiting for ticket booking and gets a taxi at the doorsteps. • Making and spending money is also made easiest with mobile applications with full security. It can get you a loan, count interest, list you the finest policies, and pick for you the most financially viable firms and other imperative data. • We cannot miss out on an important idea – the idea of super apps. All the mentioned above welfare or most of them when served right just with a single app, it’s a bunch of conveniences. There has been a certain rise in the super apps for this reason and some more. Applications have tremendously made life painless. Knowing the purpose and the exact way to use it can serve utter satisfaction and the belonging experience. We are summing up these points for now though there are rational reasons for the same.
  • 7. The foundations of networking: switches, routers, and wireless access points
  • 8. Switches, routers, and wireless access points are the essential networking basics. Through them, devices connected to your network can communicate with one another and with other networks, like the Internet. Switches, routers, and wireless access points perform very different functions in a network. Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.
  • 9. • A managed on-premises switch lets you configure and monitor your LAN, giving you tighter control of your network traffic. • Have a small IT team? A cloud-managed switch can simplify your network management. You get a simple user interface, multisite full-stack management, and automatic updates delivered directly to the switch.
  • 10. Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money. A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way. Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others. Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your security needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system. ROUTERS
  • 11. Access Points An access point allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers. An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away. But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes. Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.
  • 12. WIRELESS NETWORKING To create your wireless network, you can choose between three types of deployment: centralized deployment, converged deployment, and cloud-based deployment. 1. Centralized deployment The most common type of wireless network system, centralized deployments are traditionally used in campuses where buildings and networks are in close proximity. This deployment consolidates the wireless network, which makes upgrades easier and facilitates advanced wireless functionality. Controllers are based on-premises and are installed in a centralized location.
  • 13. 2. Converged deployment For small campuses or branch offices, converged deployments offer consistency in wireless and wired connections. This deployment converges wired and wireless on one network device—an access switch—and performs the dual role of both switch and wireless controller. 3. Cloud-based deployment This system uses the cloud to manage network devices deployed on- premises at different locations. The solution requires Cisco Meraki cloud-managed devices, which provide full visibility of the network through their dashboards.
  • 14. Do you have any questions?